gistering): Released all slaves
08:40:35 executing program 3:

08:40:35 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
r2 = dup(r1)
readv(r2, &(0x7f00000004c0)=[{&(0x7f0000000000)=""/219, 0xdb}, {0x0}, {0x0}, {0x0}], 0x4)
shutdown(r2, 0x0)

08:40:35 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000001780)=""/4096, 0x1000}, {0x0}], 0x2}, 0x46)
r1 = dup(r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0085e)
shutdown(r1, 0x0)
shutdown(r2, 0x0)

08:40:35 executing program 3:

08:40:35 executing program 3:

08:40:35 executing program 3:

08:40:35 executing program 3:

[  418.350216] IPVS: ftp: loaded support on port[0] = 21
[  418.665477] chnl_net:caif_netlink_parms(): no params data found
[  418.697727] bridge0: port 1(bridge_slave_0) entered blocking state
[  418.704216] bridge0: port 1(bridge_slave_0) entered disabled state
[  418.711444] device bridge_slave_0 entered promiscuous mode
[  418.718075] bridge0: port 2(bridge_slave_1) entered blocking state
[  418.724785] bridge0: port 2(bridge_slave_1) entered disabled state
[  418.731802] device bridge_slave_1 entered promiscuous mode
[  418.748925] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  418.757923] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  418.776438] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  418.783711] team0: Port device team_slave_0 added
[  418.789016] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  418.796224] team0: Port device team_slave_1 added
[  418.802256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  418.809387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  418.863643] device hsr_slave_0 entered promiscuous mode
[  418.900335] device hsr_slave_1 entered promiscuous mode
[  418.960615] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  418.967484] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  418.979716] bridge0: port 2(bridge_slave_1) entered blocking state
[  418.986113] bridge0: port 2(bridge_slave_1) entered forwarding state
[  418.992792] bridge0: port 1(bridge_slave_0) entered blocking state
[  418.999143] bridge0: port 1(bridge_slave_0) entered forwarding state
[  419.026580] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  419.033509] 8021q: adding VLAN 0 to HW filter on device bond0
[  419.042034] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  419.049959] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  419.057672] bridge0: port 1(bridge_slave_0) entered disabled state
[  419.064846] bridge0: port 2(bridge_slave_1) entered disabled state
[  419.075400] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  419.081788] 8021q: adding VLAN 0 to HW filter on device team0
[  419.089892] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  419.097589] bridge0: port 1(bridge_slave_0) entered blocking state
[  419.103968] bridge0: port 1(bridge_slave_0) entered forwarding state
[  419.113658] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  419.121480] bridge0: port 2(bridge_slave_1) entered blocking state
[  419.127819] bridge0: port 2(bridge_slave_1) entered forwarding state
[  419.147517] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  419.157286] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  419.177279] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  419.184764] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  419.195154] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  419.202985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  419.210640] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  419.218114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  419.224978] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  419.237656] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  419.248944] 8021q: adding VLAN 0 to HW filter on device batadv0
[  419.650609] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:40:39 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:39 executing program 3:

08:40:39 executing program 1:

08:40:39 executing program 2:

08:40:39 executing program 5:

08:40:39 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:40:39 executing program 2:

08:40:39 executing program 3:

08:40:39 executing program 1:

08:40:39 executing program 5:

08:40:39 executing program 3:

08:40:40 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, 0x0, 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:40 executing program 5:

08:40:40 executing program 1:

08:40:40 executing program 2:

08:40:40 executing program 3:

08:40:40 executing program 5:

[  421.040423] device bridge_slave_1 left promiscuous mode
[  421.045982] bridge0: port 2(bridge_slave_1) entered disabled state
[  421.091152] device bridge_slave_0 left promiscuous mode
[  421.096674] bridge0: port 1(bridge_slave_0) entered disabled state
[  421.213297] device hsr_slave_1 left promiscuous mode
08:40:40 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:40:40 executing program 2:

08:40:40 executing program 1:

08:40:40 executing program 5:

08:40:40 executing program 3:

08:40:40 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  421.274179] device hsr_slave_0 left promiscuous mode
08:40:40 executing program 2:

08:40:40 executing program 1:

08:40:40 executing program 5:

[  421.325844] team0 (unregistering): Port device team_slave_1 removed
08:40:40 executing program 3:

08:40:40 executing program 2:

[  421.404591] team0 (unregistering): Port device team_slave_0 removed
08:40:40 executing program 1:

[  421.493957] bond0 (unregistering): Releasing backup interface bond_slave_1
[  421.592123] bond0 (unregistering): Releasing backup interface bond_slave_0
[  421.698370] bond0 (unregistering): Released all slaves
08:40:41 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:40:41 executing program 5:

08:40:41 executing program 3:

08:40:41 executing program 2:

08:40:41 executing program 1:

[  424.220193] IPVS: ftp: loaded support on port[0] = 21
[  424.575341] chnl_net:caif_netlink_parms(): no params data found
[  424.608439] bridge0: port 1(bridge_slave_0) entered blocking state
[  424.615928] bridge0: port 1(bridge_slave_0) entered disabled state
[  424.623425] device bridge_slave_0 entered promiscuous mode
[  424.630637] bridge0: port 2(bridge_slave_1) entered blocking state
[  424.637056] bridge0: port 2(bridge_slave_1) entered disabled state
[  424.644248] device bridge_slave_1 entered promiscuous mode
[  424.662245] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  424.671583] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  424.687427] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  424.695406] team0: Port device team_slave_0 added
[  424.701141] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  424.708774] team0: Port device team_slave_1 added
[  424.714368] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  424.721629] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  424.802186] device hsr_slave_0 entered promiscuous mode
[  424.840343] device hsr_slave_1 entered promiscuous mode
[  424.900546] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  424.907458] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  424.921535] bridge0: port 2(bridge_slave_1) entered blocking state
[  424.927878] bridge0: port 2(bridge_slave_1) entered forwarding state
[  424.934550] bridge0: port 1(bridge_slave_0) entered blocking state
[  424.940952] bridge0: port 1(bridge_slave_0) entered forwarding state
[  424.968834] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  424.975229] 8021q: adding VLAN 0 to HW filter on device bond0
[  424.983306] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  424.992314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  424.999963] bridge0: port 1(bridge_slave_0) entered disabled state
[  425.007336] bridge0: port 2(bridge_slave_1) entered disabled state
[  425.016616] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  425.022807] 8021q: adding VLAN 0 to HW filter on device team0
[  425.031070] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  425.038631] bridge0: port 1(bridge_slave_0) entered blocking state
[  425.045036] bridge0: port 1(bridge_slave_0) entered forwarding state
[  425.054914] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  425.062529] bridge0: port 2(bridge_slave_1) entered blocking state
[  425.068866] bridge0: port 2(bridge_slave_1) entered forwarding state
[  425.082581] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  425.090677] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  425.099784] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  425.110448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  425.119720] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  425.128517] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  425.134805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  425.147655] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  425.157350] 8021q: adding VLAN 0 to HW filter on device batadv0
[  425.570860] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:40:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:45 executing program 1:

08:40:45 executing program 3:

08:40:45 executing program 5:

08:40:45 executing program 2:

08:40:45 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:45 executing program 1:

08:40:45 executing program 3:

08:40:45 executing program 5:

08:40:45 executing program 2:

08:40:45 executing program 1:

08:40:45 executing program 3:

08:40:45 executing program 5:

08:40:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:45 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:45 executing program 2:

08:40:45 executing program 3:

08:40:45 executing program 1:

08:40:45 executing program 5:

08:40:45 executing program 2:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(0x0)
ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x800, 0x100000001, 0x9, 0xbb66, 0x7f, 0x2, 0x0, 'syz1\x00'})
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r0 = epoll_create1(0x80000)
r1 = socket(0x11, 0x0, 0x0)
sched_setaffinity(0x0, 0xffffffffffffffbd, &(0x7f00000000c0)=0x9)
prlimit64(0x0, 0xf, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6)
sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', <r3=>0x0})
bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(r2, &(0x7f0000008a80), 0x400000000000328, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x90000000})

08:40:45 executing program 3:
poll(&(0x7f0000000140), 0x2280, 0x4b)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00866)
fcntl$getown(r0, 0x5)
ppoll(&(0x7f0000000040)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:45 executing program 1:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653092552d4002c779f464bd43082bb99fcac413da9d447a4341107b3f4136651d375793666c7ec004"], 0x31)
close(r0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

08:40:45 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/rt6_stats\x00')
preadv(r0, &(0x7f00000017c0), 0x199, 0x0)

08:40:45 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:45 executing program 1:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653092552d4002c779f464bd43082bb99fcac413da9d447a4341107b3f4136651d375793666c7ec004"], 0x31)
close(r0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

08:40:45 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:45 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x51, &(0x7f0000000000)={0x0, {{0x10}}}, 0x90)
recvfrom$inet(r0, 0x0, 0x2fd2e98b60c2dd14, 0x0, 0x0, 0x800e00660)
shutdown(r0, 0x0)

08:40:46 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x8001000008912, &(0x7f0000000080)="c0dca5055e00b4ec7be070")
mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0)
keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'user:', 'syz', 0x20, 0x1000}, 0x2a, 0x0)
r1 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe)
add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f00000002c0)='X', 0x1, 0xfffffffffffffffe)
keyctl$read(0xb, r1, &(0x7f0000000240)=""/112, 0x349b7f55)

[  426.670431] device bridge_slave_1 left promiscuous mode
[  426.676173] bridge0: port 2(bridge_slave_1) entered disabled state
08:40:46 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
poll(&(0x7f00000001c0)=[{r1}], 0x1, 0xe1)
r2 = dup(r1)
shutdown(r2, 0x0)

08:40:46 executing program 2:
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0)
ppoll(&(0x7f0000000080)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

[  426.702120] encrypted_key: key user:syz not found
[  426.736394] device bridge_slave_0 left promiscuous mode
[  426.754772] bridge0: port 1(bridge_slave_0) entered disabled state
[  426.882718] device hsr_slave_1 left promiscuous mode
[  426.924050] device hsr_slave_0 left promiscuous mode
[  426.964264] team0 (unregistering): Port device team_slave_1 removed
[  426.982153] team0 (unregistering): Port device team_slave_0 removed
[  426.998116] bond0 (unregistering): Releasing backup interface bond_slave_1
[  427.058384] bond0 (unregistering): Releasing backup interface bond_slave_0
08:40:46 executing program 5:
timer_create(0x0, &(0x7f0000000340)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r0=>0xffffffffffffffff})
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c)
r2 = gettid()
perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = dup(r1)
write$FUSE_GETXATTR(r3, 0x0, 0x0)
timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0)
dup3(r0, r3, 0x0)
tkill(r2, 0x1004000000013)

[  427.141911] bond0 (unregistering): Released all slaves
08:40:46 executing program 3:
socket$inet_icmp_raw(0x2, 0x3, 0x1)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
shutdown(0xffffffffffffffff, 0x0)
recvfrom$inet(r0, 0x0, 0x5de0744d, 0x0, 0x0, 0x800e0075f)
shutdown(r0, 0x0)

08:40:46 executing program 1:
r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x8)
r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0)
ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0)
ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@binder={0x70742a85}}, &(0x7f0000000240)={0x1200000000000000, 0x18, 0x30}}}], 0x0, 0x0, 0x0})
r3 = socket$inet(0x2, 0x80008, 0x1)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000200)={0x0, 0x0, 0x1})
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r3, 0x0, 0x0, 0x200007fd, 0x0, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246)
openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0)

08:40:46 executing program 1:
r0 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={0x77359400}, 0x8)
r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0)
openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0)
ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0)
ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@binder={0x70742a85}}, &(0x7f0000000240)={0x1200000000000000, 0x18, 0x30}}}], 0x0, 0x0, 0x0})
r3 = socket$inet(0x2, 0x80008, 0x1)
ioctl$FS_IOC_FIEMAP(r3, 0xc020660b, &(0x7f0000000200)={0x0, 0x0, 0x1})
setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, 0x0, 0x0)
bind$inet(0xffffffffffffffff, 0x0, 0x0)
sendto$inet(r3, 0x0, 0x0, 0x200007fd, 0x0, 0x0)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0)
ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f0000000640)=""/246)
openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x8004e500, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0)

[  427.239873] binder_alloc: 13944: binder_alloc_buf, no vma
08:40:46 executing program 3:
r0 = gettid()
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
setpriority(0xc208d536fd8f4cf, 0x0, 0x0)
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0)
timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x401, 0x6)
tkill(r0, 0x14)

[  427.317449] binder_alloc: 13958: binder_alloc_buf, no vma
[  429.450238] IPVS: ftp: loaded support on port[0] = 21
[  429.756574] chnl_net:caif_netlink_parms(): no params data found
[  429.789078] bridge0: port 1(bridge_slave_0) entered blocking state
[  429.795580] bridge0: port 1(bridge_slave_0) entered disabled state
[  429.802489] device bridge_slave_0 entered promiscuous mode
[  429.809039] bridge0: port 2(bridge_slave_1) entered blocking state
[  429.815785] bridge0: port 2(bridge_slave_1) entered disabled state
[  429.822876] device bridge_slave_1 entered promiscuous mode
[  429.840206] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  429.848834] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  429.865682] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  429.873629] team0: Port device team_slave_0 added
[  429.878968] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  429.886181] team0: Port device team_slave_1 added
[  429.891558] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  429.898745] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  429.963831] device hsr_slave_0 entered promiscuous mode
[  430.010346] device hsr_slave_1 entered promiscuous mode
[  430.080759] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  430.087694] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  430.100080] bridge0: port 2(bridge_slave_1) entered blocking state
[  430.106471] bridge0: port 2(bridge_slave_1) entered forwarding state
[  430.113188] bridge0: port 1(bridge_slave_0) entered blocking state
[  430.119542] bridge0: port 1(bridge_slave_0) entered forwarding state
[  430.147195] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  430.153762] 8021q: adding VLAN 0 to HW filter on device bond0
[  430.162683] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  430.171724] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  430.178830] bridge0: port 1(bridge_slave_0) entered disabled state
[  430.185689] bridge0: port 2(bridge_slave_1) entered disabled state
[  430.195980] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  430.202423] 8021q: adding VLAN 0 to HW filter on device team0
[  430.211296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  430.218832] bridge0: port 1(bridge_slave_0) entered blocking state
[  430.225228] bridge0: port 1(bridge_slave_0) entered forwarding state
[  430.235768] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  430.243411] bridge0: port 2(bridge_slave_1) entered blocking state
[  430.249764] bridge0: port 2(bridge_slave_1) entered forwarding state
[  430.263690] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  430.275537] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  430.282811] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  430.296058] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  430.306206] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  430.316864] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  430.324057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  430.331752] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  430.339547] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  430.353235] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  430.363020] 8021q: adding VLAN 0 to HW filter on device batadv0
[  430.740715] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:40:50 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:50 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e008c0)
readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/53, 0x35}, {0x0}, {0x0}], 0x3)
shutdown(r1, 0x0)

08:40:50 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:50 executing program 3:
accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0)
poll(&(0x7f0000000000)=[{r0, 0x22}], 0x1, 0x0)
ppoll(&(0x7f0000000080)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:50 executing program 2:
r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0)
ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000200)={@flat=@binder={0x70742a85}}, &(0x7f0000000240)={0x1200, 0x18, 0x30}}}], 0x0, 0x0, 0x0})

08:40:50 executing program 5:
accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0)
poll(&(0x7f0000000000)=[{r0, 0x22}], 0x1, 0x0)
ppoll(&(0x7f0000000080)=[{r0}, {r0}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:50 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:40:50 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:40:51 executing program 1:
accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000000))
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x10101, 0x0, 0x0, 0x800e009e0)
ppoll(&(0x7f0000000080)=[{r0}, {}, {r0}], 0x3, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
poll(&(0x7f00000001c0)=[{r1, 0x102}], 0x1, 0xe1)
r2 = dup(r1)
shutdown(r2, 0x0)

08:40:51 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:51 executing program 3:
syz_emit_ethernet(0x23, &(0x7f0000000080)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x15, 0x0, 0x2, 0x0, 0x0, 0x0, @multicast1}}}}}, 0x0)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 2:
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x50000}]})
r0 = accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
readv(r0, 0x0, 0x0)

08:40:51 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
read(r0, &(0x7f00000001c0)=""/238, 0xee)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
r2 = dup(r1)
readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/219, 0xdb}, {0x0}], 0x2)
shutdown(r2, 0x0)

08:40:51 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
read(r0, &(0x7f00000001c0)=""/238, 0xee)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
r2 = dup(r1)
readv(r2, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/219, 0xdb}], 0x1)
shutdown(r2, 0x0)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:51 executing program 2:
r0 = socket$inet6(0xa, 0x400000000001, 0x0)
close(r0)
r1 = socket(0x11, 0x800000003, 0x0)
bind(r1, &(0x7f0000000180)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80)
r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0)
ftruncate(r2, 0x88001)
sendfile(r0, r2, 0x0, 0x800000000024)

08:40:52 executing program 1:
poll(&(0x7f0000000140), 0x2280, 0x4b)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00866)
ppoll(&(0x7f0000000000)=[{r0}, {r0, 0x1}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:52 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:52 executing program 3:
r0 = socket$netlink(0x10, 0x3, 0xa)
write$binfmt_elf64(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78)

[  432.648317] audit: type=1400 audit(1561538452.053:78): avc:  denied  { create } for  pid=14077 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
[  432.697806] audit: type=1400 audit(1561538452.083:79): avc:  denied  { write } for  pid=14077 comm="syz-executor.3" path="socket:[52385]" dev="sockfs" ino=52385 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1
08:40:52 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:52 executing program 5:
r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x1, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
close(r0)

08:40:52 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:52 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe)
r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000a00)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f945b92f7daadafe3191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f4770000000000f300000000000000195e230000000000", 0xc0, r0)
r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd)
keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}})
fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8)

08:40:52 executing program 3:
r0 = gettid()
r1 = syz_open_dev$usbmon(0x0, 0x0, 0x0)
mkdir(0x0, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000400)={<r2=>0x0, 0x3f}, &(0x7f0000000440)=0x8)
setsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000500)={r2, 0x10000, 0x6, 0x3, 0x6cc, 0x8}, 0x14)
sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5)
lsetxattr$security_ima(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000580)=@sha1={0x1, "9fdf885a8f4389f3c4fc15341fa6af5778f14dfb"}, 0x15, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x40)
symlink(&(0x7f0000001000)='./file0\x00', 0x0)
madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe)
setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000480)='ip6_vti0\x00', 0x10)
capget(&(0x7f0000000140)={0x39980732}, 0x0)
getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000040)=0x80000000, &(0x7f0000000180)=0x2)
mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil)
remap_file_pages(&(0x7f00005b1000/0x3000)=nil, 0x3000, 0x9, 0x3ff, 0x40002)
process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x3, 0x0)
getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@known='com.apple.FinderInfo\x00', &(0x7f0000000280)=""/68, 0x44)
ioctl(0xffffffffffffffff, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070")
getsockopt$inet6_mreq(r3, 0x29, 0x15, &(0x7f0000000340)={@mcast1}, &(0x7f0000000380)=0x14)

08:40:52 executing program 1:
poll(&(0x7f0000000200)=[{}], 0x1, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x100000007, 0x0, 0x0, 0x800e00525)
poll(&(0x7f0000000000)=[{r0, 0xc0}], 0x1, 0x0)
shutdown(r0, 0x0)

08:40:52 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x400000000001, 0x0)
dup2(r1, r0)

08:40:52 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:52 executing program 5:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653092552d4002c779f464bd43082bb99fcac413da9d447a4341107b"], 0x24)
close(r0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

[  433.331028] device bridge_slave_1 left promiscuous mode
[  433.336609] bridge0: port 2(bridge_slave_1) entered disabled state
08:40:52 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  433.410956] device bridge_slave_0 left promiscuous mode
[  433.417751] bridge0: port 1(bridge_slave_0) entered disabled state
08:40:52 executing program 2:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(0x0)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r0 = epoll_create1(0x80000)
r1 = socket(0x11, 0x0, 0x0)
sched_setaffinity(0x0, 0xffffffffffffffbd, &(0x7f00000000c0)=0x9)
prlimit64(0x0, 0xf, &(0x7f0000000000), 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6)
sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
r3 = accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', <r4=>0x0})
bind$packet(r2, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(r2, &(0x7f0000008a80), 0x400000000000328, 0x0)
epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000040)={0x90000000})
fcntl$setlease(r3, 0x400, 0x3)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000040)=0x3, 0x4)
finit_module(r2, &(0x7f0000000180)='bridge_slave_1\x00', 0x0)
write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0)

08:40:52 executing program 1:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0)
r2 = fcntl$dupfd(r0, 0x0, r1)
bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x3}}, 0xa)
setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0)

08:40:52 executing program 5:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003)
write$binfmt_script(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c653092552d4002c779f464bd43082bb99fcac413da9d447a4341107b"], 0x24)
close(r0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

08:40:52 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

[  433.742794] device hsr_slave_1 left promiscuous mode
[  433.799483] device hsr_slave_0 left promiscuous mode
[  433.856906] team0 (unregistering): Port device team_slave_1 removed
[  433.883430] team0 (unregistering): Port device team_slave_0 removed
[  433.913959] bond0 (unregistering): Releasing backup interface bond_slave_1
[  433.974357] bond0 (unregistering): Releasing backup interface bond_slave_0
[  434.053580] bond0 (unregistering): Released all slaves
[  436.420237] IPVS: ftp: loaded support on port[0] = 21
[  436.725926] chnl_net:caif_netlink_parms(): no params data found
[  436.758628] bridge0: port 1(bridge_slave_0) entered blocking state
[  436.765764] bridge0: port 1(bridge_slave_0) entered disabled state
[  436.772705] device bridge_slave_0 entered promiscuous mode
[  436.779266] bridge0: port 2(bridge_slave_1) entered blocking state
[  436.785995] bridge0: port 2(bridge_slave_1) entered disabled state
[  436.793166] device bridge_slave_1 entered promiscuous mode
[  436.810013] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  436.818737] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  436.835219] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  436.842543] team0: Port device team_slave_0 added
[  436.847980] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  436.855156] team0: Port device team_slave_1 added
[  436.860486] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  436.867664] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  436.932211] device hsr_slave_0 entered promiscuous mode
[  436.970493] device hsr_slave_1 entered promiscuous mode
[  437.040507] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  437.047389] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  437.059668] bridge0: port 2(bridge_slave_1) entered blocking state
[  437.066059] bridge0: port 2(bridge_slave_1) entered forwarding state
[  437.072727] bridge0: port 1(bridge_slave_0) entered blocking state
[  437.079089] bridge0: port 1(bridge_slave_0) entered forwarding state
[  437.105978] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  437.112797] 8021q: adding VLAN 0 to HW filter on device bond0
[  437.122178] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  437.131050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  437.138122] bridge0: port 1(bridge_slave_0) entered disabled state
[  437.144918] bridge0: port 2(bridge_slave_1) entered disabled state
[  437.155192] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  437.162035] 8021q: adding VLAN 0 to HW filter on device team0
[  437.177990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  437.185627] bridge0: port 1(bridge_slave_0) entered blocking state
[  437.192030] bridge0: port 1(bridge_slave_0) entered forwarding state
[  437.202148] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  437.209811] bridge0: port 2(bridge_slave_1) entered blocking state
[  437.216228] bridge0: port 2(bridge_slave_1) entered forwarding state
[  437.230861] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  437.238657] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  437.252654] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  437.262676] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  437.273159] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  437.279683] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  437.287692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  437.297684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  437.305938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  437.317701] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  437.327491] 8021q: adding VLAN 0 to HW filter on device batadv0
[  437.720642] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:40:57 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:57 executing program 3:
poll(&(0x7f0000000200)=[{}, {}], 0x2, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x100000007, 0x0, 0x0, 0x800e00525)
ppoll(0x0, 0x1fe, 0x0, &(0x7f0000000080), 0xffffffffffffff55)
poll(&(0x7f0000000000)=[{r0, 0xc0}], 0x1, 0x0)
shutdown(r0, 0x0)

08:40:57 executing program 1:
mkdir(&(0x7f0000000100)='./file0\x00', 0x0)
sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}, 0x0)
mount(&(0x7f0000000180)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0)

08:40:57 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

08:40:57 executing program 5:
r0 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000880)=ANY=[@ANYBLOB="2800000019000103ea000000000000001f00000014000600fe8019000000000000000000f4ffffa9"], 0x1}}, 0x0)

08:40:57 executing program 2:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(&(0x7f0000000000)=[{r0, 0x2}], 0x1, 0x0)
poll(&(0x7f0000000040), 0x2000000000000014, 0x4e)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0x10101, 0x0, 0x0, 0x800e008c0)
readv(r1, &(0x7f0000000080)=[{&(0x7f0000000040)=""/53, 0x35}, {0x0}, {0x0}, {0x0}], 0x4)
shutdown(r1, 0x0)

08:40:57 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
r2 = dup(r1)
readv(r2, &(0x7f0000002700), 0x390)
shutdown(r2, 0x0)

08:40:57 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x0, 0x0, 0x0)
shmget$private(0x0, 0x1000, 0x280, &(0x7f0000ffd000/0x1000)=nil)
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00841)

08:40:57 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

08:40:57 executing program 0:
r0 = gettid()
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:57 executing program 0:
r0 = gettid()
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:57 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:57 executing program 0:
r0 = gettid()
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:40:57 executing program 0:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:40:57 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(&(0x7f0000000200), 0x2000000000000004, 0x4e)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0x100000007, 0x0, 0x0, 0x800e00525)
sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0)
readv(r1, &(0x7f0000001040)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1)
shutdown(r1, 0x0)

08:40:57 executing program 2:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0)
mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0)
r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0)
r2 = dup2(r1, r1)
read$FUSE(r2, &(0x7f0000001240), 0xffffff7b)
write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34)

08:40:57 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:40:58 executing program 1:
poll(&(0x7f0000000140), 0x2280, 0x4b)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00866)
ppoll(&(0x7f0000000040)=[{r0}, {}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

08:40:58 executing program 3:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
r2 = eventfd2(0x0, 0x0)
ioctl$KVM_IOEVENTFD(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, r2})
ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0x0)

[  438.872691] device bridge_slave_1 left promiscuous mode
[  438.880939] bridge0: port 2(bridge_slave_1) entered disabled state
[  438.943121] device bridge_slave_0 left promiscuous mode
[  438.952854] bridge0: port 1(bridge_slave_0) entered disabled state
[  439.117166] device hsr_slave_1 left promiscuous mode
[  439.158724] device hsr_slave_0 left promiscuous mode
[  439.217898] team0 (unregistering): Port device team_slave_1 removed
[  439.254988] team0 (unregistering): Port device team_slave_0 removed
[  439.282934] bond0 (unregistering): Releasing backup interface bond_slave_1
[  439.339960] bond0 (unregistering): Releasing backup interface bond_slave_0
[  439.397110] bond0 (unregistering): Released all slaves
08:40:58 executing program 5:
r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0)
write(r0, &(0x7f0000000280)="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", 0x1000)
r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0)
write$cgroup_type(r0, &(0x7f0000000240)='threaded\x00', 0xfb3f)
fallocate(r0, 0x3, 0x7fff, 0x8000)
fallocate(r1, 0x0, 0x0, 0x10001)
fsync(r0)

08:40:58 executing program 2:
r0 = openat$full(0xffffffffffffff9c, &(0x7f0000001f40)='/dev/full\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pread64(r0, &(0x7f0000002640)=""/207, 0xfffffede, 0x0)
mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0)
r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0)
r2 = dup2(r1, r1)
read$FUSE(r2, &(0x7f0000001240), 0xffffff7b)
write$FUSE_IOCTL(r2, &(0x7f0000000000)={0xfffffffffffffef9}, 0xfffffc34)

08:40:58 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000100)=""/73, 0x49}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0xfe94, 0x0, 0x0, 0x800e00659)
shutdown(r0, 0x0)
poll(&(0x7f00000001c0)=[{r1}], 0x1, 0xe1)
r2 = dup(r1)
shutdown(r2, 0x0)

08:40:58 executing program 0:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:40:58 executing program 1:
mkdir(&(0x7f0000000400)='./file1\x00', 0x0)
mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='9p\x00', 0x0, 0x0)

08:40:59 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff})
dup2(r1, r0)

08:40:59 executing program 1:

08:40:59 executing program 1:

08:40:59 executing program 5:

[  441.940264] IPVS: ftp: loaded support on port[0] = 21
[  442.424971] chnl_net:caif_netlink_parms(): no params data found
[  442.457960] bridge0: port 1(bridge_slave_0) entered blocking state
[  442.464543] bridge0: port 1(bridge_slave_0) entered disabled state
[  442.471779] device bridge_slave_0 entered promiscuous mode
[  442.478340] bridge0: port 2(bridge_slave_1) entered blocking state
[  442.484840] bridge0: port 2(bridge_slave_1) entered disabled state
[  442.491916] device bridge_slave_1 entered promiscuous mode
[  442.508921] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  442.518216] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  442.535493] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  442.542823] team0: Port device team_slave_0 added
[  442.548235] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  442.555482] team0: Port device team_slave_1 added
[  442.560868] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  442.568038] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  442.632471] device hsr_slave_0 entered promiscuous mode
[  442.670417] device hsr_slave_1 entered promiscuous mode
[  442.710769] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  442.717644] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  442.729877] bridge0: port 2(bridge_slave_1) entered blocking state
[  442.736273] bridge0: port 2(bridge_slave_1) entered forwarding state
[  442.742945] bridge0: port 1(bridge_slave_0) entered blocking state
[  442.749316] bridge0: port 1(bridge_slave_0) entered forwarding state
[  442.776666] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  442.782995] 8021q: adding VLAN 0 to HW filter on device bond0
[  442.791657] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  442.799694] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  442.807387] bridge0: port 1(bridge_slave_0) entered disabled state
[  442.814693] bridge0: port 2(bridge_slave_1) entered disabled state
[  442.825435] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  442.831890] 8021q: adding VLAN 0 to HW filter on device team0
[  442.840214] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  442.847793] bridge0: port 1(bridge_slave_0) entered blocking state
[  442.854171] bridge0: port 1(bridge_slave_0) entered forwarding state
[  442.871499] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  442.879080] bridge0: port 2(bridge_slave_1) entered blocking state
[  442.885475] bridge0: port 2(bridge_slave_1) entered forwarding state
[  442.893387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  442.901176] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  442.909334] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  442.919168] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  442.930863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  442.939593] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  442.947480] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  442.958962] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  442.968237] 8021q: adding VLAN 0 to HW filter on device batadv0
[  443.410721] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:03 executing program 1:

08:41:03 executing program 5:

08:41:03 executing program 2:

08:41:03 executing program 3:

08:41:03 executing program 0:
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:41:03 executing program 3:

08:41:03 executing program 2:

08:41:03 executing program 5:

08:41:03 executing program 1:

08:41:03 executing program 3:

08:41:03 executing program 2:

08:41:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:03 executing program 5:

08:41:03 executing program 3:

08:41:03 executing program 2:

08:41:03 executing program 1:

[  444.790430] device bridge_slave_1 left promiscuous mode
[  444.796054] bridge0: port 2(bridge_slave_1) entered disabled state
[  444.840757] device bridge_slave_0 left promiscuous mode
[  444.846227] bridge0: port 1(bridge_slave_0) entered disabled state
08:41:04 executing program 2:

08:41:04 executing program 5:

08:41:04 executing program 3:

08:41:04 executing program 1:

08:41:04 executing program 0:
r0 = gettid()
mkdir(0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:04 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  444.992238] device hsr_slave_1 left promiscuous mode
08:41:04 executing program 3:

08:41:04 executing program 2:

08:41:04 executing program 1:

[  445.044979] device hsr_slave_0 left promiscuous mode
08:41:04 executing program 5:

08:41:04 executing program 1:

[  445.112057] team0 (unregistering): Port device team_slave_1 removed
08:41:04 executing program 3:

08:41:04 executing program 2:

08:41:04 executing program 5:

[  445.175197] team0 (unregistering): Port device team_slave_0 removed
08:41:04 executing program 0:
r0 = gettid()
mkdir(0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:04 executing program 3:

08:41:04 executing program 2:

[  445.253339] bond0 (unregistering): Releasing backup interface bond_slave_1
[  445.344853] bond0 (unregistering): Releasing backup interface bond_slave_0
[  445.505612] bond0 (unregistering): Released all slaves
[  448.040280] IPVS: ftp: loaded support on port[0] = 21
[  448.435150] chnl_net:caif_netlink_parms(): no params data found
[  448.475818] bridge0: port 1(bridge_slave_0) entered blocking state
[  448.482538] bridge0: port 1(bridge_slave_0) entered disabled state
[  448.489399] device bridge_slave_0 entered promiscuous mode
[  448.496236] bridge0: port 2(bridge_slave_1) entered blocking state
[  448.502694] bridge0: port 2(bridge_slave_1) entered disabled state
[  448.509570] device bridge_slave_1 entered promiscuous mode
[  448.525385] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  448.534645] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  448.550335] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  448.557393] team0: Port device team_slave_0 added
[  448.563277] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  448.570542] team0: Port device team_slave_1 added
[  448.575735] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  448.583018] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  448.633672] device hsr_slave_0 entered promiscuous mode
[  448.670458] device hsr_slave_1 entered promiscuous mode
[  448.710747] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  448.717659] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  448.729971] bridge0: port 2(bridge_slave_1) entered blocking state
[  448.736350] bridge0: port 2(bridge_slave_1) entered forwarding state
[  448.743005] bridge0: port 1(bridge_slave_0) entered blocking state
[  448.749387] bridge0: port 1(bridge_slave_0) entered forwarding state
[  448.776781] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  448.783311] 8021q: adding VLAN 0 to HW filter on device bond0
[  448.791509] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  448.799438] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  448.807749] bridge0: port 1(bridge_slave_0) entered disabled state
[  448.824836] bridge0: port 2(bridge_slave_1) entered disabled state
[  448.835147] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  448.841248] 8021q: adding VLAN 0 to HW filter on device team0
[  448.849295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  448.856971] bridge0: port 1(bridge_slave_0) entered blocking state
[  448.863358] bridge0: port 1(bridge_slave_0) entered forwarding state
[  448.881249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  448.888794] bridge0: port 2(bridge_slave_1) entered blocking state
[  448.895201] bridge0: port 2(bridge_slave_1) entered forwarding state
[  448.903258] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  448.910907] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  448.918853] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  448.931002] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  448.940879] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  448.953692] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  448.959985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  448.967526] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  448.975026] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  448.987587] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  448.997792] 8021q: adding VLAN 0 to HW filter on device batadv0
[  449.420527] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:09 executing program 1:

08:41:09 executing program 5:

08:41:09 executing program 2:

08:41:09 executing program 3:

08:41:09 executing program 0:
r0 = gettid()
mkdir(0x0, 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:09 executing program 5:

08:41:09 executing program 3:

08:41:09 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:09 executing program 2:

08:41:09 executing program 1:

08:41:09 executing program 3:

08:41:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:09 executing program 2:

08:41:09 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:09 executing program 5:

08:41:09 executing program 1:

08:41:09 executing program 2:

08:41:09 executing program 3:

08:41:09 executing program 5:

08:41:09 executing program 1:

08:41:09 executing program 2:

08:41:09 executing program 3:

08:41:09 executing program 5:

08:41:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:09 executing program 5:

08:41:09 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:09 executing program 2:

08:41:09 executing program 1:

08:41:09 executing program 3:

08:41:10 executing program 5:

08:41:10 executing program 2:

08:41:10 executing program 1:

08:41:10 executing program 3:

08:41:10 executing program 2:

08:41:10 executing program 5:

[  450.800572] device bridge_slave_1 left promiscuous mode
[  450.806588] bridge0: port 2(bridge_slave_1) entered disabled state
[  450.885559] device bridge_slave_0 left promiscuous mode
[  450.891308] bridge0: port 1(bridge_slave_0) entered disabled state
[  451.065870] device hsr_slave_1 left promiscuous mode
[  451.127283] device hsr_slave_0 left promiscuous mode
[  451.193279] team0 (unregistering): Port device team_slave_1 removed
[  451.203752] team0 (unregistering): Port device team_slave_0 removed
[  451.212959] bond0 (unregistering): Releasing backup interface bond_slave_1
[  451.264924] bond0 (unregistering): Releasing backup interface bond_slave_0
[  451.343947] bond0 (unregistering): Released all slaves
[  454.200319] IPVS: ftp: loaded support on port[0] = 21
[  454.541265] chnl_net:caif_netlink_parms(): no params data found
[  454.585340] bridge0: port 1(bridge_slave_0) entered blocking state
[  454.592284] bridge0: port 1(bridge_slave_0) entered disabled state
[  454.599668] device bridge_slave_0 entered promiscuous mode
[  454.607281] bridge0: port 2(bridge_slave_1) entered blocking state
[  454.614007] bridge0: port 2(bridge_slave_1) entered disabled state
[  454.621325] device bridge_slave_1 entered promiscuous mode
[  454.639843] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  454.649694] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  454.668294] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  454.675930] team0: Port device team_slave_0 added
[  454.681988] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  454.689202] team0: Port device team_slave_1 added
[  454.694560] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  454.701797] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  454.762296] device hsr_slave_0 entered promiscuous mode
[  454.800395] device hsr_slave_1 entered promiscuous mode
[  454.840616] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  454.847758] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  454.861132] bridge0: port 2(bridge_slave_1) entered blocking state
[  454.867838] bridge0: port 2(bridge_slave_1) entered forwarding state
[  454.874650] bridge0: port 1(bridge_slave_0) entered blocking state
[  454.881205] bridge0: port 1(bridge_slave_0) entered forwarding state
[  454.910566] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  454.916857] 8021q: adding VLAN 0 to HW filter on device bond0
[  454.925474] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  454.934099] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  454.942006] bridge0: port 1(bridge_slave_0) entered disabled state
[  454.959137] bridge0: port 2(bridge_slave_1) entered disabled state
[  454.969197] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  454.975740] 8021q: adding VLAN 0 to HW filter on device team0
[  454.984603] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  454.992593] bridge0: port 1(bridge_slave_0) entered blocking state
[  454.999136] bridge0: port 1(bridge_slave_0) entered forwarding state
[  455.008853] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  455.016758] bridge0: port 2(bridge_slave_1) entered blocking state
[  455.023605] bridge0: port 2(bridge_slave_1) entered forwarding state
[  455.037926] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  455.046459] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  455.055908] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  455.067887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  455.078283] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  455.091174] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  455.097406] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  455.109484] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  455.119833] 8021q: adding VLAN 0 to HW filter on device batadv0
[  455.520679] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:15 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:15 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:15 executing program 1:

08:41:15 executing program 2:

08:41:15 executing program 3:

08:41:15 executing program 5:

08:41:15 executing program 2:

08:41:15 executing program 1:

08:41:15 executing program 3:
r0 = socket$kcm(0xa, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000004000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b6030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xe, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e40f02cea", 0x0, 0x100}, 0x28)
sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f0000000dc0)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80, &(0x7f0000000d40), 0x0, &(0x7f0000000000)}, 0x20004040)
close(r0)

08:41:15 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:15 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40001)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$key(0xffffffffffffffff, 0x0, 0x4008000)
r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000500, 0x0, 0x0, 0x200006ec, 0x2000071c], 0x0, &(0x7f0000000400), &(0x7f0000000500)=ANY=[]}, 0x78)
r2 = perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1)
ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, 0x0)
r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r2, 0x9)
r4 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
fcntl$lock(0xffffffffffffffff, 0x0, 0x0)
fsetxattr$security_smack_entry(r3, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockname$inet6(r5, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000300)=0x1c)
sendto$inet(r4, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000440)='veth1\x00\x06\x00\x00)\x86cJ\x0f\xef\x00', 0x10)
r6 = dup2(r4, r4)
sendmsg$alg(r6, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{}], 0x1}, 0x8005)
socket(0x4, 0x800, 0x0)
setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, 0x0, 0x0)
sendto$inet(r4, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0)
gettid()

08:41:15 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:15 executing program 1:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x5)
write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)

08:41:15 executing program 2:
r0 = socket$kcm(0x10, 0x2, 0x10)
sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000100)="2e0000002d00050ad25a80648c6356c10324fc0010000b400a000400030082c1b0acea8b0900018004021700d1bd", 0x2e}], 0x1}, 0x0)

08:41:15 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  456.524787] input: syz1 as /devices/virtual/input/input7
08:41:16 executing program 2:
r0 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000280)='system.posix_acl_access\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="0200000001000000000000000400000000000069c39e812ef36fa0c8af00100000000200"], 0x1, 0x0)

08:41:16 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:16 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:16 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:16 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:16 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(0x0, 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:16 executing program 2:
openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x0, 0x0)
eventfd(0x0)
pipe(&(0x7f0000000580))
syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x0)
perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0)

08:41:16 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:16 executing program 5:
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r0, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0)
symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r2 = socket$netlink(0x10, 0x3, 0x0)
writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:16 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:16 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:16 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:16 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  457.214652] device bridge_slave_1 left promiscuous mode
[  457.229332] bridge0: port 2(bridge_slave_1) entered disabled state
[  457.322505] device bridge_slave_0 left promiscuous mode
[  457.329449] bridge0: port 1(bridge_slave_0) entered disabled state
[  457.456872] device hsr_slave_1 left promiscuous mode
[  457.506720] device hsr_slave_0 left promiscuous mode
[  457.546722] team0 (unregistering): Port device team_slave_1 removed
[  457.559174] team0 (unregistering): Port device team_slave_0 removed
[  457.572189] bond0 (unregistering): Releasing backup interface bond_slave_1
[  457.604367] bond0 (unregistering): Releasing backup interface bond_slave_0
[  457.664618] bond0 (unregistering): Released all slaves
[  459.950183] IPVS: ftp: loaded support on port[0] = 21
[  460.256020] chnl_net:caif_netlink_parms(): no params data found
[  460.296937] bridge0: port 1(bridge_slave_0) entered blocking state
[  460.303567] bridge0: port 1(bridge_slave_0) entered disabled state
[  460.310618] device bridge_slave_0 entered promiscuous mode
[  460.317179] bridge0: port 2(bridge_slave_1) entered blocking state
[  460.323923] bridge0: port 2(bridge_slave_1) entered disabled state
[  460.331277] device bridge_slave_1 entered promiscuous mode
[  460.350366] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  460.359449] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  460.377246] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  460.387292] team0: Port device team_slave_0 added
[  460.395193] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  460.403514] team0: Port device team_slave_1 added
[  460.408673] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  460.415999] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  460.473748] device hsr_slave_0 entered promiscuous mode
[  460.510447] device hsr_slave_1 entered promiscuous mode
[  460.570722] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  460.582066] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  460.596179] bridge0: port 2(bridge_slave_1) entered blocking state
[  460.602543] bridge0: port 2(bridge_slave_1) entered forwarding state
[  460.609129] bridge0: port 1(bridge_slave_0) entered blocking state
[  460.615506] bridge0: port 1(bridge_slave_0) entered forwarding state
[  460.645244] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  460.651906] 8021q: adding VLAN 0 to HW filter on device bond0
[  460.660830] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  460.668737] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  460.676176] bridge0: port 1(bridge_slave_0) entered disabled state
[  460.683317] bridge0: port 2(bridge_slave_1) entered disabled state
[  460.696829] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  460.703062] 8021q: adding VLAN 0 to HW filter on device team0
[  460.711993] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  460.719572] bridge0: port 1(bridge_slave_0) entered blocking state
[  460.725953] bridge0: port 1(bridge_slave_0) entered forwarding state
[  460.734925] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  460.743109] bridge0: port 2(bridge_slave_1) entered blocking state
[  460.749441] bridge0: port 2(bridge_slave_1) entered forwarding state
[  460.758328] bridge0: port 3(gretap0) entered disabled state
[  460.766613] device gretap0 left promiscuous mode
[  460.771483] bridge0: port 3(gretap0) entered disabled state
[  460.817573] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  460.825750] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  460.834722] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  460.845439] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  460.857856] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  460.867933] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  460.874137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  460.886814] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  460.898902] 8021q: adding VLAN 0 to HW filter on device batadv0
[  460.960655] device bridge_slave_1 left promiscuous mode
[  460.966158] bridge0: port 2(bridge_slave_1) entered disabled state
[  461.010882] device bridge_slave_0 left promiscuous mode
[  461.017623] bridge0: port 1(bridge_slave_0) entered disabled state
[  461.113002] device hsr_slave_1 left promiscuous mode
[  461.144201] device hsr_slave_0 left promiscuous mode
[  461.183356] team0 (unregistering): Port device team_slave_1 removed
[  461.193988] team0 (unregistering): Port device team_slave_0 removed
[  461.203230] bond0 (unregistering): Releasing backup interface bond_slave_1
[  461.262990] bond0 (unregistering): Releasing backup interface bond_slave_0
[  461.323881] bond0 (unregistering): Released all slaves
08:41:20 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:20 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:20 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:20 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:20 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:20 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  461.389382] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:20 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:20 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:21 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0)
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:21 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:21 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:21 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:21 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:21 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  464.550583] IPVS: ftp: loaded support on port[0] = 21
[  464.926698] chnl_net:caif_netlink_parms(): no params data found
[  464.959009] bridge0: port 1(bridge_slave_0) entered blocking state
[  464.965609] bridge0: port 1(bridge_slave_0) entered disabled state
[  464.972519] device bridge_slave_0 entered promiscuous mode
[  464.979547] bridge0: port 2(bridge_slave_1) entered blocking state
[  464.986010] bridge0: port 2(bridge_slave_1) entered disabled state
[  464.993131] device bridge_slave_1 entered promiscuous mode
[  465.011525] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  465.020417] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  465.044532] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  465.051885] team0: Port device team_slave_0 added
[  465.057272] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  465.064450] team0: Port device team_slave_1 added
[  465.069609] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  465.076946] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  465.133551] device hsr_slave_0 entered promiscuous mode
[  465.170429] device hsr_slave_1 entered promiscuous mode
[  465.230625] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  465.237667] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  465.254083] bridge0: port 2(bridge_slave_1) entered blocking state
[  465.260482] bridge0: port 2(bridge_slave_1) entered forwarding state
[  465.267103] bridge0: port 1(bridge_slave_0) entered blocking state
[  465.273486] bridge0: port 1(bridge_slave_0) entered forwarding state
[  465.303483] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  465.309594] 8021q: adding VLAN 0 to HW filter on device bond0
[  465.320576] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  465.328569] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  465.336587] bridge0: port 1(bridge_slave_0) entered disabled state
[  465.343439] bridge0: port 2(bridge_slave_1) entered disabled state
[  465.357323] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  465.363709] 8021q: adding VLAN 0 to HW filter on device team0
[  465.371989] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  465.379533] bridge0: port 1(bridge_slave_0) entered blocking state
[  465.385918] bridge0: port 1(bridge_slave_0) entered forwarding state
[  465.395200] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  465.403012] bridge0: port 2(bridge_slave_1) entered blocking state
[  465.409355] bridge0: port 2(bridge_slave_1) entered forwarding state
[  465.431782] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  465.439424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  465.448659] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  465.456368] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  465.464014] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  465.475475] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  465.481613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  465.493915] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  465.504463] 8021q: adding VLAN 0 to HW filter on device batadv0
[  465.910558] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  466.040891] device bridge_slave_1 left promiscuous mode
[  466.046481] bridge0: port 2(bridge_slave_1) entered disabled state
[  466.080734] device bridge_slave_0 left promiscuous mode
[  466.086220] bridge0: port 1(bridge_slave_0) entered disabled state
[  466.152044] device bridge_slave_1 left promiscuous mode
[  466.157600] bridge0: port 2(bridge_slave_1) entered disabled state
[  466.191157] device bridge_slave_0 left promiscuous mode
[  466.196683] bridge0: port 1(bridge_slave_0) entered disabled state
[  466.332005] device hsr_slave_1 left promiscuous mode
[  466.372880] device hsr_slave_0 left promiscuous mode
[  466.433072] team0 (unregistering): Port device team_slave_1 removed
[  466.443696] team0 (unregistering): Port device team_slave_0 removed
[  466.453084] bond0 (unregistering): Releasing backup interface bond_slave_1
[  466.497106] bond0 (unregistering): Releasing backup interface bond_slave_0
[  466.573930] bond0 (unregistering): Released all slaves
[  466.662663] device hsr_slave_1 left promiscuous mode
[  466.702972] device hsr_slave_0 left promiscuous mode
[  466.743871] team0 (unregistering): Port device team_slave_1 removed
[  466.754415] team0 (unregistering): Port device team_slave_0 removed
[  466.763841] bond0 (unregistering): Releasing backup interface bond_slave_1
[  466.804667] bond0 (unregistering): Releasing backup interface bond_slave_0
[  466.864741] bond0 (unregistering): Released all slaves
08:41:26 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:26 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:26 executing program 3:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:26 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:26 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:26 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:26 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:26 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  470.240183] IPVS: ftp: loaded support on port[0] = 21
[  470.571827] IPVS: ftp: loaded support on port[0] = 21
[  470.584023] chnl_net:caif_netlink_parms(): no params data found
[  470.651658] bridge0: port 1(bridge_slave_0) entered blocking state
[  470.658098] bridge0: port 1(bridge_slave_0) entered disabled state
[  470.665341] device bridge_slave_0 entered promiscuous mode
[  470.674936] bridge0: port 2(bridge_slave_1) entered blocking state
[  470.681394] bridge0: port 2(bridge_slave_1) entered disabled state
[  470.688266] device bridge_slave_1 entered promiscuous mode
[  470.710313] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  470.719402] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  470.743203] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  470.750452] team0: Port device team_slave_0 added
[  470.757355] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  470.764656] team0: Port device team_slave_1 added
[  470.770010] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  470.786731] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  470.872579] device hsr_slave_0 entered promiscuous mode
[  470.910372] device hsr_slave_1 entered promiscuous mode
[  470.977925] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  470.985242] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  471.001057] chnl_net:caif_netlink_parms(): no params data found
[  471.028858] bridge0: port 2(bridge_slave_1) entered blocking state
[  471.035282] bridge0: port 2(bridge_slave_1) entered forwarding state
[  471.041939] bridge0: port 1(bridge_slave_0) entered blocking state
[  471.048405] bridge0: port 1(bridge_slave_0) entered forwarding state
[  471.084210] bridge0: port 1(bridge_slave_0) entered blocking state
[  471.091306] bridge0: port 1(bridge_slave_0) entered disabled state
[  471.098174] device bridge_slave_0 entered promiscuous mode
[  471.106298] bridge0: port 2(bridge_slave_1) entered blocking state
[  471.113195] bridge0: port 2(bridge_slave_1) entered disabled state
[  471.120094] device bridge_slave_1 entered promiscuous mode
[  471.140478] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  471.150569] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  471.171998] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  471.179234] team0: Port device team_slave_0 added
[  471.188647] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  471.196350] team0: Port device team_slave_1 added
[  471.206209] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  471.214371] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  471.272237] device hsr_slave_0 entered promiscuous mode
[  471.320591] device hsr_slave_1 entered promiscuous mode
[  471.370652] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  471.385641] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  471.403903] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  471.409992] 8021q: adding VLAN 0 to HW filter on device bond0
[  471.418573] bridge0: port 2(bridge_slave_1) entered blocking state
[  471.424945] bridge0: port 2(bridge_slave_1) entered forwarding state
[  471.431617] bridge0: port 1(bridge_slave_0) entered blocking state
[  471.438132] bridge0: port 1(bridge_slave_0) entered forwarding state
[  471.447241] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  471.457320] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  471.464857] bridge0: port 1(bridge_slave_0) entered disabled state
[  471.472065] bridge0: port 2(bridge_slave_1) entered disabled state
[  471.479260] bridge0: port 1(bridge_slave_0) entered disabled state
[  471.486076] bridge0: port 2(bridge_slave_1) entered disabled state
[  471.501174] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  471.507254] 8021q: adding VLAN 0 to HW filter on device team0
[  471.520770] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  471.528344] bridge0: port 1(bridge_slave_0) entered blocking state
[  471.534754] bridge0: port 1(bridge_slave_0) entered forwarding state
[  471.553104] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  471.560835] bridge0: port 2(bridge_slave_1) entered blocking state
[  471.567187] bridge0: port 2(bridge_slave_1) entered forwarding state
[  471.575089] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  471.583557] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  471.590913] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  471.601634] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  471.612400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  471.620188] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  471.630871] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  471.640915] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  471.647775] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  471.656057] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  471.663644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  471.671306] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  471.682709] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  471.688724] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  471.704419] 8021q: adding VLAN 0 to HW filter on device bond0
[  471.715705] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  471.724870] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  471.732713] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  471.739561] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  471.749098] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  471.756641] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  471.763169] 8021q: adding VLAN 0 to HW filter on device team0
[  471.772590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  471.779702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  471.787685] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  471.795587] bridge0: port 1(bridge_slave_0) entered blocking state
[  471.801985] bridge0: port 1(bridge_slave_0) entered forwarding state
[  471.811638] 8021q: adding VLAN 0 to HW filter on device batadv0
[  471.818353] device bridge_slave_1 left promiscuous mode
[  471.824048] bridge0: port 2(bridge_slave_1) entered disabled state
[  471.871634] device bridge_slave_0 left promiscuous mode
[  471.877096] bridge0: port 1(bridge_slave_0) entered disabled state
[  471.983647] device hsr_slave_1 left promiscuous mode
[  472.024206] device hsr_slave_0 left promiscuous mode
[  472.084461] team0 (unregistering): Port device team_slave_1 removed
[  472.094094] team0 (unregistering): Port device team_slave_0 removed
[  472.103478] bond0 (unregistering): Releasing backup interface bond_slave_1
08:41:31 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:31 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:31 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  472.153220] bond0 (unregistering): Releasing backup interface bond_slave_0
[  472.278558] bond0 (unregistering): Released all slaves
[  472.325059] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  472.336851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  472.350607] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  472.358747] bridge0: port 2(bridge_slave_1) entered blocking state
[  472.365145] bridge0: port 2(bridge_slave_1) entered forwarding state
[  472.382126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  472.389864] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  472.402979] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  472.409996] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  472.426852] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  472.438906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  472.446851] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  472.454737] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  472.464657] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  472.471801] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  472.479465] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  472.491060] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  472.497795] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  472.505717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  472.515667] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  472.523037] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  472.531050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  472.603487] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
08:41:32 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:32 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:32 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  472.688889] 8021q: adding VLAN 0 to HW filter on device batadv0
08:41:33 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:33 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:33 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:33 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:33 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  475.450200] IPVS: ftp: loaded support on port[0] = 21
[  475.837559] chnl_net:caif_netlink_parms(): no params data found
[  475.869863] bridge0: port 1(bridge_slave_0) entered blocking state
[  475.876414] bridge0: port 1(bridge_slave_0) entered disabled state
[  475.884651] device bridge_slave_0 entered promiscuous mode
[  475.892135] bridge0: port 2(bridge_slave_1) entered blocking state
[  475.898545] bridge0: port 2(bridge_slave_1) entered disabled state
[  475.905923] device bridge_slave_1 entered promiscuous mode
[  475.929463] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  475.938629] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  475.956901] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  475.965094] team0: Port device team_slave_0 added
[  475.970705] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  475.977746] team0: Port device team_slave_1 added
[  475.983242] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  475.990680] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  476.067724] device hsr_slave_0 entered promiscuous mode
[  476.120578] device hsr_slave_1 entered promiscuous mode
[  476.190610] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  476.197575] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  476.215777] bridge0: port 2(bridge_slave_1) entered blocking state
[  476.222163] bridge0: port 2(bridge_slave_1) entered forwarding state
[  476.228744] bridge0: port 1(bridge_slave_0) entered blocking state
[  476.235164] bridge0: port 1(bridge_slave_0) entered forwarding state
[  476.266681] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  476.272905] 8021q: adding VLAN 0 to HW filter on device bond0
[  476.281056] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  476.289020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  476.296483] bridge0: port 1(bridge_slave_0) entered disabled state
[  476.303783] bridge0: port 2(bridge_slave_1) entered disabled state
[  476.315630] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  476.321802] 8021q: adding VLAN 0 to HW filter on device team0
[  476.330159] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  476.337745] bridge0: port 1(bridge_slave_0) entered blocking state
[  476.344128] bridge0: port 1(bridge_slave_0) entered forwarding state
[  476.353942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  476.362652] bridge0: port 2(bridge_slave_1) entered blocking state
[  476.368999] bridge0: port 2(bridge_slave_1) entered forwarding state
[  476.387645] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  476.395415] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  476.404571] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  476.421195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  476.428563] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  476.439032] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  476.445408] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  476.460950] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  476.470308] 8021q: adding VLAN 0 to HW filter on device batadv0
[  476.821842] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  477.390567] device bridge_slave_1 left promiscuous mode
[  477.396076] bridge0: port 2(bridge_slave_1) entered disabled state
08:41:36 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

08:41:36 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:36 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:36 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  477.451422] device bridge_slave_0 left promiscuous mode
[  477.457026] bridge0: port 1(bridge_slave_0) entered disabled state
[  477.513871] device bridge_slave_1 left promiscuous mode
[  477.522713] bridge0: port 2(bridge_slave_1) entered disabled state
[  477.592855] device bridge_slave_0 left promiscuous mode
[  477.627267] bridge0: port 1(bridge_slave_0) entered disabled state
[  477.672514] device bridge_slave_1 left promiscuous mode
[  477.678075] bridge0: port 2(bridge_slave_1) entered disabled state
[  477.744996] device bridge_slave_0 left promiscuous mode
[  477.764431] bridge0: port 1(bridge_slave_0) entered disabled state
[  478.007144] device hsr_slave_1 left promiscuous mode
[  478.054359] device hsr_slave_0 left promiscuous mode
[  478.122848] team0 (unregistering): Port device team_slave_1 removed
[  478.132833] team0 (unregistering): Port device team_slave_0 removed
[  478.142421] bond0 (unregistering): Releasing backup interface bond_slave_1
[  478.175427] bond0 (unregistering): Releasing backup interface bond_slave_0
[  478.234953] bond0 (unregistering): Released all slaves
[  478.312858] device hsr_slave_1 left promiscuous mode
[  478.356234] device hsr_slave_0 left promiscuous mode
[  478.394582] team0 (unregistering): Port device team_slave_1 removed
[  478.404885] team0 (unregistering): Port device team_slave_0 removed
[  478.414151] bond0 (unregistering): Releasing backup interface bond_slave_1
[  478.455176] bond0 (unregistering): Releasing backup interface bond_slave_0
[  478.532578] bond0 (unregistering): Released all slaves
[  478.611897] device hsr_slave_1 left promiscuous mode
[  478.672717] device hsr_slave_0 left promiscuous mode
[  478.712765] team0 (unregistering): Port device team_slave_1 removed
[  478.723033] team0 (unregistering): Port device team_slave_0 removed
[  478.732441] bond0 (unregistering): Releasing backup interface bond_slave_1
[  478.784953] bond0 (unregistering): Releasing backup interface bond_slave_0
[  478.853361] bond0 (unregistering): Released all slaves
[  482.960234] IPVS: ftp: loaded support on port[0] = 21
[  483.291377] chnl_net:caif_netlink_parms(): no params data found
[  483.298386] IPVS: ftp: loaded support on port[0] = 21
[  483.352740] bridge0: port 1(bridge_slave_0) entered blocking state
[  483.359273] bridge0: port 1(bridge_slave_0) entered disabled state
[  483.366620] device bridge_slave_0 entered promiscuous mode
[  483.375905] bridge0: port 2(bridge_slave_1) entered blocking state
[  483.382319] bridge0: port 2(bridge_slave_1) entered disabled state
[  483.389166] device bridge_slave_1 entered promiscuous mode
[  483.416280] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  483.425617] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  483.449762] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  483.457027] team0: Port device team_slave_0 added
[  483.462760] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  483.469965] team0: Port device team_slave_1 added
[  483.475785] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  483.483500] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  483.494616] IPVS: ftp: loaded support on port[0] = 21
[  483.563488] device hsr_slave_0 entered promiscuous mode
[  483.600458] device hsr_slave_1 entered promiscuous mode
[  483.682025] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  483.708429] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  483.751670] chnl_net:caif_netlink_parms(): no params data found
[  483.788359] bridge0: port 2(bridge_slave_1) entered blocking state
[  483.794815] bridge0: port 2(bridge_slave_1) entered forwarding state
[  483.801485] bridge0: port 1(bridge_slave_0) entered blocking state
[  483.807844] bridge0: port 1(bridge_slave_0) entered forwarding state
[  483.872989] bridge0: port 1(bridge_slave_0) entered blocking state
[  483.879443] bridge0: port 1(bridge_slave_0) entered disabled state
[  483.886843] device bridge_slave_0 entered promiscuous mode
[  483.912597] bridge0: port 2(bridge_slave_1) entered blocking state
[  483.919029] bridge0: port 2(bridge_slave_1) entered disabled state
[  483.926357] device bridge_slave_1 entered promiscuous mode
[  483.944241] chnl_net:caif_netlink_parms(): no params data found
[  483.972490] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  483.982838] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  484.020857] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  484.028092] team0: Port device team_slave_0 added
[  484.047094] bridge0: port 1(bridge_slave_0) entered blocking state
[  484.053892] bridge0: port 1(bridge_slave_0) entered disabled state
[  484.061167] device bridge_slave_0 entered promiscuous mode
[  484.067685] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  484.074969] team0: Port device team_slave_1 added
[  484.081533] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  484.089621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  484.096772] bridge0: port 2(bridge_slave_1) entered blocking state
[  484.103347] bridge0: port 2(bridge_slave_1) entered disabled state
[  484.110943] device bridge_slave_1 entered promiscuous mode
[  484.193825] device hsr_slave_0 entered promiscuous mode
[  484.250416] device hsr_slave_1 entered promiscuous mode
[  484.291865] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  484.301212] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  484.309642] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  484.316810] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  484.338275] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  484.344489] 8021q: adding VLAN 0 to HW filter on device bond0
[  484.351197] bridge0: port 1(bridge_slave_0) entered disabled state
[  484.358843] bridge0: port 2(bridge_slave_1) entered disabled state
[  484.365954] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  484.374921] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  484.382191] team0: Port device team_slave_0 added
[  484.388104] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  484.395586] team0: Port device team_slave_1 added
[  484.403788] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  484.412145] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  484.420323] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  484.472684] device hsr_slave_0 entered promiscuous mode
[  484.510682] device hsr_slave_1 entered promiscuous mode
[  484.563987] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  484.573420] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  484.581785] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  484.588985] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  484.599109] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  484.606328] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  484.617008] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  484.623349] 8021q: adding VLAN 0 to HW filter on device team0
[  484.638821] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  484.650857] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  484.662028] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  484.673906] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  484.682662] bridge0: port 1(bridge_slave_0) entered blocking state
[  484.689948] bridge0: port 1(bridge_slave_0) entered forwarding state
[  484.697889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  484.706341] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  484.714296] bridge0: port 2(bridge_slave_1) entered blocking state
[  484.720758] bridge0: port 2(bridge_slave_1) entered forwarding state
[  484.744555] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  484.754892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  484.764199] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready
[  484.773252] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  484.783605] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  484.792368] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  484.799960] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  484.807975] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  484.815654] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  484.827466] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  484.835247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  484.842903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  484.852971] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  484.864283] 8021q: adding VLAN 0 to HW filter on device bond0
[  484.874294] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  484.882216] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  484.889684] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  484.899437] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  484.908701] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  484.916242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  484.925625] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  484.932656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  484.944495] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  484.953901] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  484.961318] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  484.970600] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  484.976685] 8021q: adding VLAN 0 to HW filter on device team0
[  484.989387] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  484.999378] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  485.008269] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  485.016240] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  485.023906] bridge0: port 1(bridge_slave_0) entered blocking state
[  485.030294] bridge0: port 1(bridge_slave_0) entered forwarding state
[  485.037289] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  485.045437] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  485.053057] bridge0: port 2(bridge_slave_1) entered blocking state
[  485.059408] bridge0: port 2(bridge_slave_1) entered forwarding state
[  485.070506] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
[  485.077864] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  485.087123] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  485.094855] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  485.105802] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  485.115932] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  485.123320] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  485.131606] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  485.139135] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  485.149998] 8021q: adding VLAN 0 to HW filter on device batadv0
[  485.167063] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  485.176622] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  485.185387] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
[  485.193378] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  485.208639] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  485.219901] 8021q: adding VLAN 0 to HW filter on device bond0
[  485.227123] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
[  485.235060] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  485.244855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  485.258173] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  485.271102] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  485.277157] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  485.284510] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  485.292377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  485.306024] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  485.317232] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready
[  485.326587] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  485.333488] 8021q: adding VLAN 0 to HW filter on device team0
[  485.341348] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready
[  485.348232] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  485.358273] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  485.369128] 8021q: adding VLAN 0 to HW filter on device batadv0
[  485.377559] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready
[  485.388728] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready
[  485.404602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready
[  485.419469] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  485.431142] bridge0: port 1(bridge_slave_0) entered blocking state
[  485.437534] bridge0: port 1(bridge_slave_0) entered forwarding state
[  485.445484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready
[  485.453439] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  485.461579] bridge0: port 2(bridge_slave_1) entered blocking state
[  485.467949] bridge0: port 2(bridge_slave_1) entered forwarding state
[  485.475312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready
[  485.485612] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready
08:41:44 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:44 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

08:41:44 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:44 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(0xffffffffffffffff, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  485.525767] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready
[  485.538556] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready
[  485.551623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready
[  485.585349] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready
[  485.598611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready
[  485.608177] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  485.621571] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  485.642516] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready
[  485.652422] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready
08:41:45 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  485.687028] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
08:41:45 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

[  485.757669] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready
[  485.777294] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready
08:41:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  485.804195] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  485.824362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready
[  485.832683] kobject_add_internal failed for hci1 (error: -2 parent: bluetooth)
08:41:45 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:45 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  485.867441] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready
[  485.872397] Bluetooth: Can't register HCI device
[  485.885515] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  485.900642] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
08:41:45 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  485.950362] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  486.025179] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  486.099315] 8021q: adding VLAN 0 to HW filter on device batadv0
[  486.430665] device bridge_slave_1 left promiscuous mode
[  486.436230] bridge0: port 2(bridge_slave_1) entered disabled state
08:41:45 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

08:41:45 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', 0x0, 0x0, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:45 executing program 3:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  486.491901] device bridge_slave_0 left promiscuous mode
[  486.497527] bridge0: port 1(bridge_slave_0) entered disabled state
08:41:45 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:45 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:45 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, 0x0, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:46 executing program 3:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

08:41:46 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:46 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
close(r0)

08:41:46 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, 0x0, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:46 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(&(0x7f0000000080)='./file0\x00', 0x7)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
getresuid(0x0, 0x0, 0x0)
syz_open_dev$mouse(0x0, 0x0, 0x0)
ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)

[  486.776678] device hsr_slave_1 left promiscuous mode
[  486.846561] device hsr_slave_0 left promiscuous mode
08:41:46 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:46 executing program 3 (fault-call:2 fault-nth:0):
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  486.963531] team0 (unregistering): Port device team_slave_1 removed
[  487.049870] team0 (unregistering): Port device team_slave_0 removed
[  487.098848] FAULT_INJECTION: forcing a failure.
[  487.098848] name failslab, interval 1, probability 0, space 0, times 1
[  487.137484] bond0 (unregistering): Releasing backup interface bond_slave_1
[  487.159350] CPU: 0 PID: 14745 Comm: syz-executor.3 Not tainted 4.14.130 #24
[  487.169759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  487.183057] Call Trace:
[  487.185838]  dump_stack+0x138/0x19c
[  487.189471]  should_fail.cold+0x10f/0x159
[  487.193630]  ? find_held_lock+0x35/0x130
[  487.197700]  should_failslab+0xdb/0x130
[  487.201683]  kmem_cache_alloc_node+0x56/0x780
[  487.206184]  ? lock_downgrade+0x6e0/0x6e0
[  487.210349]  __alloc_skb+0x9c/0x500
[  487.213980]  ? skb_scrub_packet+0x4b0/0x4b0
[  487.218301]  ? mgmt_index_removed+0x150/0x250
[  487.224313]  ? wait_for_completion+0x420/0x420
[  487.228916]  ? vhci_close_dev+0x50/0x50
[  487.232897]  hci_sock_dev_event+0xd2/0x560
[  487.237156]  hci_unregister_dev+0x225/0x7d0
[  487.241481]  ? vhci_close_dev+0x50/0x50
[  487.245463]  vhci_release+0x76/0xf0
[  487.249096]  __fput+0x275/0x7a0
[  487.252472]  ____fput+0x16/0x20
[  487.255754]  task_work_run+0x114/0x190
[  487.259651]  exit_to_usermode_loop+0x1da/0x220
[  487.264238]  do_syscall_64+0x4bc/0x640
[  487.268127]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  487.272977]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  487.278167] RIP: 0033:0x459519
[  487.281438] RSP: 002b:00007f57a16b8c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[  487.289176] RAX: 0000000000000000 RBX: 00007f57a16b8c90 RCX: 0000000000459519
[  487.296446] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
[  487.304102] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  487.311370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f57a16b96d4
[  487.318639] R13: 00000000004f85b2 R14: 00000000004d1370 R15: 0000000000000004
[  487.358352] bond0 (unregistering): Releasing backup interface bond_slave_0
[  487.446729] bond0 (unregistering): Released all slaves
[  489.760266] IPVS: ftp: loaded support on port[0] = 21
[  490.114975] chnl_net:caif_netlink_parms(): no params data found
[  490.148326] bridge0: port 1(bridge_slave_0) entered blocking state
[  490.155490] bridge0: port 1(bridge_slave_0) entered disabled state
[  490.162434] device bridge_slave_0 entered promiscuous mode
[  490.169078] bridge0: port 2(bridge_slave_1) entered blocking state
[  490.175562] bridge0: port 2(bridge_slave_1) entered disabled state
[  490.182805] device bridge_slave_1 entered promiscuous mode
[  490.199659] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  490.208762] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  490.225318] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  490.233423] team0: Port device team_slave_0 added
[  490.238754] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  490.245936] team0: Port device team_slave_1 added
[  490.251387] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  490.258537] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  490.323771] device hsr_slave_0 entered promiscuous mode
[  490.390614] device hsr_slave_1 entered promiscuous mode
[  490.430907] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  490.437830] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  490.451235] bridge0: port 2(bridge_slave_1) entered blocking state
[  490.457599] bridge0: port 2(bridge_slave_1) entered forwarding state
[  490.464250] bridge0: port 1(bridge_slave_0) entered blocking state
[  490.470655] bridge0: port 1(bridge_slave_0) entered forwarding state
[  490.497500] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  490.504397] 8021q: adding VLAN 0 to HW filter on device bond0
[  490.512423] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  490.521030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  490.528163] bridge0: port 1(bridge_slave_0) entered disabled state
[  490.535150] bridge0: port 2(bridge_slave_1) entered disabled state
[  490.545655] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  490.551938] 8021q: adding VLAN 0 to HW filter on device team0
[  490.560333] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  490.567910] bridge0: port 1(bridge_slave_0) entered blocking state
[  490.574284] bridge0: port 1(bridge_slave_0) entered forwarding state
[  490.585054] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  490.592747] bridge0: port 2(bridge_slave_1) entered blocking state
[  490.599070] bridge0: port 2(bridge_slave_1) entered forwarding state
[  490.613029] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  490.624751] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  490.632350] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  490.646404] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  490.656550] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  490.666783] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  490.674711] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  490.682777] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  490.690595] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  490.702449] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  490.712986] 8021q: adding VLAN 0 to HW filter on device batadv0
[  491.111355] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:51 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, 0x0, 0x0)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:51 executing program 1 (fault-call:2 fault-nth:0):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:51 executing program 2 (fault-call:3 fault-nth:0):
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:51 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:51 executing program 3 (fault-call:2 fault-nth:1):
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  492.013274] FAULT_INJECTION: forcing a failure.
[  492.013274] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[  492.026517] FAULT_INJECTION: forcing a failure.
[  492.026517] name failslab, interval 1, probability 0, space 0, times 0
[  492.032182] CPU: 1 PID: 14768 Comm: syz-executor.2 Not tainted 4.14.130 #24
[  492.044849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.044854] Call Trace:
[  492.044874]  dump_stack+0x138/0x19c
[  492.044893]  should_fail.cold+0x10f/0x159
[  492.044904]  ? __might_sleep+0x93/0xb0
[  492.044918]  __alloc_pages_nodemask+0x1d6/0x7a0
[  492.044932]  ? __alloc_pages_slowpath+0x2930/0x2930
[  492.044946]  ? __might_sleep+0x93/0xb0
[  492.044958]  ? trace_hardirqs_on+0x10/0x10
[  492.044974]  alloc_pages_current+0xec/0x1e0
[  492.044990]  __get_free_pages+0xf/0x40
[  492.045002]  mem_rw.isra.0+0x72/0x2e0
[  492.045015]  ? security_file_permission+0x89/0x1f0
[  492.045031]  mem_write+0x55/0x70
[  492.106586]  do_iter_write+0x3d3/0x540
[  492.110490]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  492.115957]  vfs_writev+0x170/0x2a0
[  492.115970]  ? vfs_iter_write+0xb0/0xb0
[  492.115992]  ? __fget+0x237/0x370
[  492.127029]  ? __fget_light+0x172/0x1f0
[  492.131020]  do_pwritev+0x15d/0x200
[  492.134658]  ? do_writev+0x2d0/0x2d0
[  492.138374]  ? SyS_preadv2+0x70/0x70
[  492.138387]  SyS_pwritev+0x31/0x40
[  492.138402]  do_syscall_64+0x1e8/0x640
[  492.138413]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  492.138431]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  492.138440] RIP: 0033:0x459519
[  492.138449] RSP: 002b:00007f74e10bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000128
[  492.174812] RAX: ffffffffffffffda RBX: 00007f74e10bec90 RCX: 0000000000459519
[  492.182091] RDX: 0000000000000001 RSI: 0000000020003980 RDI: 0000000000000005
[  492.182099] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  492.182104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f74e10bf6d4
[  492.182110] R13: 00000000004c673b R14: 00000000004db648 R15: 0000000000000006
08:41:51 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  492.214381] CPU: 0 PID: 14770 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  492.221504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.230860] Call Trace:
[  492.233462]  dump_stack+0x138/0x19c
[  492.237097]  should_fail.cold+0x10f/0x159
[  492.237115]  should_failslab+0xdb/0x130
[  492.237130]  kmem_cache_alloc_node+0x287/0x780
[  492.237149]  __alloc_skb+0x9c/0x500
[  492.249848]  ? skb_scrub_packet+0x4b0/0x4b0
[  492.249863]  ? iov_iter_init+0x63/0x1d0
[  492.249877]  vhci_write+0xb6/0x437
08:41:51 executing program 2 (fault-call:3 fault-nth:1):
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  492.249892]  __vfs_write+0x4a7/0x6b0
[  492.261783]  ? kernel_read+0x120/0x120
[  492.261807]  ? rw_verify_area+0xea/0x2b0
[  492.261820]  vfs_write+0x198/0x500
[  492.261835]  SyS_write+0xfd/0x230
[  492.261846]  ? SyS_read+0x230/0x230
[  492.261857]  ? do_syscall_64+0x53/0x640
[  492.261867]  ? SyS_read+0x230/0x230
[  492.261879]  do_syscall_64+0x1e8/0x640
[  492.261887]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  492.261903]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  492.261912] RIP: 0033:0x459519
[  492.261921] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246
08:41:51 executing program 1 (fault-call:2 fault-nth:1):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:51 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
r2 = request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0xffffffffffffffff)
keyctl$get_keyring_id(0x0, r2, 0xffffffff)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  492.269161]  ORIG_RAX: 0000000000000001
[  492.280639] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  492.280646] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  492.280651] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  492.280656] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  492.280661] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:51 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  492.394485] FAULT_INJECTION: forcing a failure.
[  492.394485] name failslab, interval 1, probability 0, space 0, times 0
08:41:51 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  492.465062] CPU: 0 PID: 14781 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  492.472256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.481618] Call Trace:
[  492.484230]  dump_stack+0x138/0x19c
[  492.487875]  should_fail.cold+0x10f/0x159
[  492.492041]  should_failslab+0xdb/0x130
[  492.496025]  kmem_cache_alloc_node_trace+0x280/0x770
[  492.501133]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  492.506588]  __kmalloc_node_track_caller+0x3d/0x80
08:41:51 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  492.511521]  __kmalloc_reserve.isra.0+0x40/0xe0
[  492.516203]  __alloc_skb+0xcf/0x500
[  492.519845]  ? skb_scrub_packet+0x4b0/0x4b0
[  492.524187]  vhci_write+0xb6/0x437
[  492.527742]  __vfs_write+0x4a7/0x6b0
[  492.531463]  ? kernel_read+0x120/0x120
[  492.535358]  ? retint_kernel+0x2d/0x2d
[  492.539255]  ? rw_verify_area+0xea/0x2b0
[  492.543365]  vfs_write+0x198/0x500
[  492.546909]  SyS_write+0xfd/0x230
[  492.550373]  ? SyS_read+0x230/0x230
[  492.554003]  ? do_syscall_64+0x53/0x640
[  492.557984]  ? SyS_read+0x230/0x230
[  492.561616]  do_syscall_64+0x1e8/0x640
[  492.565502]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  492.570355]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  492.575565] RIP: 0033:0x459519
[  492.578750] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  492.586464] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  492.593736] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  492.601012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  492.608284] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
08:41:52 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:41:52 executing program 1 (fault-call:2 fault-nth:2):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  492.608291] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:52 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbi\x86w\x02s\xd0V\x0f\x94')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x80)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:52 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  492.733160] FAULT_INJECTION: forcing a failure.
[  492.733160] name failslab, interval 1, probability 0, space 0, times 0
[  492.801020] CPU: 1 PID: 14806 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  492.808190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  492.817552] Call Trace:
[  492.817577]  dump_stack+0x138/0x19c
[  492.817598]  should_fail.cold+0x10f/0x159
[  492.817616]  should_failslab+0xdb/0x130
[  492.817633]  kmem_cache_alloc_node+0x287/0x780
[  492.817641]  ? retint_kernel+0x2d/0x2d
[  492.817656]  ? kfree_skbmem+0xac/0x120
[  492.817671]  ? mutex_trylock+0x1c0/0x1c0
[  492.817687]  __alloc_skb+0x9c/0x500
[  492.844339]  ? skb_scrub_packet+0x4b0/0x4b0
[  492.844356]  ? kmem_cache_free+0x244/0x2b0
[  492.844376]  __vhci_create_device+0x78/0x560
[  492.860596]  vhci_write+0x2a1/0x437
[  492.860614]  __vfs_write+0x4a7/0x6b0
[  492.860627]  ? kernel_read+0x120/0x120
[  492.860651]  ? rw_verify_area+0xea/0x2b0
[  492.872380]  vfs_write+0x198/0x500
[  492.872395]  SyS_write+0xfd/0x230
[  492.872408]  ? SyS_read+0x230/0x230
[  492.872420]  ? do_syscall_64+0x53/0x640
[  492.872430]  ? SyS_read+0x230/0x230
08:41:52 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
dup3(r0, r1, 0x80000)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:52 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:52 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  492.872442]  do_syscall_64+0x1e8/0x640
[  492.880365]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  492.880384]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  492.880393] RIP: 0033:0x459519
[  492.880399] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  492.880410] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  492.880419] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  492.887398] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:41:52 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  492.894972] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  492.894978] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:52 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
bind$x25(r0, &(0x7f0000000000)={0x9, @null='               \x00'}, 0x12)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:52 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:41:52 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = socket$inet6_sctp(0xa, 0x1, 0x84)
sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @loopback}, 0x3, 0x2, 0x3, 0x3}}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000280)="5b7df7e993ebaface164d7999ca2310784c6ed62685233527accf306a1a831d6b7a1454654830d2ceecdfea0cc09dc7b8dbdbab773e9ac78ea64e787b6fa7c42c964bcfa67c7f0013fd4757f0557cb3a", 0x50}], 0x1, &(0x7f0000000340)=[{0x108, 0x11f, 0x800, "a33ac90b95b6f5a97473d44c3febb123ab3cda2238d4230f99d73ba753ffd5f8ecc76f1b4ae61aa0d5d8c92f9dd00e597d44d63db37b0efe240a0bbecdde5d7db64c3f02ee486e322b47f447f702f95bccf5a0ca482d97b59e1794bfdf5272e8eff1fbb70ba2b7bb46618a972da7a4adac71c369fb9484de5ea51ea12c1909088d533ce4329e67af55e8c4208427eb5a595c55f7efa5ee67e28a77302b186608ee6036282acc06feec3d2bfaa473c92038cd3d776b65a7713ee9e685c5d83a9ec6c53c9e3ecfd5d66a7d04f3717b5429511be348201edbb1246afea1ba74e10d12f88b972498ea24a37bae5bd51fadb60bb24b19e1"}, {0x30, 0x195, 0x7, "dcc8a36f31991984ed5020634b97b02f7bf304e257bff1ed3b84444258"}, {0x10, 0x110, 0xc9a0}, {0x18, 0x29, 0x0, ')'}, {0x58, 0x114, 0x4, "dd1de23ad224c725ffebe3a0439f0648aa87b8d3408d4b5268c30e7958d75f778532c2fc82ba658e26aaf7c6c5ab74361e86583e05c169c88f4aaa0d3f62e2c839093f"}, {0xf8, 0x113, 0x80000000, "0cae4a6b7c9b82de1b6cbbaf3a946cc131862404764362c864dd4f2d3fa1a809fdd6a4b17e65f93d2a96cc79a2eff617736dfc8a5e0920fb845b1fcb5537ed234da0c95173df9eb1353bdc7c8b71000565d17468d96ae940b0ca27aa802e9559134fccb30ed1523853b696cb09d8cc0841a2bb5f2d7eb8b072bb89f66ff154a4cd70101a1e3c259fba2c1f27d70491dd05b28820f2b05660bef71700d100128858fa6bf763d4becdc544c4130df8f0c9883cbcc626a576a81d88dab85f377dc8c645e930464237b0d9ed97c1db2d03fcebe551c469f783f4c7dc985ab944898323c10de4"}, {0x30, 0x105, 0x5, "c4806c23e6f67489ecdb099e6713daaa0f703b457de07cbd7f"}, {0x68, 0x11, 0x3, "179a58ed4c5ac50ab50a626103a63d8dc88d2627ee4da4db17667b720f0c921491f8eed25cbd211cb5838c2164a74993a4c3e4306585f38dfe59297ac0f76e41f6b0a1ddae8311474e061dfffc01b35c5b5fc2276b58"}], 0x348}, 0x48000)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getresuid(&(0x7f0000004a00), &(0x7f0000004a40), &(0x7f0000004a80)=<r2=>0x0)
fsetxattr$security_capability(r0, &(0x7f00000049c0)='security.capability\x00', &(0x7f0000004ac0)=@v3={0x3000000, [{0x81, 0x80}, {0x1ff, 0x1}], r2}, 0x18, 0x1)
r3 = dup2(r0, r0)
r4 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0)
ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f00000000c0)={@bcast, @bcast, 0x2, 0x20})
r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0)
close(r0)
fcntl$getownex(r4, 0x10, &(0x7f0000002a40))
fcntl$getownex(r1, 0x10, &(0x7f0000002a80))
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002b00)={0x0, r3, 0x0, 0xa, &(0x7f0000002ac0)='/dev/cuse\x00', 0xffffffffffffffff}, 0x30)
getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000002b40), &(0x7f0000002b80)=0xc)
r6 = getpgrp(0x0)
r7 = getpgid(r6)
getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f00000028c0)={{{@in=@empty, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r8=>0x0}}, {{@in=@multicast1}, 0x0, @in=@loopback}}, &(0x7f0000000100)=0xe8)
fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, <r9=>0x0})
r10 = fcntl$getown(r4, 0x9)
setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000004b00)={0x9}, 0x4)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000004240)=<r11=>0x0)
getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000004280)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r12=>0x0}}, {{@in6=@mcast1}, 0x0, @in=@loopback}}, &(0x7f0000004380)=0xe8)
getgroups(0x5, &(0x7f00000043c0)=[0x0, 0xffffffffffffffff, <r13=>0xffffffffffffffff, 0xffffffffffffffff, 0xee01])
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000004440)={<r14=>0x0, r5, 0x0, 0x9, &(0x7f0000004400)='/dev/vcs\x00'}, 0x30)
r15 = geteuid()
getresgid(&(0x7f0000004480), &(0x7f00000044c0)=<r16=>0x0, &(0x7f0000004500))
r17 = fcntl$getown(r4, 0x9)
stat(&(0x7f0000004540)='./file0\x00', &(0x7f0000004580)={0x0, 0x0, 0x0, 0x0, <r18=>0x0})
stat(&(0x7f0000004600)='./file0\x00', &(0x7f0000004640)={0x0, 0x0, 0x0, 0x0, 0x0, <r19=>0x0})
r20 = fcntl$getown(r1, 0x9)
getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000046c0)={{{@in6=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r21=>0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f00000047c0)=0xe8)
r22 = getgid()
getsockopt$TIPC_CONN_TIMEOUT(r3, 0x10f, 0x82, &(0x7f00000029c0), &(0x7f0000002a00)=0x4)
sendmsg$netlink(r3, &(0x7f0000004980)={0x0, 0x0, &(0x7f00000041c0)=[{&(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="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"], 0x2184}, {&(0x7f0000004b40)=ANY=[@ANYBLOB="6c1200002500000225bd7000fedbdf2510123b0008007d00d52c9c485e7f55e0b0c26b245c5c06d754d1aaa313e6ce570c9b3893c406cf8e63f570fc1c5998", @ANYRES32=r7, @ANYBLOB="0400490008001300", @ANYRES32=r8, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="0000006a5c562b24e80aee0040f2976f675ea47650326884aeebe3cba16f71153750fec8194cfd510611d44c9a08e7"], 0x124c}, {&(0x7f0000003c40)={0xcc, 0x3d, 0x704, 0x70bd26, 0x25dfdbfe, "", [@generic="b96b918b8179606bb05ee0dd967623386613d4b8b3d841e09c71bb5757803c6983a4b7e610b47ba674f73ce2bf5f081e8fec1b0ba07fb64797864de3e0f560322736b5127a0d821e7cec608dfde72b1e5594a030d77007051ebb8c4980dc5d89b7", @generic="d6b8d742e0ef1aa7c484974f49d3995627bbd7d683e179ae3594ca3887cb0e406848d462fe6089d493078cb96d3f4980005d2e532f35689b04d02fbc6a8f630e93944e", @nested={0xc, 0x5f, [@typed={0x8, 0x93, @ipv4=@empty}]}, @typed={0x8, 0x6d, @pid=r10}, @typed={0x4, 0x6e}]}, 0xcc}, {&(0x7f0000000180)={0x34, 0x3e, 0x300, 0x70bd25, 0x25dfdbfe, "", [@typed={0x14, 0x3f, @ipv6=@rand_addr="88e3281a13d2ad3557e752a1b6027d7b"}, @typed={0x4, 0x4b}, @typed={0xc, 0x5d, @u64=0x200}]}, 0x34}, {&(0x7f0000003d40)={0x184, 0x35, 0x400, 0x70bd25, 0x25dfdbff, "", [@generic="e47413aa81064f53bfcaec98e1faf22c28a38e9d6d000bb6899725b540fb7df9700dfdfe33ba6059531913bf89dfcf9e16bafab154eda5e978428e38cdf772c3a01f8fa4e07867", @nested={0x28, 0x40, [@typed={0x24, 0xf, @binary="692fa5c827423d807e45614fdee497f69b9610f80a0cf2a4faa3f9b66be3"}]}, @typed={0xc, 0x21, @u64=0xed6}, @generic="9b54073fa796e988752bbac307d896d29c422146e16f12b890ea9a00159d6fdc4ddba4097dbd2fc80b7607f82d389d3bf4fb532a5299304b22abfe70344ff3bd1351c8d63b38505a25969934279b58bae6c05b66ccbac2a74e5de9bed795a49ae559772f4c7a71404c13bbd4e0eb4635e3d790d77be030", @typed={0x80, 0x21, @binary="bd55bf032b00aa88099d524aac640d114224e61b6a053e99ad7ddd3d59792b8cea4fc500d90960aa45d6c3b09376ec22e809001ff7fb600a242d856fabcb3de43880a93ee00413cebdcb9c02175a09aaf95b1740f35d0d2b412095e3edc7f411fadc93a73a1d38d2bf5e452b30614880d61a330d43785cb4cb"}]}, 0x184}, {&(0x7f0000003f00)={0x28c, 0x27, 0x0, 0x70bd26, 0x25dfdbff, "", [@typed={0x8, 0x39, @u32=0x2}, @generic="d4832189b46444a33ffef48c114c55cbe7dbee29a158374fef369667716933f29f967bfb59e750f6bb9fa70baca4a02beef0e7cbe4c66070457dda8f80d7f21c5a09ccd8913faee49defad2743d1f40f8bed6cf45ebe6bbab8f28fb2de7bbebd5a6fcc85293a43dfca177adb68d9ea6ab2798d278d16066576c18900992e031b8a7bd076fff3fd9c11618b3d4e6839c870ce001a256ae2d77796d5068a4e6995af3a756ae4be76bfea87d36908cc9df5c9b0f7c5a5a5f876aa0411a0d818134e26bf1906f0eac627cb5b36e7c14ddcc1b28ffc5ce62b139d", @generic="ab4fd1b0", @generic="317b7b912f2013fe256f261d4bf9c729106b4181242d9100dd3bf4c92a49a220d9a261a6753b516f04c1a2cf55d16fca1fb899ad6f5096e4f99886c8b7", @typed={0x14, 0x76, @ipv6=@loopback}, @nested={0x9c, 0x2e, [@generic="adef909d51893081d85f6433c787b96726e8a652b59093206a72f331f779a8256ce4b8615b1e7632bad9ed3dc38aa7e85912960d5122dbd58a7a2ef1aa628a997a02191b0368d501ff731f924ed2480d4e716c313084304ef617c2f21f206b5c586a2de98bd3cc8962230da85b1536fdfdfaba5257c71b6c605537aa32e6337190383314aa8aff6ab355a6921bfaa429b2b73a9b9120"]}, @typed={0xc, 0x8f, @u64=0x2}, @typed={0x9c, 0x18, @binary="763f90d3d24dfba66d9bfba6b0dcd55831addc47b97668a1bc3c05743aeb09c4632b27c54a2c1d89a940d09901f56b693703c76a55b77018e5173ededba1152fb5f6501ae22d456bc9f13c11e27c83a6af09d979f0684859b21db1f98b298177331ce39aee6c8534537b0808c58c60d5a5836507603ad72bcef5100a0c42477653802d0d690f24b756e730c28886c0c92cec2b001fa801cd"}]}, 0x28c}], 0x6, &(0x7f0000004800)=[@rights={{0x1c, 0x1, 0x1, [r4, r4, r0]}}, @cred={{0x1c, 0x1, 0x2, {r11, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17, r18, r19}}}, @rights={{0x2c, 0x1, 0x1, [r5, r1, r3, r5, r5, r0, r5]}}, @cred={{0x1c, 0x1, 0x2, {r20, r21, r22}}}, @rights={{0x14, 0x1, 0x1, [r1]}}, @rights={{0x2c, 0x1, 0x1, [r1, r3, r5, r4, r0, r4, r1]}}, @rights={{0x18, 0x1, 0x1, [r0, r3]}}, @rights={{0x24, 0x1, 0x1, [r3, r0, r3, r1, r5]}}], 0x158, 0x4000001}, 0x4004000)

[  493.302878] device bridge_slave_1 left promiscuous mode
[  493.318002] bridge0: port 2(bridge_slave_1) entered disabled state
[  493.391580] device bridge_slave_0 left promiscuous mode
[  493.397196] bridge0: port 1(bridge_slave_0) entered disabled state
[  493.513508] device hsr_slave_1 left promiscuous mode
[  493.563744] device hsr_slave_0 left promiscuous mode
[  493.603127] team0 (unregistering): Port device team_slave_1 removed
[  493.614912] team0 (unregistering): Port device team_slave_0 removed
[  493.624631] bond0 (unregistering): Releasing backup interface bond_slave_1
[  493.685352] bond0 (unregistering): Releasing backup interface bond_slave_0
[  493.768231] bond0 (unregistering): Released all slaves
[  496.350184] IPVS: ftp: loaded support on port[0] = 21
[  496.744499] chnl_net:caif_netlink_parms(): no params data found
[  496.777241] bridge0: port 1(bridge_slave_0) entered blocking state
[  496.783813] bridge0: port 1(bridge_slave_0) entered disabled state
[  496.791134] device bridge_slave_0 entered promiscuous mode
[  496.797684] bridge0: port 2(bridge_slave_1) entered blocking state
[  496.804338] bridge0: port 2(bridge_slave_1) entered disabled state
[  496.811511] device bridge_slave_1 entered promiscuous mode
[  496.830370] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  496.839060] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  496.855306] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  496.862631] team0: Port device team_slave_0 added
[  496.867974] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  496.875305] team0: Port device team_slave_1 added
[  496.880691] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  496.887861] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  496.952481] device hsr_slave_0 entered promiscuous mode
[  496.990332] device hsr_slave_1 entered promiscuous mode
[  497.050542] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  497.057411] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  497.071498] bridge0: port 2(bridge_slave_1) entered blocking state
[  497.077848] bridge0: port 2(bridge_slave_1) entered forwarding state
[  497.084534] bridge0: port 1(bridge_slave_0) entered blocking state
[  497.090943] bridge0: port 1(bridge_slave_0) entered forwarding state
[  497.118367] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  497.124900] 8021q: adding VLAN 0 to HW filter on device bond0
[  497.133696] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  497.143883] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  497.150892] bridge0: port 1(bridge_slave_0) entered disabled state
[  497.157484] bridge0: port 2(bridge_slave_1) entered disabled state
[  497.174059] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  497.180302] 8021q: adding VLAN 0 to HW filter on device team0
[  497.188479] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  497.196536] bridge0: port 1(bridge_slave_0) entered blocking state
[  497.202938] bridge0: port 1(bridge_slave_0) entered forwarding state
[  497.221373] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  497.228961] bridge0: port 2(bridge_slave_1) entered blocking state
[  497.235377] bridge0: port 2(bridge_slave_1) entered forwarding state
[  497.243266] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  497.251238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  497.259193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  497.267935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  497.279986] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  497.290554] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  497.296923] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  497.304335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  497.316471] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  497.327147] 8021q: adding VLAN 0 to HW filter on device batadv0
[  497.730636] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:41:57 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:57 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

08:41:57 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f0000000000))
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:57 executing program 1 (fault-call:2 fault-nth:3):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:57 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x111800)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x0)
close(r0)
r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x6, 0x40)
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@empty, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8)
connect$can_bcm(r1, &(0x7f0000000200)={0x1d, r2}, 0x10)

08:41:57 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:41:57 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

08:41:57 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  498.552058] FAULT_INJECTION: forcing a failure.
[  498.552058] name failslab, interval 1, probability 0, space 0, times 0
08:41:58 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000080)=0x100000)
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000200))
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=<r2=>0x0)
ioctl$EVIOCGVERSION(r1, 0x80044501, &(0x7f0000000700)=""/227)
syz_open_procfs(r2, &(0x7f00000002c0)='net/stat\x00')
pwritev(r0, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
r3 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x9, 0x101002)
fcntl$notify(r3, 0x402, 0x0)

[  498.598289] CPU: 0 PID: 14862 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  498.605447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  498.605453] Call Trace:
[  498.605475]  dump_stack+0x138/0x19c
[  498.605495]  should_fail.cold+0x10f/0x159
[  498.625189]  should_failslab+0xdb/0x130
[  498.629182]  kmem_cache_alloc_node_trace+0x280/0x770
[  498.634300]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  498.639769]  __kmalloc_node_track_caller+0x3d/0x80
[  498.644707]  __kmalloc_reserve.isra.0+0x40/0xe0
[  498.644723]  __alloc_skb+0xcf/0x500
[  498.644734]  ? skb_scrub_packet+0x4b0/0x4b0
[  498.644751]  __vhci_create_device+0x78/0x560
[  498.644763]  vhci_write+0x2a1/0x437
[  498.653055]  __vfs_write+0x4a7/0x6b0
[  498.661770]  ? kernel_read+0x120/0x120
[  498.661795]  ? rw_verify_area+0xea/0x2b0
[  498.661808]  vfs_write+0x198/0x500
[  498.661821]  SyS_write+0xfd/0x230
[  498.661832]  ? SyS_read+0x230/0x230
[  498.661847]  ? do_syscall_64+0x53/0x640
[  498.673038]  ? SyS_read+0x230/0x230
08:41:58 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

[  498.673052]  do_syscall_64+0x1e8/0x640
[  498.673061]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  498.673079]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  498.673088] RIP: 0033:0x459519
[  498.673097] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246
[  498.680675]  ORIG_RAX: 0000000000000001
[  498.680682] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  498.680688] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  498.680693] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:41:58 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x9, 0x7fffffff, 0x3})

08:41:58 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  498.680699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  498.680705] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:58 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:58 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:58 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x0, 0x0)
r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00')
sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x50, r2, 0x302, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x29}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xdc}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V4={0x8, 0x8, @rand_addr=0x1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x50}, 0x1, 0x0, 0x0, 0x94}, 0x4008840)
ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000000240))

08:41:58 executing program 1 (fault-call:2 fault-nth:4):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:58 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x4000, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\x92\x93\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\x16\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  498.965795] FAULT_INJECTION: forcing a failure.
[  498.965795] name failslab, interval 1, probability 0, space 0, times 0
[  499.009788] CPU: 0 PID: 14903 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  499.016950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  499.026302] Call Trace:
[  499.026326]  dump_stack+0x138/0x19c
[  499.026348]  should_fail.cold+0x10f/0x159
[  499.026367]  should_failslab+0xdb/0x130
[  499.040671]  kmem_cache_alloc_trace+0x2e9/0x790
[  499.045360]  hci_alloc_dev+0x43/0x1c60
[  499.049256]  __vhci_create_device+0xf1/0x560
[  499.053670]  vhci_write+0x2a1/0x437
[  499.053685]  __vfs_write+0x4a7/0x6b0
[  499.053698]  ? kernel_read+0x120/0x120
[  499.053719]  ? rw_verify_area+0xea/0x2b0
[  499.061055]  vfs_write+0x198/0x500
[  499.061070]  SyS_write+0xfd/0x230
[  499.061081]  ? SyS_read+0x230/0x230
[  499.061093]  ? do_syscall_64+0x53/0x640
[  499.061103]  ? SyS_read+0x230/0x230
[  499.061114]  do_syscall_64+0x1e8/0x640
[  499.091100]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  499.096053]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  499.101245] RIP: 0033:0x459519
[  499.104435] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  499.112180] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  499.119450] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  499.126703] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  499.133955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  499.141207] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:58 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0xfffffffffffffdab)
close(r0)

08:41:58 executing program 5:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:58 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x700, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3f}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4004040}, 0x8000)
r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="26f2bea1ee39d6343c5b4d", 0xb, 0xffffffffffffffff)
r3 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$link(0x8, r2, r3)
r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r4, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:41:58 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x0, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:41:58 executing program 0:
gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r0, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(0x0, 0x4)
write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r0, &(0x7f0000003000), 0x1000)
ioctl$int_in(r0, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r0, &(0x7f0000000480), 0x1000)

08:41:58 executing program 1 (fault-call:2 fault-nth:5):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:41:58 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
ioctl$BINDER_SET_CONTEXT_MGR_EXT(0xffffffffffffffff, 0x4018620d, &(0x7f00000000c0)={0x73622a85, 0x1, 0x1})

[  499.390925] FAULT_INJECTION: forcing a failure.
[  499.390925] name failslab, interval 1, probability 0, space 0, times 0
[  499.440910] device bridge_slave_1 left promiscuous mode
[  499.446455] bridge0: port 2(bridge_slave_1) entered disabled state
[  499.473344] CPU: 1 PID: 14916 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  499.480513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
08:41:58 executing program 5:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:41:58 executing program 2:
getpgrp(0xffffffffffffffff)
getpgrp(0xffffffffffffffff)
r0 = getpgrp(0x0)
r1 = syz_open_procfs(r0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980), 0x0, 0x0)

[  499.480518] Call Trace:
[  499.480540]  dump_stack+0x138/0x19c
[  499.480563]  should_fail.cold+0x10f/0x159
[  499.480584]  should_failslab+0xdb/0x130
[  499.480600]  __kmalloc+0x2f0/0x7a0
[  499.480616]  ? vsnprintf+0x290/0x1560
[  499.480633]  ? __alloc_workqueue_key+0x114/0xec0
[  499.480649]  __alloc_workqueue_key+0x114/0xec0
[  499.480658]  ? pointer+0xb10/0xb10
[  499.480676]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  499.480686]  ? scnprintf+0x100/0x100
[  499.480700]  ? ida_remove+0x230/0x230
[  499.480717]  hci_register_dev+0x1a7/0x810
[  499.480727]  ? hci_init_sysfs+0x7c/0xa0
[  499.480743]  __vhci_create_device+0x2a6/0x560
[  499.480757]  vhci_write+0x2a1/0x437
[  499.480773]  __vfs_write+0x4a7/0x6b0
[  499.480786]  ? kernel_read+0x120/0x120
[  499.480813]  ? rw_verify_area+0xea/0x2b0
[  499.496479]  vfs_write+0x198/0x500
[  499.496495]  SyS_write+0xfd/0x230
[  499.496506]  ? SyS_read+0x230/0x230
[  499.496521]  ? do_syscall_64+0x53/0x640
[  499.504634]  ? SyS_read+0x230/0x230
[  499.504651]  do_syscall_64+0x1e8/0x640
08:41:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000080)=@assoc_value, &(0x7f00000000c0)=0x8)
ioctl$VIDIOC_S_MODULATOR(r0, 0x40445637, &(0x7f0000000000)={0xfffffffffffffffa, "b3eb989dbb5450daed3759262b1d202212456f31f7cdbee274641035bd06793c", 0x200, 0x6, 0x80, 0x4, 0x3})
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  499.504660]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  499.504676]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  499.511993] RIP: 0033:0x459519
[  499.512000] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  499.512012] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  499.512018] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  499.512024] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  499.512029] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  499.512034] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:41:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000000)={<r3=>0x0, 0xa3, "3892e86f47194c17cbafd74a82f736f2cebcf04685c4da3981632803b3dbc86f7ec99070ba27a5aec10cc0224564ab6e991a5351b2600a85f7df4564b78a77717c054ec15da6736a914ab74b568a923bfbc397761ee447dfb8aef780c566db222ff11db81e9885e7ddf144320629292330f7870147f9e422f409c2e95137ceafe204d2629dfa0a7eac1718dfd58f9639193d838e19eb374e12893d2bc3bb48ed628498"}, &(0x7f00000000c0)=0xab)
setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000140)={r3, 0x8, 0x0, 0x2}, 0x10)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  499.664984] device bridge_slave_0 left promiscuous mode
[  499.674258] bridge0: port 1(bridge_slave_0) entered disabled state
08:41:59 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x0)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:41:59 executing program 5:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  499.749526] Bluetooth: Can't register HCI device
08:41:59 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f00000000c0))
close(r0)

08:41:59 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
fstat(r1, &(0x7f0000000000))

[  499.903413] device hsr_slave_1 left promiscuous mode
[  499.955006] device hsr_slave_0 left promiscuous mode
[  500.006611] team0 (unregistering): Port device team_slave_1 removed
[  500.034698] team0 (unregistering): Port device team_slave_0 removed
[  500.059595] bond0 (unregistering): Releasing backup interface bond_slave_1
[  500.104570] bond0 (unregistering): Releasing backup interface bond_slave_0
[  500.217928] bond0 (unregistering): Released all slaves
[  502.700223] IPVS: ftp: loaded support on port[0] = 21
[  503.076495] chnl_net:caif_netlink_parms(): no params data found
[  503.108850] bridge0: port 1(bridge_slave_0) entered blocking state
[  503.115444] bridge0: port 1(bridge_slave_0) entered disabled state
[  503.122418] device bridge_slave_0 entered promiscuous mode
[  503.129092] bridge0: port 2(bridge_slave_1) entered blocking state
[  503.135791] bridge0: port 2(bridge_slave_1) entered disabled state
[  503.142843] device bridge_slave_1 entered promiscuous mode
[  503.161167] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  503.169919] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  503.186883] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  503.194188] team0: Port device team_slave_0 added
[  503.199580] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  503.206809] team0: Port device team_slave_1 added
[  503.212222] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  503.219527] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  503.282227] device hsr_slave_0 entered promiscuous mode
[  503.320489] device hsr_slave_1 entered promiscuous mode
[  503.360524] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  503.367356] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  503.382434] bridge0: port 2(bridge_slave_1) entered blocking state
[  503.388786] bridge0: port 2(bridge_slave_1) entered forwarding state
[  503.395442] bridge0: port 1(bridge_slave_0) entered blocking state
[  503.401840] bridge0: port 1(bridge_slave_0) entered forwarding state
[  503.429156] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  503.435622] 8021q: adding VLAN 0 to HW filter on device bond0
[  503.444114] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  503.454208] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  503.461406] bridge0: port 1(bridge_slave_0) entered disabled state
[  503.467993] bridge0: port 2(bridge_slave_1) entered disabled state
[  503.477122] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  503.483302] 8021q: adding VLAN 0 to HW filter on device team0
[  503.491509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  503.499082] bridge0: port 1(bridge_slave_0) entered blocking state
[  503.505652] bridge0: port 1(bridge_slave_0) entered forwarding state
[  503.516524] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  503.524376] bridge0: port 2(bridge_slave_1) entered blocking state
[  503.530760] bridge0: port 2(bridge_slave_1) entered forwarding state
[  503.551466] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  503.559097] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  503.566776] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  503.574385] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  503.582435] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  503.591601] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  503.597733] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  503.609407] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  503.619942] 8021q: adding VLAN 0 to HW filter on device batadv0
[  504.060464] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:04 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:04 executing program 1 (fault-call:2 fault-nth:6):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:04 executing program 5:
r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:04 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x80402)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:04 executing program 2:
r0 = gettid()
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=<r1=>0x0)
r2 = syz_open_procfs(r1, &(0x7f0000000000)='attr\x00')
openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93+V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\x92wA\xd7\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb8{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8sJ\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xff\xff\xff\xff\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x98o-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@\x00'/395, 0x0, 0x0)
ptrace$getregset(0x4204, r0, 0x6, &(0x7f0000000080)={&(0x7f0000000140)=""/198, 0xc6})
r3 = syz_open_procfs(r1, &(0x7f00000000c0)='fd/4\x00')
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:04 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x0)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  504.917584] FAULT_INJECTION: forcing a failure.
[  504.917584] name failslab, interval 1, probability 0, space 0, times 0
[  504.937468] CPU: 0 PID: 14982 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  504.944616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  504.944623] Call Trace:
[  504.944647]  dump_stack+0x138/0x19c
[  504.944668]  should_fail.cold+0x10f/0x159
08:42:04 executing program 2:
r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x2)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$CAPI_REGISTER(r1, 0x400c4301, &(0x7f0000000040)={0x80000001, 0x100, 0x356})
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  504.944685]  should_failslab+0xdb/0x130
[  504.944705]  kmem_cache_alloc+0x47/0x780
[  504.944723]  ? trace_hardirqs_on_caller+0x400/0x590
[  504.944744]  __debug_object_init+0x5b8/0x8e0
[  504.944767]  ? debug_object_destroy+0x250/0x250
[  504.944779]  ? __lockdep_init_map+0x5a/0x570
[  504.944792]  debug_object_init+0x16/0x20
[  504.944802]  __init_work+0x47/0x60
[  504.944814]  hci_request_setup+0x382/0xb70
[  504.944833]  hci_alloc_dev+0x15ea/0x1c60
[  504.981978]  __vhci_create_device+0xf1/0x560
[  504.981993]  vhci_write+0x2a1/0x437
[  504.982010]  __vfs_write+0x4a7/0x6b0
[  504.982022]  ? kernel_read+0x120/0x120
[  504.982043]  ? rw_verify_area+0xea/0x2b0
[  504.982054]  vfs_write+0x198/0x500
[  504.982066]  SyS_write+0xfd/0x230
[  504.982078]  ? SyS_read+0x230/0x230
[  504.982090]  ? do_syscall_64+0x81/0x640
[  504.982099]  ? SyS_read+0x230/0x230
[  504.982110]  do_syscall_64+0x1e8/0x640
[  504.995238]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  505.002997]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  505.003006] RIP: 0033:0x459519
08:42:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/raw\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$KVM_SET_LAPIC(r0, 0x4400ae8f, &(0x7f0000000700)={"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"})
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
tee(r1, r0, 0x7, 0xa)

[  505.003011] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  505.003021] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  505.003027] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  505.003032] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  505.003037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  505.003043] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:04 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:04 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
pipe(&(0x7f0000000080))

08:42:04 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:04 executing program 1 (fault-call:2 fault-nth:7):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:04 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000140)=@HCI_ACLDATA_PKT={0x2, "e0106743dc02eff4628852c6a959df62fc347e07479efff85e952b7da2addf03012de45ac3f82df4a83cc84d5215c22154e64ee2e2b821597b98f395ec7a35a2196de4ccdd0e3f01fecccca4321675dede6fe97fd9cbdd28"}, 0x1)
close(r0)
r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x101, 0x200000)
ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000080))

08:42:04 executing program 2:
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff, 0x0, 0x18b, &(0x7f0000000040)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@'}, 0x30)
r2 = socket$nl_xfrm(0x10, 0x3, 0x6)
r3 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r4 = openat$cgroup_ro(r3, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r5 = syz_open_procfs(r0, &(0x7f0000000280)='environ\x00')
r6 = syz_open_procfs(r0, &(0x7f0000000880)='fd/\x01\x00\x86\xb0\xa9\xcal\'\x81xg\x872\x19\x98\x04c\xf3\xbdY{\x7fH\x7f\xbc\x18\xdeWF8T\xad5\xb2[\x1fO3\xb9r*]f7<xsPKN\xc5\n\x8d\aH\xed\xa8|s\x98\xe63\xf9l\xed`\xdf\x9bR\x19\x03\xe9%\x82?\xac\xf9}T\xd7\x10`?\x10N*J?\xfd\xd1\xd4\n\v\x1a\xebe\xa2\xda@V\x11\x8d\x05\x9c\xad\xdcj\xe9\xa2\xd7\x8f\x052`\x1b\f\"jNFD\\\xfb\xc0\x96\xce\xb9\xbf\x8e\f\xcc[')
stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, <r7=>0x0})
r8 = getgid()
getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000940)={{{@in6=@mcast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r9=>0x0}}, {{@in=@multicast2}}}, &(0x7f00000007c0)=0xe8)
stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, <r10=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000ac0)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r11=>0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000840)=0xe8)
r12 = getegid()
lstat(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, <r13=>0x0})
openat$md(0xffffffffffffff9c, &(0x7f0000000e80)='/dev/md0\x00', 0x200, 0x0)
fstat(0xffffffffffffff9c, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, <r14=>0x0})
sendmsg$unix(r6, &(0x7f0000000e40)={&(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000380)=[{&(0x7f0000000340)="7360e96313fcb54e7ce9c842a36ca11c5fd4cef40181eca4627499ab1e24795774332bbc02177997fc", 0x29}, {&(0x7f0000000700)="2e5ae8763e081660ebe094e7e555e90c3c8ce669af6bff9f757ea3b7abf051dc21487598c6774a49e655a216744d28db84a5f9ba22f5ce040188de8574d94ac12abebb7174086d0a7fed690d2d17d767bea6ab78b9fa8bb3dc2cbae10363582e525347d74017f0edc6fc9e422fe2145ebf75ede712f3889738b0591bbcccb079cb872588744b0c363b57bca72a4a1c41015f34d00444d35fe57f3da802fa68d3b49fa3c67827f5053fcb00", 0xab}, {0x0}], 0x3, &(0x7f0000000d00)=[@rights={{0x20, 0x1, 0x1, [r6, r4, r3, r2]}}, @rights={{0x14, 0x1, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r0, r7, r8}}}, @cred={{0x1c, 0x1, 0x2, {r0, r9, r10}}}, @rights={{0x20, 0x1, 0x1, [r4, r5, r5, r2]}}, @cred={{0x1c, 0x1, 0x2, {r0, r11, r12}}}, @rights={{0x24, 0x1, 0x1, [r3, r1, r2, r2, r1]}}, @cred={{0x1c, 0x1, 0x2, {r0, r13, r14}}}, @rights={{0x28, 0x1, 0x1, [r6, r3, r5, r5, r4, r4]}}], 0x128, 0x1}, 0x4000084)
fsetxattr$security_smack_entry(r6, &(0x7f0000000000)='security.SMACK64EXEC\x00', &(0x7f0000000240)='[\x00', 0x2, 0x3)
pwritev(r6, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
socket$inet_udp(0x2, 0x2, 0x0)
sync_file_range(r6, 0x200, 0x81, 0x1)

[  505.305257] FAULT_INJECTION: forcing a failure.
[  505.305257] name failslab, interval 1, probability 0, space 0, times 0
08:42:04 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  505.347098] CPU: 0 PID: 15016 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  505.354260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  505.363617] Call Trace:
[  505.363641]  dump_stack+0x138/0x19c
[  505.363662]  should_fail.cold+0x10f/0x159
[  505.363681]  should_failslab+0xdb/0x130
[  505.363695]  kmem_cache_alloc_trace+0x2e9/0x790
[  505.363712]  ? mark_held_locks+0xb1/0x100
[  505.363729]  ? __alloc_workqueue_key+0x114/0xec0
[  505.363744]  __alloc_workqueue_key+0x15f/0xec0
[  505.363760]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  505.363775]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  505.406030]  hci_register_dev+0x1a7/0x810
[  505.406051]  __vhci_create_device+0x2a6/0x560
[  505.406063]  vhci_write+0x2a1/0x437
[  505.406078]  __vfs_write+0x4a7/0x6b0
[  505.406090]  ? kernel_read+0x120/0x120
[  505.425938]  ? rw_verify_area+0xea/0x2b0
[  505.425953]  vfs_write+0x198/0x500
[  505.425968]  SyS_write+0xfd/0x230
[  505.425982]  ? SyS_read+0x230/0x230
[  505.440668]  ? do_syscall_64+0x53/0x640
[  505.440682]  ? SyS_read+0x230/0x230
[  505.440694]  do_syscall_64+0x1e8/0x640
[  505.440703]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  505.440721]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  505.440730] RIP: 0033:0x459519
[  505.440736] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  505.440748] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  505.440753] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  505.440759] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  505.440765] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  505.440771] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  505.461600] Bluetooth: Can't register HCI device
08:42:05 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x0)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:05 executing program 3:
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
pipe(&(0x7f0000000080))
close(0xffffffffffffffff)

08:42:05 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$TIOCSIG(r0, 0x40045436, 0x31)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:05 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:05 executing program 1 (fault-call:2 fault-nth:8):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:05 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x339)
close(r0)
r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x408040, 0x0)
write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000002c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10)
r2 = dup2(r0, r0)
ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f00000000c0)=ANY=[@ANYBLOB="04000000000000000500"/20])
socket$inet6_tcp(0xa, 0x1, 0x0)
write$FUSE_IOCTL(r2, &(0x7f0000000080)={0x20, 0x0, 0x3, {0x4be, 0x0, 0x6, 0x3}}, 0x20)

[  505.769672] FAULT_INJECTION: forcing a failure.
[  505.769672] name failslab, interval 1, probability 0, space 0, times 0
08:42:05 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x101, 0x203d, 0x3, 0x5, 0xe, 0x2, 0x5}})
ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000180)=""/74)
ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040))
write$smack_current(r0, &(0x7f0000000000)='wlan1\x00', 0x6)
syz_open_procfs(0x0, &(0x7f0000000140)='net/nfsfs\x00')
r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x200000)
ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000200)=<r2=>0x0)
timer_create(0x0, &(0x7f0000000240)={0x0, 0x38, 0x4, @tid=r2}, &(0x7f0000000280))
ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0)
readahead(r0, 0xc5a2, 0x400)

08:42:05 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:05 executing program 2:
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0)={0x0, <r0=>0x0})
r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7, 0x4000)
getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@remote, @in6=@mcast1}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000040)=0xe8)
setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2)
r2 = syz_open_procfs(r0, &(0x7f0000000200)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
dup3(r2, r2, 0x80000)
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  505.855683] CPU: 1 PID: 15038 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  505.863045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  505.872424] Call Trace:
[  505.875027]  dump_stack+0x138/0x19c
[  505.878679]  should_fail.cold+0x10f/0x159
[  505.882849]  should_failslab+0xdb/0x130
[  505.886835]  __kmalloc+0x2f0/0x7a0
[  505.890383]  ? __lock_is_held+0xb6/0x140
[  505.894460]  ? apply_wqattrs_prepare+0xad/0x960
[  505.899148]  apply_wqattrs_prepare+0xad/0x960
[  505.903653]  apply_workqueue_attrs_locked+0xa7/0x120
[  505.908768]  apply_workqueue_attrs+0x31/0x50
[  505.913180]  __alloc_workqueue_key+0x78d/0xec0
[  505.917765]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  505.922527]  ? check_preemption_disabled+0x3c/0x250
[  505.927544]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  505.932573]  hci_register_dev+0x1a7/0x810
[  505.936727]  ? __vhci_create_device+0x29e/0x560
[  505.941409]  __vhci_create_device+0x2a6/0x560
[  505.945909]  vhci_write+0x2a1/0x437
[  505.949543]  __vfs_write+0x4a7/0x6b0
[  505.953263]  ? kernel_read+0x120/0x120
[  505.957162]  ? rw_verify_area+0xea/0x2b0
[  505.961229]  vfs_write+0x198/0x500
[  505.964775]  SyS_write+0xfd/0x230
[  505.968232]  ? SyS_read+0x230/0x230
[  505.971857]  ? do_syscall_64+0x53/0x640
[  505.975829]  ? SyS_read+0x230/0x230
[  505.979458]  do_syscall_64+0x1e8/0x640
[  505.983349]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  505.988202]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  505.993389] RIP: 0033:0x459519
[  505.996576] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:42:05 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000100)=@HCI_SCODATA_PKT={0x3, "b0f9eeb939452a61b92d645b01f5ef2d45d8f20a4f7b738b79fc94bee9e936c7d69e015c942d6b156eef2fc695dab3b72ae283125d3555add80881be9a1445c38a207bfb37ff27f112"}, 0x23f)
r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x10000)
readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/177, 0xb1}, {&(0x7f0000001240)=""/130, 0x82}], 0x3)
ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000080)={0x3, 0x1, 0xff, 0x7, 'syz0\x00', 0x3})
close(r0)

[  506.004309] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  506.011584] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  506.019289] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  506.026560] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  506.034007] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:05 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x0, 0x121800)
ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f00000000c0)={0x8, 0x1, 0x3})
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  506.091397] device bridge_slave_1 left promiscuous mode
[  506.102032] bridge0: port 2(bridge_slave_1) entered disabled state
[  506.171655] device bridge_slave_0 left promiscuous mode
[  506.178640] bridge0: port 1(bridge_slave_0) entered disabled state
[  506.307298] Bluetooth: Can't register HCI device
[  506.402430] device hsr_slave_1 left promiscuous mode
[  506.422960] device hsr_slave_0 left promiscuous mode
[  506.463910] team0 (unregistering): Port device team_slave_1 removed
[  506.475941] team0 (unregistering): Port device team_slave_0 removed
[  506.485503] bond0 (unregistering): Releasing backup interface bond_slave_1
[  506.523890] bond0 (unregistering): Releasing backup interface bond_slave_0
[  506.596231] bond0 (unregistering): Released all slaves
[  508.930219] IPVS: ftp: loaded support on port[0] = 21
[  509.236711] chnl_net:caif_netlink_parms(): no params data found
[  509.269187] bridge0: port 1(bridge_slave_0) entered blocking state
[  509.275781] bridge0: port 1(bridge_slave_0) entered disabled state
[  509.283115] device bridge_slave_0 entered promiscuous mode
[  509.289709] bridge0: port 2(bridge_slave_1) entered blocking state
[  509.296449] bridge0: port 2(bridge_slave_1) entered disabled state
[  509.303507] device bridge_slave_1 entered promiscuous mode
[  509.321247] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  509.329973] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  509.348076] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  509.355389] team0: Port device team_slave_0 added
[  509.360815] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  509.367817] team0: Port device team_slave_1 added
[  509.373203] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  509.380625] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  509.444394] device hsr_slave_0 entered promiscuous mode
[  509.480484] device hsr_slave_1 entered promiscuous mode
[  509.530535] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  509.537422] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  509.551509] bridge0: port 2(bridge_slave_1) entered blocking state
[  509.557854] bridge0: port 2(bridge_slave_1) entered forwarding state
[  509.564511] bridge0: port 1(bridge_slave_0) entered blocking state
[  509.570906] bridge0: port 1(bridge_slave_0) entered forwarding state
[  509.597571] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  509.603884] 8021q: adding VLAN 0 to HW filter on device bond0
[  509.613068] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  509.621447] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  509.628490] bridge0: port 1(bridge_slave_0) entered disabled state
[  509.635355] bridge0: port 2(bridge_slave_1) entered disabled state
[  509.644445] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  509.651184] 8021q: adding VLAN 0 to HW filter on device team0
[  509.660942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  509.668487] bridge0: port 1(bridge_slave_0) entered blocking state
[  509.674887] bridge0: port 1(bridge_slave_0) entered forwarding state
[  509.690579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  509.698161] bridge0: port 2(bridge_slave_1) entered blocking state
[  509.704565] bridge0: port 2(bridge_slave_1) entered forwarding state
[  509.713077] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  509.721262] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  509.731238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  509.741217] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  509.750756] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  509.759427] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  509.766128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  509.777931] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  509.788088] 8021q: adding VLAN 0 to HW filter on device batadv0
[  510.231495] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:10 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:10 executing program 2:
r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xfffffffffffffffc, 0x80000)
syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x1, 0x8, 0x1})
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, 0xfffffffffffffffd)
socket$nl_netfilter(0x10, 0x3, 0xc)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0xff69985bee6ea7b4, 0x0)

08:42:10 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:10 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x420600)
r1 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x40, 0x840)
write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000100)={0x1, 0xffffffff}, 0x2)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:10 executing program 1 (fault-call:2 fault-nth:9):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:10 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  510.903301] FAULT_INJECTION: forcing a failure.
[  510.903301] name failslab, interval 1, probability 0, space 0, times 0
[  510.921211] CPU: 0 PID: 15094 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  510.928348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  510.937702] Call Trace:
[  510.940318]  dump_stack+0x138/0x19c
[  510.943974]  should_fail.cold+0x10f/0x159
[  510.948125]  should_failslab+0xdb/0x130
[  510.952098]  kmem_cache_alloc_trace+0x2e9/0x790
[  510.956773]  apply_wqattrs_prepare+0x16d/0x960
[  510.961346]  apply_workqueue_attrs_locked+0xa7/0x120
[  510.966434]  apply_workqueue_attrs+0x31/0x50
[  510.970830]  __alloc_workqueue_key+0x78d/0xec0
[  510.975414]  ? pointer+0xb10/0xb10
[  510.978951]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  510.983956]  ? ida_remove+0x230/0x230
[  510.987759]  hci_register_dev+0x1a7/0x810
[  510.991903]  ? hci_init_sysfs+0x7c/0xa0
[  510.995869]  __vhci_create_device+0x2a6/0x560
[  511.000360]  vhci_write+0x2a1/0x437
[  511.003981]  __vfs_write+0x4a7/0x6b0
[  511.007679]  ? kernel_read+0x120/0x120
[  511.011566]  ? selinux_file_permission+0x34d/0x480
[  511.016512]  ? selinux_file_permission+0x36f/0x480
[  511.021449]  ? rw_verify_area+0xea/0x2b0
[  511.025494]  vfs_write+0x198/0x500
[  511.029021]  SyS_write+0xfd/0x230
[  511.032468]  ? SyS_read+0x230/0x230
[  511.036083]  ? do_syscall_64+0x53/0x640
[  511.040052]  ? SyS_read+0x230/0x230
[  511.043689]  do_syscall_64+0x1e8/0x640
[  511.047572]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  511.052416]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  511.057604] RIP: 0033:0x459519
[  511.060788] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  511.068478] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  511.075730] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  511.082981] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  511.090234] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
08:42:10 executing program 2:
r0 = shmget$private(0x0, 0x4000, 0x100, &(0x7f0000ffa000/0x4000)=nil)
shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000700)=""/4096)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x2, 0x0)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:10 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:10 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x80000)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=<r1=>0x0)
fcntl$lock(r0, 0x27, &(0x7f00000000c0)={0x0, 0x1, 0x9, 0x1, r1})
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x400, 0x0)
ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0xc0145401, &(0x7f0000000140)={0x2, 0x2, 0x8000, 0x3, 0x3})
close(r0)

[  511.097484] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  511.119942] Bluetooth: Can't register HCI device
08:42:10 executing program 1 (fault-call:2 fault-nth:10):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:10 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  511.211942] QAT: Invalid ioctl
08:42:10 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@reserved})
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000000)="2afe905025c31c25a5c02b6429", 0xd)
remap_file_pages(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x1, 0xffffffffffffffff, 0x100)

[  511.233576] QAT: Invalid ioctl
08:42:10 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  511.278151] FAULT_INJECTION: forcing a failure.
[  511.278151] name failslab, interval 1, probability 0, space 0, times 0
08:42:10 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0)
getpeername$netrom(r1, &(0x7f00000000c0)={{0x3, @netrom}, [@null, @netrom, @rose, @default, @null, @remote, @default]}, &(0x7f0000000140)=0x48)

[  511.319414] CPU: 1 PID: 15116 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  511.326574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  511.335939] Call Trace:
[  511.338544]  dump_stack+0x138/0x19c
[  511.342185]  should_fail.cold+0x10f/0x159
[  511.342206]  should_failslab+0xdb/0x130
[  511.342222]  kmem_cache_alloc_node+0x287/0x780
[  511.342236]  ? unpack_profile+0x1278/0x28d0
[  511.342256]  alloc_unbound_pwq+0x486/0xbc0
[  511.342272]  apply_wqattrs_prepare+0x355/0x960
[  511.350429]  apply_workqueue_attrs_locked+0xa7/0x120
[  511.350442]  apply_workqueue_attrs+0x31/0x50
[  511.350453]  __alloc_workqueue_key+0x78d/0xec0
[  511.350464]  ? pointer+0xb10/0xb10
[  511.350479]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  511.350493]  ? ida_remove+0x230/0x230
[  511.350509]  hci_register_dev+0x1a7/0x810
[  511.350520]  ? hci_init_sysfs+0x7c/0xa0
[  511.350537]  __vhci_create_device+0x2a6/0x560
[  511.407402]  vhci_write+0x2a1/0x437
[  511.411043]  __vfs_write+0x4a7/0x6b0
[  511.414769]  ? kernel_read+0x120/0x120
08:42:10 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  511.418674]  ? rw_verify_area+0xea/0x2b0
[  511.422743]  vfs_write+0x198/0x500
[  511.426299]  SyS_write+0xfd/0x230
[  511.429766]  ? SyS_read+0x230/0x230
[  511.433399]  ? do_syscall_64+0x53/0x640
[  511.437470]  ? SyS_read+0x230/0x230
[  511.441112]  do_syscall_64+0x1e8/0x640
[  511.445008]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  511.449867]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  511.455065] RIP: 0033:0x459519
[  511.458251] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:42:10 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
r2 = getpid()
prlimit64(r2, 0x0, &(0x7f0000000140)={0x80000001, 0x9}, 0x0)
write$P9_RSETATTR(r0, &(0x7f0000000180)={0x7, 0x1b, 0x2}, 0x7)
socket$inet(0x2, 0x5, 0x3)
r3 = getpid()
sched_setparam(r3, &(0x7f0000000000)=0x4)
getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={<r4=>0x0, 0x2, 0x2}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={r4, 0x100000000}, 0x8)

[  511.465961] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  511.473234] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  511.480510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  511.487789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  511.495073] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  511.555292] Bluetooth: Can't register HCI device
08:42:11 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:11 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:11 executing program 3:
r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x0, 0x0)
recvmmsg(r0, &(0x7f0000001d00)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)=""/171, 0xab}, {&(0x7f0000000200)=""/225, 0xe1}, {&(0x7f0000000300)=""/242, 0xf2}, {&(0x7f0000000400)=""/30, 0x1e}, {&(0x7f0000000440)=""/27, 0x1b}], 0x5}, 0xe08}, {{&(0x7f0000000500)=@isdn, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/97, 0x61}, {&(0x7f0000000600)=""/33, 0x21}], 0x2, &(0x7f0000000680)=""/252, 0xfc}, 0x9}, {{&(0x7f0000000780)=@x25, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000800)=""/10, 0xa}, {&(0x7f0000000840)=""/117, 0x75}], 0x2, &(0x7f0000000900)=""/248, 0xf8}, 0x286}, {{&(0x7f0000000a00), 0x80, &(0x7f0000001c00)=[{&(0x7f0000000a80)=""/140, 0x8c}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/131, 0x83}], 0x3, &(0x7f0000001c40)=""/183, 0xb7}, 0x6}], 0x4, 0x10102, &(0x7f0000001e00))
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)
r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x18080, 0x0)
ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f00000000c0)={0x5, 0x2})
ioctl$sock_SIOCSIFBR(r2, 0x8941, &(0x7f0000001e80)=@get={0x1, &(0x7f0000001e40)=""/35, 0x303})
setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f0000001ec0)=0x3f, 0x4)

08:42:11 executing program 1 (fault-call:2 fault-nth:11):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:11 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syncfs(r0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
open$dir(&(0x7f0000000040)='./file0\x00', 0x10200, 0x40)
openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x12000, 0x0)
close(r1)
write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="300000000600000000000000000000000200000000000000060000000000000007000000000000006b657972696ee4007107e5ff51542a44e4117e6acd1a495ff53106a64f65014111837bbf050000002d984701d86bb0eac3b54c93167ffd9dc9c7bc21edc067a4607646ebaeb91976ad02137209c902fe2a3bff010000da195446a12641f9d1e56f5451be267b654f49a65bbc1013cc7cd65d1a1094f662186167862bff2fb587807fd89bcdb4a22ca926ed9c5253aaa13e087bb78b2a79bf549fddfd3668bdddb8dbb94a804e9e5d2a4b1dddaa"], 0x30)

08:42:11 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  511.757417] FAULT_INJECTION: forcing a failure.
[  511.757417] name failslab, interval 1, probability 0, space 0, times 0
08:42:11 executing program 2:
r0 = getpid()
r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/sockstat6\x00')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  511.845053] CPU: 0 PID: 15147 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  511.852208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  511.861573] Call Trace:
[  511.864171]  dump_stack+0x138/0x19c
[  511.867827]  should_fail.cold+0x10f/0x159
[  511.871986]  should_failslab+0xdb/0x130
[  511.875966]  __kmalloc+0x2f0/0x7a0
[  511.879512]  ? wait_for_completion+0x420/0x420
[  511.884101]  ? pwq_adjust_max_active+0x372/0x560
[  511.888859]  ? __alloc_workqueue_key+0x114/0xec0
[  511.893634]  __alloc_workqueue_key+0x114/0xec0
[  511.898229]  ? pointer+0xb10/0xb10
[  511.901781]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  511.906808]  ? ida_remove+0x230/0x230
[  511.910623]  hci_register_dev+0x209/0x810
[  511.914776]  ? hci_init_sysfs+0x7c/0xa0
[  511.918793]  __vhci_create_device+0x2a6/0x560
[  511.923296]  vhci_write+0x2a1/0x437
[  511.926934]  __vfs_write+0x4a7/0x6b0
[  511.930664]  ? kernel_read+0x120/0x120
[  511.934577]  ? rw_verify_area+0xea/0x2b0
[  511.938642]  vfs_write+0x198/0x500
[  511.942192]  SyS_write+0xfd/0x230
[  511.945654]  ? SyS_read+0x230/0x230
[  511.949285]  ? do_syscall_64+0x53/0x640
[  511.953266]  ? SyS_read+0x230/0x230
[  511.956898]  do_syscall_64+0x1e8/0x640
[  511.960789]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  511.965642]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  511.970835] RIP: 0033:0x459519
[  511.974024] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  511.981737] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:42:11 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
getsockopt$llc_int(r0, 0x10c, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0x4)
ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000080)="82516409b969eef00038e16df9131061299155f381846d114dcfc1f0e7adad46882b0037087aba16")
r2 = geteuid()
stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
r4 = getuid()
write$P9_RSTATu(r1, &(0x7f0000000200)={0x113, 0x7d, 0x1, {{0x0, 0xe4, 0x200, 0x2, {0x11, 0x1, 0x1}, 0x0, 0x80000001, 0x7, 0x401, 0x54, '\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80', 0x1, '&', 0x54, '\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80', 0x8, '-lowlan0'}, 0x1a, 'cpuacct.usage_percpu_user\x00', r2, r3, r4}}, 0x113)

[  511.989013] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  511.996284] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  512.003590] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  512.010871] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:11 executing program 3:
r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0)
ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f00000000c0))
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)

08:42:11 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000000080)={0x1ff, 0x7f})
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000000040)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  512.063225] Bluetooth: Can't register HCI device
[  512.090887] device bridge_slave_1 left promiscuous mode
[  512.096450] bridge0: port 2(bridge_slave_1) entered disabled state
[  512.153439] device bridge_slave_0 left promiscuous mode
[  512.164363] bridge0: port 1(bridge_slave_0) entered disabled state
[  512.342672] device hsr_slave_1 left promiscuous mode
[  512.398977] device hsr_slave_0 left promiscuous mode
[  512.444804] team0 (unregistering): Port device team_slave_1 removed
[  512.454671] team0 (unregistering): Port device team_slave_0 removed
[  512.465006] bond0 (unregistering): Releasing backup interface bond_slave_1
[  512.504971] bond0 (unregistering): Releasing backup interface bond_slave_0
[  512.586113] bond0 (unregistering): Released all slaves
[  515.050308] IPVS: ftp: loaded support on port[0] = 21
[  515.356927] chnl_net:caif_netlink_parms(): no params data found
[  515.388758] bridge0: port 1(bridge_slave_0) entered blocking state
[  515.395262] bridge0: port 1(bridge_slave_0) entered disabled state
[  515.402240] device bridge_slave_0 entered promiscuous mode
[  515.408876] bridge0: port 2(bridge_slave_1) entered blocking state
[  515.415540] bridge0: port 2(bridge_slave_1) entered disabled state
[  515.422538] device bridge_slave_1 entered promiscuous mode
[  515.439749] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  515.448861] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  515.465333] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  515.472629] team0: Port device team_slave_0 added
[  515.478011] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  515.485246] team0: Port device team_slave_1 added
[  515.490631] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  515.497816] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  515.562528] device hsr_slave_0 entered promiscuous mode
[  515.620476] device hsr_slave_1 entered promiscuous mode
[  515.660808] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  515.667731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  515.683314] bridge0: port 2(bridge_slave_1) entered blocking state
[  515.689671] bridge0: port 2(bridge_slave_1) entered forwarding state
[  515.696324] bridge0: port 1(bridge_slave_0) entered blocking state
[  515.702687] bridge0: port 1(bridge_slave_0) entered forwarding state
[  515.729883] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  515.736194] 8021q: adding VLAN 0 to HW filter on device bond0
[  515.744411] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  515.753822] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  515.761236] bridge0: port 1(bridge_slave_0) entered disabled state
[  515.767829] bridge0: port 2(bridge_slave_1) entered disabled state
[  515.778664] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  515.784812] 8021q: adding VLAN 0 to HW filter on device team0
[  515.793880] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  515.801530] bridge0: port 1(bridge_slave_0) entered blocking state
[  515.807883] bridge0: port 1(bridge_slave_0) entered forwarding state
[  515.817597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  515.825569] bridge0: port 2(bridge_slave_1) entered blocking state
[  515.831948] bridge0: port 2(bridge_slave_1) entered forwarding state
[  515.847522] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  515.855206] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  515.869477] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  515.879557] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  515.890215] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  515.896655] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  515.905255] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  515.912694] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  515.920146] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  515.933050] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  515.943705] 8021q: adding VLAN 0 to HW filter on device batadv0
[  516.340633] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:16 executing program 1 (fault-call:2 fault-nth:12):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, 0x0, 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:16 executing program 2:
r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0)
getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000040)={<r1=>0x0, 0xfffffffffffffedd, "366155c5270477045fe6bc5d661b668d14a9b66395bf6c6f3e362c9082c4c33469bc5ad6119f683f452a7dc67f787ede7c73f04b25882bbd774e11d374626d9df6353f2ecf4fe951f3a407bbafb4a0fda2927c459466a3a1b5263bab752b0741332034bc1c93f935b3a7873aa5420c9521fb148880764313ec74ad904b85c8ccf47bf0ebb3c8995b61358ef4da1b308f957bf4e87cdc98fc3c8e2f60"}, &(0x7f0000000140)=0xa4)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)={r1, 0x1}, &(0x7f00000001c0)=0x8)
r2 = syz_open_procfs(0x0, &(0x7f0000000340)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbi\x1b\x81\xe8\xbf\xa2n\f\xe8')
openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4)
sendmsg$inet6(r2, &(0x7f0000000640)={&(0x7f00000002c0)={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000300)="9d5e00688aa74d9f2598e2ee", 0xc}, {&(0x7f00000003c0)="514c73a65f3cd95956774e4dae870afeeafacd0450295f040e5c28ac11501a44b8eb4f3fa4eae685114da5aace9134ac93beaca9946ac3fd13fe1d9e786a933a1841250320f9548993982aee250b83f96e9515814eb6a4352677ef96", 0x5c}, {&(0x7f0000000700)="91e3ae65953df9cc50f8f5b2f8666ddf07ce50cbaa5656d9e75b208f5ab37d59d47431b7c750bd5e282db6c06ec4c2ef9530d716cf37143cb6c7bf357edcc7e491047bf73e3470f6a8337987b921338711f57c9deac7fe86b0c239afd937e61e5ef91e6100d06dcd5484b85bf7889495e45271a0c9154ab4cca42e2496184fa8b105ee3e4de936", 0x87}], 0x3}, 0xc1)
socket$nl_xfrm(0x10, 0x3, 0x6)
syz_extract_tcp_res$synack(&(0x7f0000000200), 0x1, 0x0)

08:42:16 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x1)
close(r0)

08:42:16 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(0x0, r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:16 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:16 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0xc0080, 0x0)
ioctl$BLKPG(r1, 0x1269, &(0x7f0000000180)={0x5, 0x5, 0xbc, &(0x7f00000000c0)="009f8d95ae5f8b7200ca973a5fdb3262f17bba1543c6313906d7c18dc0e0246dd4991c95606ee8262dc54f6b6112eb709aa7f20b91b18c377a73e245ff1f5c2e48ed24119ae40787234fde5af86a7c59aac3f903df0e6d8fd6f076c007246763f4d2b47614f34b6c61c6d3df568b17a7d279e2643ef094449e69b93e480aa998c274056414aa715115dc43a6762e039161c2dd98ef0f9d9fcf5b4f4f2ea0fe40468f8716ef7620a4355149fb301d807b3c92da929439da1ca18ad225"})

08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.089249] FAULT_INJECTION: forcing a failure.
[  517.089249] name failslab, interval 1, probability 0, space 0, times 0
[  517.105636] CPU: 1 PID: 15200 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  517.112763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  517.122138] Call Trace:
[  517.122162]  dump_stack+0x138/0x19c
[  517.122185]  should_fail.cold+0x10f/0x159
[  517.122204]  should_failslab+0xdb/0x130
[  517.122220]  __kmalloc+0x2f0/0x7a0
[  517.122233]  ? wait_for_completion+0x420/0x420
[  517.122249]  ? pwq_adjust_max_active+0x372/0x560
[  517.132607]  ? __alloc_workqueue_key+0x114/0xec0
[  517.132623]  __alloc_workqueue_key+0x114/0xec0
[  517.132637]  ? pointer+0xb10/0xb10
[  517.144741]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  517.144761]  ? ida_remove+0x230/0x230
[  517.154269]  hci_register_dev+0x209/0x810
[  517.154281]  ? hci_init_sysfs+0x7c/0xa0
08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.154296]  __vhci_create_device+0x2a6/0x560
[  517.154307]  vhci_write+0x2a1/0x437
[  517.154323]  __vfs_write+0x4a7/0x6b0
[  517.154336]  ? kernel_read+0x120/0x120
[  517.154357]  ? rw_verify_area+0xea/0x2b0
[  517.174304]  vfs_write+0x198/0x500
[  517.174319]  SyS_write+0xfd/0x230
[  517.174329]  ? SyS_read+0x230/0x230
[  517.174341]  ? do_syscall_64+0x53/0x640
[  517.174351]  ? SyS_read+0x230/0x230
[  517.174361]  do_syscall_64+0x1e8/0x640
[  517.174371]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  517.174385]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.186288] RIP: 0033:0x459519
[  517.186294] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  517.186306] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  517.186312] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  517.186321] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  517.198218] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  517.206143] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  517.233588] Bluetooth: Can't register HCI device
08:42:16 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(0x0, r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:16 executing program 1 (fault-call:2 fault-nth:13):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:16 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:16 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f0000000000)={&(0x7f0000ffd000/0x1000)=nil, 0x1000})
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.440448] FAULT_INJECTION: forcing a failure.
[  517.440448] name failslab, interval 1, probability 0, space 0, times 0
[  517.475935] CPU: 1 PID: 15228 Comm: syz-executor.1 Not tainted 4.14.130 #24
08:42:16 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.483100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  517.492466] Call Trace:
[  517.495086]  dump_stack+0x138/0x19c
[  517.498732]  should_fail.cold+0x10f/0x159
[  517.502889]  should_failslab+0xdb/0x130
[  517.506870]  __kmalloc+0x2f0/0x7a0
[  517.510422]  ? __lock_is_held+0xb6/0x140
[  517.514577]  ? apply_wqattrs_prepare+0xad/0x960
[  517.519266]  apply_wqattrs_prepare+0xad/0x960
[  517.523783]  apply_workqueue_attrs_locked+0xa7/0x120
[  517.528897]  apply_workqueue_attrs+0x31/0x50
[  517.533315]  __alloc_workqueue_key+0x78d/0xec0
[  517.537911]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  517.542956]  hci_register_dev+0x209/0x810
[  517.547115]  ? hci_init_sysfs+0x7c/0xa0
[  517.551109]  __vhci_create_device+0x2a6/0x560
[  517.555616]  vhci_write+0x2a1/0x437
[  517.559338]  __vfs_write+0x4a7/0x6b0
[  517.559352]  ? kernel_read+0x120/0x120
[  517.559372]  ? rw_verify_area+0xea/0x2b0
[  517.567172]  vfs_write+0x198/0x500
[  517.567188]  SyS_write+0xfd/0x230
[  517.567200]  ? SyS_read+0x230/0x230
[  517.567213]  ? do_syscall_64+0x53/0x640
[  517.585853]  ? SyS_read+0x230/0x230
[  517.589495]  do_syscall_64+0x1e8/0x640
[  517.593389]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  517.598248]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  517.603456] RIP: 0033:0x459519
[  517.606632] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  517.614331] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  517.621594] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  517.628875] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  517.636159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  517.643427] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  517.669058] Bluetooth: Can't register HCI device
08:42:17 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(0x0, r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:17 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, 0x0, 0x0)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:17 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000040)=0x7)
ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000000)={0x7ff, 0x4, 0xe6, 0x800000000000000, 0xffffffffffffff30, 0x95})

08:42:17 executing program 1 (fault-call:2 fault-nth:14):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:17 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x80200)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000380)=ANY=[@ANYBLOB="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"])
close(r0)
ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f00000000c0)=""/16)
ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000040))
exit(0x5)

08:42:17 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:17 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x400880, 0x0)
openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)

[  517.930238] FAULT_INJECTION: forcing a failure.
[  517.930238] name failslab, interval 1, probability 0, space 0, times 0
08:42:17 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  517.980638] device bridge_slave_1 left promiscuous mode
[  517.986678] bridge0: port 2(bridge_slave_1) entered disabled state
[  517.998328] CPU: 1 PID: 15253 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  518.005464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  518.014831] Call Trace:
[  518.017435]  dump_stack+0x138/0x19c
[  518.021092]  should_fail.cold+0x10f/0x159
[  518.025258]  should_failslab+0xdb/0x130
08:42:17 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, 0x0, 0x0)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  518.029286]  kmem_cache_alloc_trace+0x2e9/0x790
[  518.033965]  ? apply_wqattrs_prepare+0xad/0x960
[  518.038644]  apply_wqattrs_prepare+0xe1/0x960
[  518.043153]  apply_workqueue_attrs_locked+0xa7/0x120
[  518.048260]  apply_workqueue_attrs+0x31/0x50
[  518.052676]  __alloc_workqueue_key+0x78d/0xec0
[  518.057268]  ? pointer+0xb10/0xb10
[  518.060828]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  518.065938]  ? ida_remove+0x230/0x230
[  518.065957]  hci_register_dev+0x209/0x810
[  518.065969]  ? hci_init_sysfs+0x7c/0xa0
[  518.073922]  __vhci_create_device+0x2a6/0x560
[  518.073934]  vhci_write+0x2a1/0x437
[  518.073948]  __vfs_write+0x4a7/0x6b0
[  518.073961]  ? kernel_read+0x120/0x120
[  518.073982]  ? rw_verify_area+0xea/0x2b0
[  518.073993]  vfs_write+0x198/0x500
[  518.074006]  SyS_write+0xfd/0x230
[  518.074018]  ? SyS_read+0x230/0x230
[  518.074028]  ? do_syscall_64+0x53/0x640
[  518.074039]  ? SyS_read+0x230/0x230
[  518.074049]  do_syscall_64+0x1e8/0x640
[  518.074058]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  518.074081]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  518.074091] RIP: 0033:0x459519
[  518.133275] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  518.140992] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  518.148267] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  518.155542] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  518.162835] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  518.170108] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:17 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000006c0)="0e", 0xfffffffffffffe83}], 0x1, 0x0)

08:42:17 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  518.193639] device bridge_slave_0 left promiscuous mode
[  518.203951] bridge0: port 1(bridge_slave_0) entered disabled state
08:42:17 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f0000000040)="5872dd0e", 0x1}], 0x1000000000000224, 0x1004)

[  518.446226] device hsr_slave_1 left promiscuous mode
[  518.504973] device hsr_slave_0 left promiscuous mode
[  518.510548] Bluetooth: Can't register HCI device
[  518.554027] team0 (unregistering): Port device team_slave_1 removed
[  518.577781] team0 (unregistering): Port device team_slave_0 removed
[  518.606080] bond0 (unregistering): Releasing backup interface bond_slave_1
[  518.674735] bond0 (unregistering): Releasing backup interface bond_slave_0
[  518.734866] bond0 (unregistering): Released all slaves
[  521.130276] IPVS: ftp: loaded support on port[0] = 21
[  521.435720] chnl_net:caif_netlink_parms(): no params data found
[  521.468299] bridge0: port 1(bridge_slave_0) entered blocking state
[  521.474805] bridge0: port 1(bridge_slave_0) entered disabled state
[  521.482084] device bridge_slave_0 entered promiscuous mode
[  521.488660] bridge0: port 2(bridge_slave_1) entered blocking state
[  521.495304] bridge0: port 2(bridge_slave_1) entered disabled state
[  521.502335] device bridge_slave_1 entered promiscuous mode
[  521.520752] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  521.529443] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  521.547432] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  521.554698] team0: Port device team_slave_0 added
[  521.560189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  521.567241] team0: Port device team_slave_1 added
[  521.572593] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  521.579768] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  521.644719] device hsr_slave_0 entered promiscuous mode
[  521.710307] device hsr_slave_1 entered promiscuous mode
[  521.780716] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  521.787618] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  521.802600] bridge0: port 2(bridge_slave_1) entered blocking state
[  521.808958] bridge0: port 2(bridge_slave_1) entered forwarding state
[  521.815635] bridge0: port 1(bridge_slave_0) entered blocking state
[  521.822050] bridge0: port 1(bridge_slave_0) entered forwarding state
[  521.849712] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  521.856114] 8021q: adding VLAN 0 to HW filter on device bond0
[  521.865038] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  521.873454] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  521.881714] bridge0: port 1(bridge_slave_0) entered disabled state
[  521.888472] bridge0: port 2(bridge_slave_1) entered disabled state
[  521.897789] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  521.904325] 8021q: adding VLAN 0 to HW filter on device team0
[  521.914032] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  521.922028] bridge0: port 1(bridge_slave_0) entered blocking state
[  521.928380] bridge0: port 1(bridge_slave_0) entered forwarding state
[  521.937729] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  521.945575] bridge0: port 2(bridge_slave_1) entered blocking state
[  521.952003] bridge0: port 2(bridge_slave_1) entered forwarding state
[  521.967470] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  521.975097] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  521.989572] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  522.000743] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  522.012070] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  522.018906] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  522.028004] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  522.035718] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  522.044890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  522.056447] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  522.068329] 8021q: adding VLAN 0 to HW filter on device batadv0
[  522.420847] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:22 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:22 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1000013c, 0x0)

08:42:22 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:22 executing program 3:
r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400000, 0x0)
ioctl$LOOP_SET_CAPACITY(r0, 0x4c07)
write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(0xffffffffffffffff)
syz_open_procfs(0x0, &(0x7f0000000240)='fd/0\xf3xFAtz\x9b\x88\xb3\a\x04\xd7a<i^P\xd9\xf5\xaaV\x8a\xa4c\x1c\xdf\xafr\xa03?s\xde\xa2\r\xec\xe0@\xb2\xb5\xff\xf5\x8fa$[s\xf1\xd7T;<V\xec\xd1\x00C\x10RUr\x95Kk\x80e\xa9\xa6\xf6\x89v\xfa\x17?\xd7\xafb_\xf3\r_\x05\xdf\x021\x904\xb0\x85\x86\x8c\x96J\x8dI\x9d\xedz\xf0\xf9~\x85*\xb0W|p\xd9\xd4\x9aO')
r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1000, 0x50180)
ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f00000000c0))

08:42:22 executing program 1 (fault-call:2 fault-nth:15):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:22 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, 0x0, 0x0)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000340)=@HCI_SCODATA_PKT={0x3, "881190dc57ba560996b0be48e9a2762b4be01b8c7eb674ef3ac7c2e52f34be6bc4c71042e4171605f2fa6372d9a887d1e3837688ded7ed1cfdc7ed8e1a63315408475e108617d07c0096dcbffe863de5df0fbbcf1379f0f2c99e42b582154b98eb1f137673729799d6362c1b1c806777cdb63d077b4b753acd0583fbdc7ddaa6f4b59a0fab2bf47d16e5998d5b5127bd96a73f6e0667430af641d46f520d35dc62b4ab03e2fc1a276f86e429e1804dacbb3c"}, 0xa9b74625)
r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
sendto$isdn(r1, &(0x7f0000000080)={0x100000001, 0x1f, "718da23430a9eb2882a2ba375f95ebe5b32e10a974cb189b8fb113ac0c2554e5ef2da49bbe1db55b"}, 0x30, 0x48800, 0x0, 0x0)
close(r0)

08:42:22 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000000)="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")

[  523.196060] FAULT_INJECTION: forcing a failure.
[  523.196060] name failslab, interval 1, probability 0, space 0, times 0
[  523.227690] CPU: 0 PID: 15306 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  523.234831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  523.244186] Call Trace:
[  523.246805]  dump_stack+0x138/0x19c
[  523.250445]  should_fail.cold+0x10f/0x159
[  523.254597]  should_failslab+0xdb/0x130
[  523.258574]  kmem_cache_alloc_node+0x287/0x780
[  523.263163]  alloc_unbound_pwq+0x486/0xbc0
[  523.267399]  apply_wqattrs_prepare+0x355/0x960
[  523.271985]  apply_workqueue_attrs_locked+0xa7/0x120
[  523.277084]  apply_workqueue_attrs+0x31/0x50
[  523.281488]  __alloc_workqueue_key+0x78d/0xec0
[  523.286068]  ? pointer+0xb10/0xb10
[  523.289608]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  523.294667]  ? ida_remove+0x230/0x230
[  523.300935]  hci_register_dev+0x1a7/0x810
[  523.306988]  ? hci_init_sysfs+0x7c/0xa0
[  523.310966]  __vhci_create_device+0x2a6/0x560
[  523.315462]  vhci_write+0x2a1/0x437
[  523.319086]  __vfs_write+0x4a7/0x6b0
[  523.322812]  ? kernel_read+0x120/0x120
[  523.326749]  ? rw_verify_area+0xea/0x2b0
[  523.330807]  vfs_write+0x198/0x500
[  523.334346]  SyS_write+0xfd/0x230
[  523.337793]  ? SyS_read+0x230/0x230
[  523.341423]  ? do_syscall_64+0x53/0x640
[  523.345410]  ? SyS_read+0x230/0x230
[  523.349032]  do_syscall_64+0x1e8/0x640
[  523.353034]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  523.357878]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  523.363059] RIP: 0033:0x459519
[  523.366240] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  523.373943] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  523.381204] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  523.388468] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  523.395730] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  523.402993] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:22 executing program 3:
pipe(&(0x7f0000000000)={<r0=>0xffffffffffffffff})
r1 = socket$pppoe(0x18, 0x1, 0x0)
splice(r0, &(0x7f0000000300), r1, 0x0, 0x1ff, 0x0)
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r2)

08:42:22 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:22 executing program 1 (fault-call:2 fault-nth:16):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  523.475437] Bluetooth: Can't register HCI device
08:42:22 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e"}], 0x1, 0x0)
setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0xebe6}, 0x4)

08:42:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x18240)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  523.564201] FAULT_INJECTION: forcing a failure.
[  523.564201] name failslab, interval 1, probability 0, space 0, times 0
[  523.586295] CPU: 1 PID: 15332 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  523.593437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  523.602795] Call Trace:
[  523.605435]  dump_stack+0x138/0x19c
[  523.609091]  should_fail.cold+0x10f/0x159
08:42:23 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  523.613276]  should_failslab+0xdb/0x130
[  523.617262]  kmem_cache_alloc_node+0x287/0x780
[  523.621884]  alloc_unbound_pwq+0x486/0xbc0
[  523.626128]  apply_wqattrs_prepare+0x355/0x960
[  523.630728]  apply_workqueue_attrs_locked+0xa7/0x120
[  523.635843]  apply_workqueue_attrs+0x31/0x50
[  523.640259]  __alloc_workqueue_key+0x78d/0xec0
[  523.644846]  ? pointer+0xb10/0xb10
[  523.644865]  ? workqueue_sysfs_register+0x3c0/0x3c0
[  523.644883]  ? ida_remove+0x230/0x230
[  523.644900]  hci_register_dev+0x209/0x810
[  523.644918]  __vhci_create_device+0x2a6/0x560
[  523.653457]  vhci_write+0x2a1/0x437
[  523.653474]  __vfs_write+0x4a7/0x6b0
[  523.653488]  ? kernel_read+0x120/0x120
[  523.653512]  ? rw_verify_area+0xea/0x2b0
[  523.653523]  vfs_write+0x198/0x500
[  523.653536]  SyS_write+0xfd/0x230
[  523.653548]  ? SyS_read+0x230/0x230
[  523.653561]  ? do_syscall_64+0x53/0x640
[  523.695825]  ? SyS_read+0x230/0x230
[  523.699467]  do_syscall_64+0x1e8/0x640
[  523.703444]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  523.708300]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  523.713488] RIP: 0033:0x459519
[  523.716679] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  523.724396] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  523.731663] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  523.738930] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  523.746200] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  523.753470] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  523.787115] Bluetooth: Can't register HCI device
[  524.090514] device bridge_slave_1 left promiscuous mode
[  524.096088] bridge0: port 2(bridge_slave_1) entered disabled state
[  524.150808] device bridge_slave_0 left promiscuous mode
[  524.156367] bridge0: port 1(bridge_slave_0) entered disabled state
[  524.266004] device hsr_slave_1 left promiscuous mode
[  524.312715] device hsr_slave_0 left promiscuous mode
[  524.384451] team0 (unregistering): Port device team_slave_1 removed
[  524.394884] team0 (unregistering): Port device team_slave_0 removed
[  524.404335] bond0 (unregistering): Releasing backup interface bond_slave_1
[  524.443739] bond0 (unregistering): Releasing backup interface bond_slave_0
[  524.504760] bond0 (unregistering): Released all slaves
[  526.970221] IPVS: ftp: loaded support on port[0] = 21
[  527.284767] chnl_net:caif_netlink_parms(): no params data found
[  527.318954] bridge0: port 1(bridge_slave_0) entered blocking state
[  527.325436] bridge0: port 1(bridge_slave_0) entered disabled state
[  527.332753] device bridge_slave_0 entered promiscuous mode
[  527.339340] bridge0: port 2(bridge_slave_1) entered blocking state
[  527.346069] bridge0: port 2(bridge_slave_1) entered disabled state
[  527.353771] device bridge_slave_1 entered promiscuous mode
[  527.369546] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  527.378659] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  527.396858] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  527.404111] team0: Port device team_slave_0 added
[  527.409393] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  527.416580] team0: Port device team_slave_1 added
[  527.421784] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  527.428918] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  527.493759] device hsr_slave_0 entered promiscuous mode
[  527.550435] device hsr_slave_1 entered promiscuous mode
[  527.600579] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  527.607462] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  527.621570] bridge0: port 2(bridge_slave_1) entered blocking state
[  527.627932] bridge0: port 2(bridge_slave_1) entered forwarding state
[  527.634602] bridge0: port 1(bridge_slave_0) entered blocking state
[  527.641002] bridge0: port 1(bridge_slave_0) entered forwarding state
[  527.667845] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  527.674296] 8021q: adding VLAN 0 to HW filter on device bond0
[  527.682581] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  527.691262] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  527.698387] bridge0: port 1(bridge_slave_0) entered disabled state
[  527.705744] bridge0: port 2(bridge_slave_1) entered disabled state
[  527.715012] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  527.722037] 8021q: adding VLAN 0 to HW filter on device team0
[  527.730241] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  527.737831] bridge0: port 1(bridge_slave_0) entered blocking state
[  527.744215] bridge0: port 1(bridge_slave_0) entered forwarding state
[  527.760602] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  527.768144] bridge0: port 2(bridge_slave_1) entered blocking state
[  527.774559] bridge0: port 2(bridge_slave_1) entered forwarding state
[  527.783286] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  527.791058] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  527.799078] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  527.808732] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  527.818975] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  527.829556] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  527.836145] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  527.843332] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  527.855947] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  527.867143] 8021q: adding VLAN 0 to HW filter on device batadv0
[  528.280487] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  529.770515] device bridge_slave_1 left promiscuous mode
[  529.776022] bridge0: port 2(bridge_slave_1) entered disabled state
[  529.831670] device bridge_slave_0 left promiscuous mode
[  529.837174] bridge0: port 1(bridge_slave_0) entered disabled state
[  529.953796] device hsr_slave_1 left promiscuous mode
[  530.002741] device hsr_slave_0 left promiscuous mode
[  530.063694] team0 (unregistering): Port device team_slave_1 removed
[  530.073448] team0 (unregistering): Port device team_slave_0 removed
[  530.083820] bond0 (unregistering): Releasing backup interface bond_slave_1
[  530.173047] bond0 (unregistering): Releasing backup interface bond_slave_0
[  530.254668] bond0 (unregistering): Released all slaves
08:42:33 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:33 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x200080)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0)
r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil})
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x138ffc})
ioctl$KVM_NMI(r4, 0xae9a)
ioctl$KVM_RUN(r4, 0xae80, 0x0)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:33 executing program 1 (fault-call:2 fault-nth:17):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:33 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
prctl$PR_SVE_GET_VL(0x33, 0xe592)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={<r1=>0xffffffffffffffff}, 0x13f}}, 0x20)
r2 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00')
getsockname$packet(r0, &(0x7f0000000340)={0x11, 0x0, <r3=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14)
getsockopt$inet_mreqn(r0, 0x0, 0x0, &(0x7f0000000440)={@multicast1, @initdev, <r4=>0x0}, &(0x7f00000009c0)=0xffffff4b)
ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000640)={'team0\x00', <r5=>0x0})
accept4$packet(r0, &(0x7f0000000700)={0x11, 0x0, <r6=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000740)=0x14, 0x0)
sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000980)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10004000}, 0xc, &(0x7f0000000940)={&(0x7f0000000780)={0x1a4, r2, 0x20, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x13c, 0x2, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x1c, 0x4, [{0x2, 0x101, 0xb52, 0x80000001}, {0x8, 0x8001, 0xfffffffffffffffd, 0x808000}, {0x6, 0x1, 0x7ff, 0x9}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xd1}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x10001}}, {0x8, 0x6, r5}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r6}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}]}}]}, 0x1a4}}, 0x800)
write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000140)={0x6, 0x118, 0xfa00, {{0x7, 0x1, "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", 0x14, 0x6cc, 0x2, 0x3c, 0x9, 0x8001, 0x8}, r1}}, 0x120)
r7 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r8 = msgget$private(0x0, 0x410)
msgctl$IPC_RMID(r8, 0x0)
write$binfmt_elf32(r0, &(0x7f0000000a00)={{0x7f, 0x45, 0x4c, 0x46, 0x8001, 0x0, 0x6, 0x2, 0x2, 0x3, 0x6, 0x400, 0xffff, 0x38, 0x1c4, 0x200, 0xfffffffffffffffe, 0x20, 0x1, 0x100000000, 0x1, 0x3}, [{0x0, 0x5, 0x4, 0x1, 0x7, 0x4e3, 0xffffffff, 0x7}], "56d775890d", [[], [], [], [], [], [], []]}, 0x75d)
r9 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$VIDIOC_S_JPEGCOMP(r9, 0x408c563e, &(0x7f0000001180)={0x4000000000000, 0xd, 0x1f, "b4cca7cb44c46b21098e8a7cfbce051ee91d74f3845711fcb2d70166d21089b1ceb95a0bca681c2b813c5f4f85fb282807f29b219db56dd3dd50819c", 0x2a, "c6ff8889925f5fc1f1a11539969b549107ff7eecd0424428e1a61ff2174492afe0aa687cae7ebf709221607c496b2fe9782895f29ca23050f42eac42", 0x10})
setsockopt$SO_RDS_TRANSPORT(r7, 0x114, 0x8, &(0x7f0000000040), 0x4)
r10 = accept$inet6(r0, 0x0, &(0x7f0000000680))
r11 = dup(r10)
ioctl$UFFDIO_API(r11, 0xc018aa3f, &(0x7f0000000280)={0xaa, 0x3})
pwritev(r9, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:33 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, 0x0, 0x0)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:33 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:33 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000000)={0x3070, 0x6, 0x9})
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/exec\x00', 0x2, 0x0)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  533.708004] FAULT_INJECTION: forcing a failure.
[  533.708004] name failslab, interval 1, probability 0, space 0, times 0
[  533.750491] CPU: 0 PID: 15368 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  533.757660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  533.767030] Call Trace:
[  533.769635]  dump_stack+0x138/0x19c
[  533.773277]  should_fail.cold+0x10f/0x159
[  533.777437]  should_failslab+0xdb/0x130
[  533.781428]  __kmalloc_track_caller+0x2ec/0x790
[  533.786103]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  533.790951]  ? kstrdup_const+0x48/0x60
[  533.794845]  kstrdup+0x3a/0x70
[  533.798043]  kstrdup_const+0x48/0x60
[  533.801760]  kvasprintf_const+0xf7/0x170
[  533.805826]  kobject_set_name_vargs+0x5b/0x150
[  533.810418]  dev_set_name+0xa4/0xc0
[  533.814066]  ? device_initialize+0x430/0x430
[  533.818488]  ? start_creating+0x13a/0x1b0
[  533.822647]  hci_register_dev+0x2d1/0x810
[  533.826800]  ? hci_init_sysfs+0x7c/0xa0
[  533.830819]  __vhci_create_device+0x2a6/0x560
[  533.835327]  vhci_write+0x2a1/0x437
[  533.838964]  __vfs_write+0x4a7/0x6b0
[  533.842683]  ? kernel_read+0x120/0x120
[  533.846632]  ? rw_verify_area+0xea/0x2b0
08:42:33 executing program 2:
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=<r0=>0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040))
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080))
r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(r0, &(0x7f0000000340)='sessionid\x00')
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f00000000c0)={0x0, 'syz1\x00'})
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  533.850702]  vfs_write+0x198/0x500
[  533.854251]  SyS_write+0xfd/0x230
[  533.857724]  ? SyS_read+0x230/0x230
[  533.861352]  ? do_syscall_64+0x53/0x640
[  533.865334]  ? SyS_read+0x230/0x230
[  533.868970]  do_syscall_64+0x1e8/0x640
[  533.872862]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  533.877717]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  533.882909] RIP: 0033:0x459519
[  533.886096] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  533.893831] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:42:33 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000000)={0x7, "3287d274445151eab6ced8cdf1532dc24b1ff0bc6ae578c6ca4c488dc80b0fa8", 0x1, 0x1})

[  533.901100] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  533.908368] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  533.915635] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  533.922929] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  533.946842] Bluetooth: Can't register HCI device
08:42:33 executing program 3:
r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x20000)
write$UHID_CREATE(r0, &(0x7f0000000140)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000000c0)=""/89, 0x59, 0x71643063, 0x2000000, 0xfff, 0x87, 0x7}, 0x120)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)

08:42:33 executing program 1 (fault-call:2 fault-nth:18):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:33 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  534.043728] FAULT_INJECTION: forcing a failure.
[  534.043728] name failslab, interval 1, probability 0, space 0, times 0
[  534.091809] CPU: 0 PID: 15394 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  534.099157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  534.099162] Call Trace:
[  534.099183]  dump_stack+0x138/0x19c
[  534.099201]  should_fail.cold+0x10f/0x159
[  534.118951]  should_failslab+0xdb/0x130
[  534.122949]  kmem_cache_alloc+0x2d7/0x780
[  534.122963]  ? check_preemption_disabled+0x3c/0x250
[  534.122975]  ? retint_kernel+0x2d/0x2d
[  534.122990]  alloc_inode+0xa9/0x180
[  534.123001]  new_inode_pseudo+0x19/0xf0
[  534.143696]  new_inode+0x1f/0x40
[  534.147070]  debugfs_get_inode+0x1a/0x130
[  534.151220]  debugfs_create_dir+0x67/0x3b0
[  534.155460]  hci_register_dev+0x28a/0x810
[  534.159607]  ? hci_init_sysfs+0x7c/0xa0
[  534.163613]  __vhci_create_device+0x2a6/0x560
[  534.168138]  vhci_write+0x2a1/0x437
[  534.171785]  __vfs_write+0x4a7/0x6b0
[  534.175508]  ? kernel_read+0x120/0x120
[  534.179409]  ? rw_verify_area+0xea/0x2b0
[  534.183475]  vfs_write+0x198/0x500
[  534.187039]  SyS_write+0xfd/0x230
[  534.190497]  ? SyS_read+0x230/0x230
[  534.194131]  ? do_syscall_64+0x53/0x640
[  534.198106]  ? SyS_read+0x230/0x230
[  534.201748]  do_syscall_64+0x1e8/0x640
[  534.205633]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  534.210488]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  534.215685] RIP: 0033:0x459519
[  534.218875] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  534.227067] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  534.234337] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  534.241606] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  534.248879] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  534.256145] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  536.230212] IPVS: ftp: loaded support on port[0] = 21
[  536.538844] chnl_net:caif_netlink_parms(): no params data found
[  536.573911] bridge0: port 1(bridge_slave_0) entered blocking state
[  536.580429] bridge0: port 1(bridge_slave_0) entered disabled state
[  536.587281] device bridge_slave_0 entered promiscuous mode
[  536.594722] bridge0: port 2(bridge_slave_1) entered blocking state
[  536.601410] bridge0: port 2(bridge_slave_1) entered disabled state
[  536.608337] device bridge_slave_1 entered promiscuous mode
[  536.626361] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  536.635321] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  536.652038] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  536.659093] team0: Port device team_slave_0 added
[  536.664584] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  536.671662] team0: Port device team_slave_1 added
[  536.676800] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  536.684187] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  536.732193] device hsr_slave_0 entered promiscuous mode
[  536.770276] device hsr_slave_1 entered promiscuous mode
[  536.820801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  536.827735] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  536.840083] bridge0: port 2(bridge_slave_1) entered blocking state
[  536.846479] bridge0: port 2(bridge_slave_1) entered forwarding state
[  536.853142] bridge0: port 1(bridge_slave_0) entered blocking state
[  536.859486] bridge0: port 1(bridge_slave_0) entered forwarding state
[  536.887297] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  536.893817] 8021q: adding VLAN 0 to HW filter on device bond0
[  536.902341] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  536.911107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  536.918131] bridge0: port 1(bridge_slave_0) entered disabled state
[  536.924895] bridge0: port 2(bridge_slave_1) entered disabled state
[  536.935305] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  536.941454] 8021q: adding VLAN 0 to HW filter on device team0
[  536.949434] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  536.957125] bridge0: port 1(bridge_slave_0) entered blocking state
[  536.963600] bridge0: port 1(bridge_slave_0) entered forwarding state
[  536.985254] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  536.993695] bridge0: port 2(bridge_slave_1) entered blocking state
[  537.000110] bridge0: port 2(bridge_slave_1) entered forwarding state
[  537.007130] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  537.015727] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  537.023263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  537.030947] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  537.038660] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  537.046924] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  537.053717] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  537.065458] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  537.076348] 8021q: adding VLAN 0 to HW filter on device batadv0
[  537.530627] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
[  538.620492] device bridge_slave_1 left promiscuous mode
[  538.626015] bridge0: port 2(bridge_slave_1) entered disabled state
[  538.681018] device bridge_slave_0 left promiscuous mode
[  538.686519] bridge0: port 1(bridge_slave_0) entered disabled state
[  538.785767] device hsr_slave_1 left promiscuous mode
[  538.832780] device hsr_slave_0 left promiscuous mode
[  538.884376] team0 (unregistering): Port device team_slave_1 removed
[  538.894134] team0 (unregistering): Port device team_slave_0 removed
[  538.903522] bond0 (unregistering): Releasing backup interface bond_slave_1
[  538.963040] bond0 (unregistering): Releasing backup interface bond_slave_0
[  539.055430] bond0 (unregistering): Released all slaves
08:42:43 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:43 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/if_inet6\x00')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:43 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
dup(r0)
openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mISDNtimer\x00', 0x20000, 0x0)
r1 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2)
renameat2(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x2)
tee(r1, r0, 0x8, 0xe)
close(r0)
getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000140)=""/214, &(0x7f0000000240)=0xd6)

08:42:43 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:43 executing program 1 (fault-call:2 fault-nth:19):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:43 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:43 executing program 2:
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={<r0=>0x0}, &(0x7f0000000040)=0xc)
r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  543.899319] FAULT_INJECTION: forcing a failure.
[  543.899319] name failslab, interval 1, probability 0, space 0, times 0
[  543.984948] CPU: 0 PID: 15423 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  543.992105] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  544.001467] Call Trace:
[  544.004069]  dump_stack+0x138/0x19c
[  544.007709]  should_fail.cold+0x10f/0x159
[  544.011867]  should_failslab+0xdb/0x130
[  544.015853]  kmem_cache_alloc+0x2d7/0x780
[  544.020005]  ? check_preemption_disabled+0x3c/0x250
[  544.025024]  ? alloc_inode+0xa9/0x180
[  544.028833]  selinux_inode_alloc_security+0xb6/0x2a0
[  544.033947]  security_inode_alloc+0x94/0xd0
[  544.038277]  inode_init_always+0x552/0xaf0
[  544.042516]  alloc_inode+0x81/0x180
[  544.046144]  new_inode_pseudo+0x19/0xf0
[  544.050122]  new_inode+0x1f/0x40
[  544.053495]  debugfs_get_inode+0x1a/0x130
[  544.057644]  debugfs_create_dir+0x67/0x3b0
[  544.061885]  hci_register_dev+0x28a/0x810
[  544.066035]  ? hci_init_sysfs+0x7c/0xa0
[  544.070016]  __vhci_create_device+0x2a6/0x560
[  544.074519]  vhci_write+0x2a1/0x437
[  544.078153]  __vfs_write+0x4a7/0x6b0
[  544.081874]  ? kernel_read+0x120/0x120
[  544.085776]  ? rw_verify_area+0xea/0x2b0
[  544.089844]  vfs_write+0x198/0x500
[  544.093390]  SyS_write+0xfd/0x230
[  544.096845]  ? SyS_read+0x230/0x230
[  544.100473]  ? do_syscall_64+0x53/0x640
[  544.104543]  ? SyS_read+0x230/0x230
[  544.108170]  do_syscall_64+0x1e8/0x640
[  544.112059]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  544.116911]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  544.122101] RIP: 0033:0x459519
[  544.125290] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:42:43 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xfff, 0x8500)
close(r0)

[  544.132998] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  544.140265] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  544.147559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  544.154840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  544.162114] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:43 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuacct.usage_sys\x00', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
r3 = getgid()
ioctl$TUNSETGROUP(r2, 0x400454ce, r3)
ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000000))

08:42:43 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:43 executing program 1 (fault-call:2 fault-nth:20):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:43 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={<r1=>0x0, 0xfffffffffffffffe, 0xffffffff, 0x1}, &(0x7f0000000080)=0x10)
getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={<r2=>0x0, 0x0, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10)
getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={r1, 0xc91b, 0x7, 0x7fffffff, 0x1, 0x31, 0x2, 0xfff, {r2, @in6={{0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x28}, 0x7ff}}, 0x3ff, 0x7, 0x120, 0xdbd1, 0x5c}}, &(0x7f0000000280)=0xb0)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="2a0000000600000000000000000000000100000000000000050000000020000001000000000000002a00"], 0x2a)
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:43 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f00000000c0)=@HCI_ACLDATA_PKT={0x2, "3dbdb73622e7267b53dc9163e7709f2f6fbeaced4af152d90d567a73"}, 0xffffffffffffff01)
open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x40)
close(r0)

08:42:43 executing program 2:
r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040)={0x0, 0xfffffffffffffff9, 0xff8, 0xfff, 0xc21, 0x5})
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  544.392984] FAULT_INJECTION: forcing a failure.
[  544.392984] name failslab, interval 1, probability 0, space 0, times 0
08:42:43 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  544.491689] CPU: 1 PID: 15456 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  544.498861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  544.508227] Call Trace:
[  544.510843]  dump_stack+0x138/0x19c
[  544.514490]  should_fail.cold+0x10f/0x159
[  544.518652]  should_failslab+0xdb/0x130
[  544.522634]  kmem_cache_alloc+0x2d7/0x780
[  544.526787]  ? vprintk_emit+0x171/0x600
[  544.530771]  __kernfs_new_node+0x70/0x420
[  544.534958]  ? vprintk_func+0x65/0x159
[  544.538856]  kernfs_new_node+0x80/0xf0
[  544.542750]  kernfs_create_dir_ns+0x41/0x140
[  544.547162]  sysfs_create_dir_ns+0xbe/0x1d0
[  544.551492]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  544.557034]  kobject_add+0x11f/0x180
[  544.560747]  ? kset_create_and_add+0x180/0x180
[  544.565337]  ? get_device_parent.isra.0+0x34e/0x560
[  544.570361]  ? kmem_cache_alloc_trace+0x623/0x790
[  544.575213]  ? lock_downgrade+0x6e0/0x6e0
[  544.579374]  get_device_parent.isra.0+0x415/0x560
[  544.584225]  device_add+0x2d3/0x1490
[  544.587945]  ? device_initialize+0x430/0x430
[  544.592367]  ? device_private_init+0x190/0x190
[  544.596959]  hci_register_dev+0x2d9/0x810
[  544.601119]  ? hci_init_sysfs+0x7c/0xa0
[  544.605104]  __vhci_create_device+0x2a6/0x560
[  544.609600]  vhci_write+0x2a1/0x437
[  544.613234]  __vfs_write+0x4a7/0x6b0
[  544.616950]  ? kernel_read+0x120/0x120
[  544.620854]  ? rw_verify_area+0xea/0x2b0
[  544.624916]  vfs_write+0x198/0x500
[  544.628465]  SyS_write+0xfd/0x230
[  544.631922]  ? SyS_read+0x230/0x230
[  544.635547]  ? do_syscall_64+0x53/0x640
[  544.639537]  ? SyS_read+0x230/0x230
[  544.643170]  do_syscall_64+0x1e8/0x640
[  544.647058]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  544.651911]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  544.657101] RIP: 0033:0x459519
[  544.660291] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  544.668011] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  544.675282] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  544.682552] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:42:44 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:44 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
preadv(r0, &(0x7f0000000300)=[{&(0x7f0000000000)=""/71, 0x47}, {&(0x7f0000000140)=""/241, 0xf1}, {&(0x7f0000000240)=""/168, 0xa8}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x6, 0x0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
poll(&(0x7f00000000c0)=[{r0, 0x2000}, {r1, 0xa000}, {r1, 0x4242}, {r1, 0x4a8}, {r1, 0x1040}], 0x5, 0x7)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$UI_SET_MSCBIT(r2, 0x40045568, 0x1e)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
write$vhci(r2, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], 0x1001)

[  544.689822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  544.697099] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  544.758818] kobject_add_internal failed for bluetooth (error: -12 parent: virtual)
[  544.809994] Bluetooth: Can't register HCI device
[  546.640213] IPVS: ftp: loaded support on port[0] = 21
[  547.015820] chnl_net:caif_netlink_parms(): no params data found
[  547.049132] bridge0: port 1(bridge_slave_0) entered blocking state
[  547.055754] bridge0: port 1(bridge_slave_0) entered disabled state
[  547.062903] device bridge_slave_0 entered promiscuous mode
[  547.070166] bridge0: port 2(bridge_slave_1) entered blocking state
[  547.076590] bridge0: port 2(bridge_slave_1) entered disabled state
[  547.083642] device bridge_slave_1 entered promiscuous mode
[  547.099767] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  547.109009] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  547.126232] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  547.133527] team0: Port device team_slave_0 added
[  547.138951] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  547.146208] team0: Port device team_slave_1 added
[  547.151621] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  547.158827] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  547.222216] device hsr_slave_0 entered promiscuous mode
[  547.260344] device hsr_slave_1 entered promiscuous mode
[  547.330801] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  547.337711] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  547.351047] bridge0: port 2(bridge_slave_1) entered blocking state
[  547.357420] bridge0: port 2(bridge_slave_1) entered forwarding state
[  547.364076] bridge0: port 1(bridge_slave_0) entered blocking state
[  547.370465] bridge0: port 1(bridge_slave_0) entered forwarding state
[  547.398705] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  547.405041] 8021q: adding VLAN 0 to HW filter on device bond0
[  547.414124] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  547.422624] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  547.429699] bridge0: port 1(bridge_slave_0) entered disabled state
[  547.437028] bridge0: port 2(bridge_slave_1) entered disabled state
[  547.446323] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  547.452550] 8021q: adding VLAN 0 to HW filter on device team0
[  547.461014] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  547.468554] bridge0: port 1(bridge_slave_0) entered blocking state
[  547.474961] bridge0: port 1(bridge_slave_0) entered forwarding state
[  547.485134] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  547.492839] bridge0: port 2(bridge_slave_1) entered blocking state
[  547.499195] bridge0: port 2(bridge_slave_1) entered forwarding state
[  547.515330] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  547.523060] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  547.535858] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  547.545975] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  547.556972] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  547.567265] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  547.573846] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  547.580894] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  547.595376] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  547.604699] 8021q: adding VLAN 0 to HW filter on device batadv0
[  548.000595] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:48 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, 0x0)
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:48 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = syz_open_dev$adsp(&(0x7f0000002300)='/dev/adsp#\x00', 0xfffffffffffffffc, 0x8000)
ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000002340)=""/225)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x182, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000002180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000002140)={<r3=>0xffffffffffffffff}, 0x0, 0x3}}, 0x20)
write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000002440)={0x9, 0x3a2, 0xfa00, {r3, 0x8, "0896e4", "1eadc4dfcc34c2df3425313dab452c477746bffabc19fda7b76459fbe3e12842663a7eef8950d9811094ee1f1a2cc11e36ae79eb42138f118fa71eb499a36284ac9aec4dfdd4afbf19c89f9e0f509f037a541006d7ef4bb7b54f729bdfb585462cf96c403e269797cdd56ac5772c602b1debb93ca1fa6a88b0070993bd6e773c22d454d2b168bdfa99c8ac847acf3c172213dde1ebb9d37b06cb21f3b2a31c7ac1d1ca87c44761a9831255c090cffa32cf2a4d4666c15545f5ae24f641f0f5adbf6004c70624f381c87bb70fd509d5c37932334b86fb23ce30d4ecf3b661da938526b705e56a518691b4ba192588e5a2a9b96ec9a1e914bc7752b7a5e0a12ea4"}}, 0x1f2)
ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000000c0)={0x2, 0x0, 0x2080, {0x4000, 0xf000, 0x1}, [], "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", "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"})
getsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000021c0)={<r4=>0x0, 0x8acd, 0x6, [0x9, 0x1, 0xd977, 0x0, 0x1, 0x9b1]}, &(0x7f0000002200)=0x14)
getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000002240)={r4, 0x4}, &(0x7f0000002280)=0x8)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
eventfd(0x34e)
close(r1)
ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000002580)={0x2, 0x0, 0x2080, {0xf000, 0xf000, 0x1}, [], "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", "e15b6a8929daf02df2d2d23ffba10607420b1670e713d93e887929cef44d3a9f8d285e5279474e0d5053cfc7887f82573c825fd5a7e5da8907330041d4c6048ed4a0ac114d25513c0301386b9f5593ffadc8eac1d09b6936569745457bfd9a47d999559f0ab0d4203f0057fe29e05f12d84d2aa2d94e638773ccc61051baebfce2a1a536ad41650ab024b530a827431e0b2e38abc06bf61875bcc43c4a52bce1366bbf684313286863da0626e40a0e3a808e7f02d8f525c05605b2b314ec695797998e3e9a7e3b4b12b649fc21d8b9ea5c40de7e9747d10fa953a17240d6af44b47d46f3a1916019585e9e7aff163c6fddb9a6d80b3a381cc7b269d247b324629d9baa5c7da2ff06832c3b43ef1f0e0bdced134cd9867b43ca6bd42183da862023f15aa56a6096c83bab5ce03b1e7d0487b4b0b8a34101a3346179d14ed22e654c3f6e0a81664fcc95abe32e7fa539579155bab695f88bfa84727606d4fb2a2e09ecf0c44539c8425268834a9d9566c59340203ea9c477d7fce815295b8fb1fda9453e6ec9eb0a0f5a1a911b3c38756e04efaa6d09ef5ddf86ff01da5adda4cefc6f9946ed19680ebb5c6bd6a8dcedc8a27e90827958a51540ca1994a11beadbce9e2d168ccee9c2a729fac06c8a7c1f6c89b954a21468f419fbd7ea50c8cd3cce842bfe1f82fa1ab8b80796f33996b01f9aa13c8d069e98df159b718facf138bc04513dbe2dbd47d927590a77517cfa8bdfb308fda237a11b6a51d3a3d04c84f2bd84f15d682842c993ac42705c3f55fcf54d5e178dd14105fc680740eafff460cd67755e88a47274965b9442ed0efe94cc0af9acf733c587a8c2174d95931bb2fbdee49185267dcd56b271a7db026d39205cd7d71f7850bb7c367898d734f4eef1929985f7d2c82acbb09da8dde7ee80091be554a37512425a5b65e240c74a0fb101f8935b2c61e0bf6aa030eddc5296e7316ae1574fbea501a2e7d44223c661f81e9a324d78e51697c94274002dc228f9410665f0555d8f6e394c7b57875fc011c06695071f1819ce2b7f1293e7d86b072feb69159b70d67cf552e8b01acc1bde02e44fb56f0172e53b7f7b9de671c63b072a33e4ed134d8cda6df6e0a81494191d4e8738ee4a57646672ac5dbba8c4d03b1b382e77d2956b05ed1820a1f3d243e9efef77a729a0a477671d7c5addad06a673af96a46c24dd69a347674fac993e28889cabfeb7f1c2ebb1365ba16f08c647b76a0cc9f1e9a178354b2efb265e93c6c7386ee7b3fb185c729616dbbca89faa36da869a0629a39cfe70d642342eef139c4ca4700abd2588db0b1c97599fc96796f11e55b0d357c53f9c5b1be63e87ab76a4a999a226294c3f7d3b08b7068136c75faa2474ce2bc125d226fed60867670af26fffaf7721897685f1c68c4e6b7fc956f2e7a5181aa9865db762e448054d1d04d12456cd42539d2fd679bd4aac617b3df5cbafcc8c7add9a6679b410f45293f81ca6953d474d47f87300159e4d6ec063ef2d07452f4fb63b7a9a892cf0ce5a9e33492f8a9d01f926aed0c08d737f76f58d10863f3b1507140fb516e1ff4465a06cde7e937de8e0f4c461db8b4d47252bd44d192142968f8182e0932c8cb7a520934e938496e4e9928a83f81bacf2dd550ab0edb0641f9c5c960b3b8a101409be7ff90f9d8437dfeb7ed5d60039e9bf947f69f8b27f3dd6719f374a557eadf81c189c220786c86c1a9ec855079b5f83961cfa551e5da1e416b12ff6a9981bbcbe31724e407ec96902ba157fdf234cbcae6781420ad2866bb64d3bd53d4f6412258254c86482bbd9733a09f8cb7a6f2e745490c9576f2a27e0539cdab5694694c9b5dae14795cfefddc828a1ad51fbb7844e7a36037694c89e7fd2c0275eb404c8820847d671ae614a235206905cdb387039a320ac80f0eaaa417bec9f9058cf2b658f836c7bbb91a5fa807b52e82978498e802b0b6eebdec19dd9f5f5a99bce5e191ea47d88b542ec3c2ba56368a8f0d39765e4fe8a83fd09337e553b049be155fc33509127cb3d19b673b8423083c3a063ec1dec07277e463b2a6e1428c1866b92365aba9d317332120e3f109c361805e50a85c47fbc149b16c526e9cd6298f27dd0f56d7bd038fbf26ed79553cef64259389bf2dc7d394045ee436ef3c099601f713e6893ae92874ea6db9ea5e655307a33271f2ac257348f21488077f013d80df6b7f3a4aea763e80aa25cec30a63eee2aa90c08baa115dc9e3008155cee2684fef1578ded19ba650b202ca6280af7b028206280f70c18ac079b0bdd79e00a94907062ff1d1fc023fec698000c95c4f6145b0fe65856f71eaf9170a47c2295f023bd7358b6e351c1b277426369ffbd8c2164d3cd3ff0bc86c6589532c247231dc7f082ff83a9acdaf40cc9bb7a916f6582738ca72ee04ccecd55b8879524307ee27f9bd5e71c43a716b6bc5c4eec5ab8ab579d512db2f612a53bcbc84256ab54788e1ba9684f9e1f0ee0d3dbaab8a2a26b80598d182dce062ef8e7a95c8d753b68d52029bc69b8151bef7d57b25418c91724bea5691f31bf98fb594c9d026dcd9d3aaee897dcf6fde428e3dffb8630d26215149488c55992dfb43b78a8efd7b03d6a27d572bd5b2b5b7e5455d10a55a8c608c3def9a466f53a487090b84d8d4b788da31d5a6b4622a5d3157b0ced359a5ee8df8d27fd725dfdb32fdf95d54b9ed85cf1ded5361e20c05ce36b5c00710f262734082154632482d9d6f7673282c6d3f8d5822e89130f8c56b4716a3380c63d747072ea2dea27c7939c228aa6f6ffe8eeee4738d3dacd4a203de2ffdeb2b0aaedee86b3a9ba1c9d0b5f582aad06795d29e0529419ef21b709a374b815ee103876199ea672821d754ae56ebd00b4d6f2fca825cb31e442bf71286b6dfcf1615955dc47a802a4e28430183ede1de64f24d2c2ef189b3240fea9988f64a3e8775262ba6bfc32f3bb24cdf54678ed0401c8d091e4cc84b8c76a74080a6eeb49104c2f47a40eb2024a6fca7114ef3129c7e72e9b727181f20dd0d9ed56e5e9c8c07397b865758efa686a254a068fe5fb2c51528c8d348ae57dff5a9f6086d3c47547e465ac80eb12bd51c9723f5982846f007eb42121dbba6e44ae7ffe015ee2aae73578cd8f47361bab98342e5274c81137a0738e92ab50e8ee6094a9b74e9d0b5af8d5479e30f2895ebbc5b90495ced56e1e45a46a056b6d93e06fc957e83927dd31f61f4351a0b5794d3b66bbdc32b601ba769d48524d76293e065fff2d6536497ea3d7051700b19778f9bd8f9d7bd3e1f52ac464ebaabb99408c662b38d592a7c123efa20faed77bca71dae50ff760066e0b23ba9b51029cf7a9a0fe1a907082225ea9119b8be7bf521e6498e426b2e56c59030dc6c81e3aec22246808fb40eca6d30591a2408b0829258b5953b666fb21804f426c8cdf904e05458dbfb75d4166e615538d1dc5323bd248505d8401df6fbad769dc166e3ca51e4349af2b4b78c45daec688d1f4b7b53f384c8fa95a388a53d238d669dceec013401c870f27f9162d9b8b05084e9c1d40297f03ed75674bd6aa7dbd50b2e6412721ba75a4f5fda32667f9cd29ee476ad7d6fcd9ae0d1fb3b425a956602d0c2ebfa59a3ca36f2a712d61cb327a140ac6619006f62c4e2538c6dcabe0e54bd2d55af99c424e26c0d07bde6e1e0847c7f898b71431b232bb8713b709923065e01f3e2af0d42030d7200db1953cb8c74c816667a0b2f0826c2a4829daf5de4a59e7bd8c6189468008c2b40105b2a94c4f522a00424f571f12ae95eca0c3e23f35a1b9892e41cb08c8b58c7c813628b0ad86947d3392c0802ed34bb3990b5487393a4540339a6dd0302714c98a6c268538adb90e75737712791436ce2fb996a2cda50c2521154f1cf2f0f0c861323ed30239c6a22617b3617985a46125718307a93c7ec6fd43783459ccf856958f7ba17b588080a33ee4a474b1c54842b43c6e9cc769d835de8495429780436cdf720cc5405c111a634dda0f9dffbf0c1c1b68759f6f19dea3018746fa7f650c9d6a4306978f5e8e6b18bc440675e6e4da8b9c2736c2ef9f4d589063b2a65608aa47a9b31b86fa07228a21ea4ebd5504e3b3e10552e1669406e93a010f024e41dba776c252a54d29dd5c2875338718edb06d438ddcb9553917e1fee0369d38fb4e9b5e09a67b9f9926a2d277d3d94617d338c4a756279398c30242a38c7c5d4f24f214d9589fdd255a4c533c892a2190528b61715ad2221670b363b84d19c87070449fccf3306578d77b4b3e723f3335ed11cf22077f5462de75f5c7609bf7ef4236b5427b84cf24814458a414a36132acfeb7479a9cca30ce895d69d1608bd014a8f324dcffb567df39bc20966ab919d5bc60ccd9817898298a47f03d388bc4146ab786b5c8ee1ccb1868d31ca4fd225c4f50852db849d43260155f6b6d6fb30ec8d206ff0dbec94e5a784317d74fad69d754d772c12036aa92b49218af88877ff7bea767e3e75cc1540f73c8ebad2e26267a4b1c4c428f77031cf9f112f637f5f8343c2693cd87eb4a9d85f4eda7cb2cb47c7d48d16c73b9567af284856f83d09a85460dbdc84688466e6debb657532d6f4bfb96e401666bda5416f08b30d43a9fdab39c5b14716d90c6114e3aba8b53af7a40857d5fa644df4401caefc1695d9dbe56b685b2e6235ea3c81314340343c970ef88bcb8699251747fb8dd2dcd5932366501a8123ea7e103719fa0904466b67698300120cbb7fb2cad115fcbeb58a9be9a937ca7904b8a04cd959e5efd481c14f4057bc63194007235cb733a8c9dfecba906ae5c88b9d7d5c724b3b023ef7d65996fd7429d4de49d10c45b432f20759d943483db838384a25192d7bba4a2e76c5d1780c28b5d489b09f22df84a996a2c11da7bdaada73448236ed7f6d0c291206bfe16331be07bae4f2c4bf65113d568980342d88efdda41c8afd98a5237b2a0d8287452cf30c3487e6f39f732faa3329ea1e30edec39350889e0978e0417d2cb76df2942c536b71fcaf87350927b1b921bc24168549175617da110795a12244157e4a1d76e866013044706359f658a2c98f65e212b5e58efea9da6e8058baa3913723be82f10b99508a67100088058269c9957af74703399eed4594b8fd28cbc619e7de8505415264688c8da034fd5f9079d49f4776eda587d82ca6e78b54456546d1de2b111640a627af84c4cce3a14199253f21d60904337a7e7518ec80427616ad1c050eca75df8a1e9cd00f5a6e2226059c8da4c61bb8aef050559aeaef5ac9244f0d0ebc94b390de8b059895971f78bddf817558bfc6267bf8602967adda5a24798321b16d59773860094af65907bb10d013233f36116a1c681d5974ef4feae37386e2df8d419a94406ed876b9534a3a797f77f0f165ea575261bea42f01f22897cfdcc309da9d4995d72f276952d24690a6bd56d3ede69bc391c9415339ae90cc4ded0afc7e89d9aea81f336e40ec4c952b12b81de88b45f364b0034607e7283cbfd78b04048eaeaef255bb7f824ccccd02e4a90965789d8fd16aa5ede74d313d3199ea6c5d6406faff19c1ba460d580f860c1587df46b7f4eb7a427bd242b9f0f71d02b716924569cec2aa1bd6f2be3d679012970a7ee81be4ec234e739dec37318e16fbe62be97ced536594f60825ac08e5e384b96741017b83fd2f07f7bb5a2c651369842269ab18d5c6fce25e35a8fc07c403ff3133dc03f1b65371887d9b2e5bbf48293e626702888686caca"})

08:42:48 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='attr/keycreate\x00')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x64001)
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3)
ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x3, "63ff6f7ccb4f1738"})

08:42:48 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:48 executing program 1 (fault-call:2 fault-nth:21):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:48 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  548.841354] FAULT_INJECTION: forcing a failure.
[  548.841354] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  548.863110] CPU: 0 PID: 15502 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  548.870242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  548.870248] Call Trace:
[  548.870272]  dump_stack+0x138/0x19c
[  548.870293]  should_fail.cold+0x10f/0x159
[  548.870307]  ? __might_sleep+0x93/0xb0
[  548.870323]  __alloc_pages_nodemask+0x1d6/0x7a0
[  548.870337]  ? __alloc_pages_slowpath+0x2930/0x2930
[  548.870359]  ? lock_downgrade+0x6e0/0x6e0
[  548.870375]  alloc_pages_current+0xec/0x1e0
[  548.870388]  __get_free_pages+0xf/0x40
[  548.870404]  inode_doinit_with_dentry+0x82b/0xed0
[  548.882382]  ? selinux_msg_queue_msgsnd+0x400/0x400
[  548.890132]  ? current_kernel_time64+0x107/0x230
[  548.890145]  ? timespec_trunc+0xb5/0x120
[  548.890158]  selinux_d_instantiate+0x28/0x40
08:42:48 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

[  548.890170]  security_d_instantiate+0x5a/0xe0
[  548.890182]  d_instantiate+0x60/0xa0
[  548.890197]  debugfs_create_dir+0x10f/0x3b0
[  548.890211]  hci_register_dev+0x28a/0x810
[  548.890227]  __vhci_create_device+0x2a6/0x560
[  548.890238]  vhci_write+0x2a1/0x437
[  548.898786]  __vfs_write+0x4a7/0x6b0
[  548.898801]  ? kernel_read+0x120/0x120
[  548.898823]  ? rw_verify_area+0xea/0x2b0
[  548.898835]  vfs_write+0x198/0x500
[  548.907987]  SyS_write+0xfd/0x230
[  548.908000]  ? SyS_read+0x230/0x230
08:42:48 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000001, 0x8010, r0, 0x0)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$NBD_SET_SOCK(r1, 0xab00, r0)
ioctl$UI_SET_FFBIT(r0, 0x4004556b, 0x71)

[  548.908012]  ? do_syscall_64+0x53/0x640
[  548.908023]  ? SyS_read+0x230/0x230
[  548.916225]  do_syscall_64+0x1e8/0x640
[  548.916236]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  548.916254]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  548.916263] RIP: 0033:0x459519
[  548.916268] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  548.926213] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  548.926220] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  548.926225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  548.926231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  548.926238] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  549.060137] audit: type=1400 audit(1561538568.463:80): avc:  denied  { map } for  pid=15511 comm="syz-executor.2" path="/proc/15511" dev="proc" ino=59641 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1
08:42:48 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x6b, 0x3, 0x80000000, "eab5f8db68d0211f062a454bfe94fe61", "2e2c38190d94188d90685e0cbd50c2018caa6213f69153728fd8f18198bbe6e69240dd7c3dec78f247f95b979da760144e71dae6e7f780257c7ccb034879d363e6ed24a021b0e0b90d164dd06978721e6acc314ec039"}, 0x6b, 0x2)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$TCSETAW(r1, 0x5407, &(0x7f00000000c0)={0x0, 0x8, 0x7f, 0x5, 0x5, 0x433, 0x5, 0xfffffffffffffffe, 0x9, 0xc7})

08:42:48 executing program 1 (fault-call:2 fault-nth:22):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:48 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:48 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), 0x0)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(r1)

08:42:48 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x301001, 0x0)
ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f00000000c0)={0x2, 0x0, 0x2080, {0x6000, 0xf002, 0x1}, [], "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", "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"})
close(r0)

[  549.238659] FAULT_INJECTION: forcing a failure.
[  549.238659] name failslab, interval 1, probability 0, space 0, times 0
[  549.251157] CPU: 0 PID: 15528 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  549.258271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  549.267649] Call Trace:
[  549.270247]  dump_stack+0x138/0x19c
[  549.273886]  should_fail.cold+0x10f/0x159
[  549.278044]  should_failslab+0xdb/0x130
[  549.282042]  kmem_cache_alloc+0x47/0x780
[  549.286095]  ? save_stack_trace+0x16/0x20
[  549.290238]  ? save_stack+0x45/0xd0
[  549.293876]  ? kasan_kmalloc+0xce/0xf0
[  549.298387]  ? kasan_slab_alloc+0xf/0x20
[  549.302460]  ? kmem_cache_alloc+0x12e/0x780
[  549.306800]  ? __kernfs_new_node+0x70/0x420
[  549.311143]  ? kernfs_new_node+0x80/0xf0
[  549.315203]  ? kernfs_create_dir_ns+0x41/0x140
[  549.319878]  radix_tree_node_alloc.constprop.0+0x1c7/0x310
[  549.325503]  idr_get_free_cmn+0x563/0x8d0
[  549.329657]  idr_alloc_cmn+0x10e/0x210
[  549.333545]  ? __fprop_inc_percpu_max+0x1e0/0x1e0
[  549.338384]  ? check_preemption_disabled+0x3c/0x250
[  549.343392]  ? retint_kernel+0x2d/0x2d
[  549.347298]  idr_alloc_cyclic+0xd0/0x1e2
[  549.351358]  ? ida_simple_remove+0x60/0x60
[  549.355606]  __kernfs_new_node+0xe4/0x420
[  549.359768]  kernfs_new_node+0x80/0xf0
[  549.363659]  kernfs_create_dir_ns+0x41/0x140
[  549.368080]  sysfs_create_dir_ns+0xbe/0x1d0
[  549.372401]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  549.377935]  kobject_add+0x11f/0x180
[  549.381641]  ? kset_create_and_add+0x180/0x180
[  549.386220]  ? __sanitizer_cov_trace_pc+0x2a/0x60
[  549.391067]  get_device_parent.isra.0+0x415/0x560
[  549.395908]  device_add+0x2d3/0x1490
[  549.399616]  ? device_initialize+0x430/0x430
[  549.404021]  ? device_private_init+0x190/0x190
[  549.408607]  hci_register_dev+0x2d9/0x810
[  549.412752]  ? hci_init_sysfs+0x7c/0xa0
[  549.416729]  __vhci_create_device+0x2a6/0x560
[  549.421219]  vhci_write+0x2a1/0x437
[  549.424843]  __vfs_write+0x4a7/0x6b0
[  549.428575]  ? kernel_read+0x120/0x120
[  549.432476]  ? rw_verify_area+0xea/0x2b0
[  549.436553]  vfs_write+0x198/0x500
[  549.440093]  SyS_write+0xfd/0x230
[  549.443541]  ? SyS_read+0x230/0x230
[  549.447160]  ? do_syscall_64+0x53/0x640
[  549.451128]  ? SyS_read+0x230/0x230
[  549.454749]  do_syscall_64+0x1e8/0x640
[  549.458628]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  549.463473]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  549.468675] RIP: 0033:0x459519
[  549.471855] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  549.479573] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:42:48 executing program 2:
getpgrp(0xffffffffffffffff)
pipe(&(0x7f00000000c0))
syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x2c7, 0x101000)
openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/status\x00', 0x0, 0x0)
r0 = openat$null(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/null\x00', 0x0, 0x0)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)=<r1=>0x0)
r2 = syz_open_procfs(r1, &(0x7f0000000c40)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\xd3B\xa3\xaasKV\x11\x13\vv\xb3\r\xbc\x00\xd8\xa4\xf2\x98z7\xdam2\xab\x92sc\xe8\x8e\x7fe\x0e\xafde2\xeb\x12\x1c\xa4\xca\x93\x13\xfe\xef\xac\xeb\xb6\xed<@\xff\xe6\x01\x1c]\x00\x00\x00\x00Wy\xd2\xd0\x8d\x1f6\x1b\xed\xc6d\xd2\xc8\xa2,\rjA\xf1#\xc1\x9a\xeeC\xbd\xe4;E\v\xa9p\xf5\xdaJ\xf0\x0e\xe6cP\n\xf3\x7fkA\x92\xfe\xd3\xb9\xd6b\x9e\xabYw\xdb\xc17\xe6R2\xd4\x86\n\x8c[I\xde\xe9\x97,+\x96\x11H\x1b\x8f2\xed\x99I\x06w\xe0\xcd`\xcfr\xdd\\\x8bV\"\x9a\xea\xe9\x80\xc5$\f\xf0\x01\x90\xd5\x97\x8e[\x18\xba\xf6\xd00TU\xfc\x1bum{~\xfaZ\xd0qp\xe3\xa4v\xc4\xcb\xaf\x93l\xc6<\xeb\xa5\xe1!\xb0\xa2%\xc2^b}|\xb2 \n\tg\xf9po\xba\r;\xe52\xd1\x81\xce\xb5\xf0K\xaf\xb4/\x12\xbdb\xb0\xf6\b\x8aW;\xc3d\xdbI\x128^\xb7\x9f\xce\xd1|\x1c\x99\x92\xb0Q \x90\xdc\x99\x9c\xb6\xc5\xdb\xfb\x00=\x96\xaa\x01\xef.7\xa5\xb8PpK\x84\xd1)\xa3\x9dg\x80\xbaq\xdc\xbf\xaa\xac\r\\+\x8eZ\v\xa0Q<\x9f\xd2\xf7\x05]\x84\xff\x0f\x00\x00\x00\x00\x00\x00z[f\x02\x86;\xe0\x11>|6\x18\x12\x99%A0\x93\xb5K\x0e\x17@P\xc9\xd1\xab\xddm\xc6\xd9O\xc7\xa5\x05E7^\xb4f\xc1F\xed\x9df')
openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000000)={0x1000, &(0x7f0000000e00)="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"})
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  549.486844] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  549.494109] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  549.501370] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  549.508628] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:48 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:49 executing program 2:
syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x41a802)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@ng={0x4, 0x9, "44965c"}, 0x5, 0x2)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000140)={0xd0, "6b85c1122d1318ffc021421961c683c1bff03a635b413f5bda787d34dc9e7a4da2312f567af6a944d27a0555c00b0d42930c2b7addc45364f491f11cdeab991ed4306bafb9e6c9a3cba7823f8a2533f80b6f57fd44e968bed5ad6099736f7184a1475dc3b9cd9d790a03141b3a3cc776082b79c2d2607f77770fcc7198bbb3a8f184d5edd65a6e434f37333eb1b51bd88fb66d9c4bc954657d9a82fd7ca613137ac2f98209057ea84911e3d7be11c06f5d7922014e6a40de0b0ece0288a1dec93c364e12ea4fa1934096d8926869623f"})
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
socket$bt_hidp(0x1f, 0x3, 0x6)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:49 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:49 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
inotify_init1(0x80800)
close(r0)

08:42:49 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:49 executing program 1 (fault-call:2 fault-nth:23):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:49 executing program 2:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040))
gettid()
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000180))
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0))
ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000280)=<r0=>0x0)
r1 = syz_open_procfs(r0, &(0x7f0000000300)='net/mcfilter\x00')
r2 = openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000000)={0x0, 0xffffffffffffffc1, 0x775, 0x1, 0x7fff, "3d2cdb7343c3646d6d7170cc24c2fe494f0d7e", 0x6809, 0x3})
ioctl$TIOCMIWAIT(r1, 0x545c, 0x0)
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:49 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000080))
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  549.875758] FAULT_INJECTION: forcing a failure.
[  549.875758] name failslab, interval 1, probability 0, space 0, times 0
[  549.949499] CPU: 0 PID: 15559 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  549.956676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  549.956682] Call Trace:
[  549.956704]  dump_stack+0x138/0x19c
[  549.956725]  should_fail.cold+0x10f/0x159
[  549.956743]  should_failslab+0xdb/0x130
[  549.980403]  kmem_cache_alloc+0x2d7/0x780
[  549.980420]  ? find_held_lock+0x35/0x130
[  549.980432]  ? sysfs_do_create_link_sd.isra.0+0x82/0x120
[  549.980445]  __kernfs_new_node+0x70/0x420
[  549.980458]  kernfs_new_node+0x80/0xf0
[  549.980471]  kernfs_create_link+0x2c/0x170
[  549.980482]  sysfs_do_create_link_sd.isra.0+0x90/0x120
[  549.998254]  sysfs_create_link+0x65/0xc0
[  549.998268]  device_add+0x447/0x1490
[  549.998284]  ? device_private_init+0x190/0x190
[  549.998303]  hci_register_dev+0x2d9/0x810
[  550.019424]  ? hci_init_sysfs+0x7c/0xa0
[  550.019445]  __vhci_create_device+0x2a6/0x560
[  550.019457]  vhci_write+0x2a1/0x437
[  550.019472]  __vfs_write+0x4a7/0x6b0
[  550.040264]  ? kernel_read+0x120/0x120
[  550.040288]  ? rw_verify_area+0xea/0x2b0
[  550.040301]  vfs_write+0x198/0x500
[  550.055465]  SyS_write+0xfd/0x230
[  550.058915]  ? SyS_read+0x230/0x230
[  550.058928]  ? do_syscall_64+0x53/0x640
[  550.058939]  ? SyS_read+0x230/0x230
[  550.058952]  do_syscall_64+0x1e8/0x640
[  550.058961]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  550.058976]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  550.084055] RIP: 0033:0x459519
[  550.084062] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  550.084075] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  550.084081] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  550.084087] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  550.084092] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  550.084098] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:49 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={<r2=>0xffffffffffffffff, r1, 0x0, 0x6, &(0x7f0000000000)='{proc\x00', 0xffffffffffffffff}, 0x30)
fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x0, r2})
ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000140)={0x9, 0x7, 0x0, 0x3, 0x1, [{0x5, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x100}]})

08:42:49 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  550.158409] Bluetooth: Can't register HCI device
08:42:49 executing program 1 (fault-call:2 fault-nth:24):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:49 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0x428544)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200080, 0x0)
ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f00000000c0))
close(r0)
syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x100000000, 0x40000)

[  550.200467] device bridge_slave_1 left promiscuous mode
[  550.206177] bridge0: port 2(bridge_slave_1) entered disabled state
[  550.276730] FAULT_INJECTION: forcing a failure.
[  550.276730] name failslab, interval 1, probability 0, space 0, times 0
[  550.298055] device bridge_slave_0 left promiscuous mode
[  550.318965] bridge0: port 1(bridge_slave_0) entered disabled state
[  550.340196] CPU: 1 PID: 15579 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  550.347344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  550.357378] Call Trace:
[  550.359969]  dump_stack+0x138/0x19c
[  550.363618]  should_fail.cold+0x10f/0x159
[  550.367785]  should_failslab+0xdb/0x130
[  550.371771]  kmem_cache_alloc+0x2d7/0x780
[  550.375923]  ? memcpy+0x46/0x50
[  550.379200]  ? kstrdup+0x5a/0x70
[  550.379217]  __kernfs_new_node+0x70/0x420
[  550.379228]  ? vprintk_func+0x65/0x159
[  550.379241]  kernfs_new_node+0x80/0xf0
[  550.379255]  kernfs_create_dir_ns+0x41/0x140
[  550.398942]  sysfs_create_dir_ns+0xbe/0x1d0
[  550.403283]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  550.408837]  kobject_add+0x11f/0x180
[  550.412565]  ? kset_create_and_add+0x180/0x180
[  550.417160]  ? mutex_unlock+0xd/0x10
[  550.420882]  device_add+0x383/0x1490
[  550.424602]  ? device_initialize+0x430/0x430
[  550.429015]  ? device_private_init+0x190/0x190
[  550.433599]  ? up_write+0x1a/0x60
[  550.437109]  hci_register_dev+0x2d9/0x810
[  550.441261]  ? hci_init_sysfs+0x7c/0xa0
[  550.445245]  __vhci_create_device+0x2a6/0x560
[  550.449744]  vhci_write+0x2a1/0x437
[  550.453378]  __vfs_write+0x4a7/0x6b0
[  550.457103]  ? kernel_read+0x120/0x120
[  550.461006]  ? rw_verify_area+0xea/0x2b0
[  550.465067]  vfs_write+0x198/0x500
[  550.468614]  SyS_write+0xfd/0x230
[  550.472071]  ? SyS_read+0x230/0x230
[  550.475708]  ? do_syscall_64+0x53/0x640
[  550.479693]  ? SyS_read+0x230/0x230
[  550.483322]  do_syscall_64+0x1e8/0x640
[  550.487216]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  550.492065]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  550.497261] RIP: 0033:0x459519
[  550.500445] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  550.508160] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  550.515432] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  550.522701] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  550.529973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  550.537250] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  550.671899] kobject_add_internal failed for hci2 (error: -12 parent: bluetooth)
[  550.680649] Bluetooth: Can't register HCI device
[  550.712313] device hsr_slave_1 left promiscuous mode
[  550.755025] device hsr_slave_0 left promiscuous mode
[  550.804545] team0 (unregistering): Port device team_slave_1 removed
[  550.814205] team0 (unregistering): Port device team_slave_0 removed
[  550.824864] bond0 (unregistering): Releasing backup interface bond_slave_1
[  550.874401] bond0 (unregistering): Releasing backup interface bond_slave_0
[  550.952971] bond0 (unregistering): Released all slaves
[  553.370256] IPVS: ftp: loaded support on port[0] = 21
[  553.676727] chnl_net:caif_netlink_parms(): no params data found
[  553.708804] bridge0: port 1(bridge_slave_0) entered blocking state
[  553.715398] bridge0: port 1(bridge_slave_0) entered disabled state
[  553.722798] device bridge_slave_0 entered promiscuous mode
[  553.729629] bridge0: port 2(bridge_slave_1) entered blocking state
[  553.736328] bridge0: port 2(bridge_slave_1) entered disabled state
[  553.743344] device bridge_slave_1 entered promiscuous mode
[  553.761106] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  553.769776] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  553.788432] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  553.795741] team0: Port device team_slave_0 added
[  553.801238] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  553.808281] team0: Port device team_slave_1 added
[  553.813687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  553.820965] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  553.902256] device hsr_slave_0 entered promiscuous mode
[  553.970451] device hsr_slave_1 entered promiscuous mode
[  554.010752] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  554.017694] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  554.029984] bridge0: port 2(bridge_slave_1) entered blocking state
[  554.036389] bridge0: port 2(bridge_slave_1) entered forwarding state
[  554.043069] bridge0: port 1(bridge_slave_0) entered blocking state
[  554.049432] bridge0: port 1(bridge_slave_0) entered forwarding state
[  554.077021] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  554.083548] 8021q: adding VLAN 0 to HW filter on device bond0
[  554.092206] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  554.101182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  554.108271] bridge0: port 1(bridge_slave_0) entered disabled state
[  554.115159] bridge0: port 2(bridge_slave_1) entered disabled state
[  554.125624] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  554.131823] 8021q: adding VLAN 0 to HW filter on device team0
[  554.139995] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  554.148123] bridge0: port 1(bridge_slave_0) entered blocking state
[  554.154555] bridge0: port 1(bridge_slave_0) entered forwarding state
[  554.170650] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  554.178246] bridge0: port 2(bridge_slave_1) entered blocking state
[  554.184692] bridge0: port 2(bridge_slave_1) entered forwarding state
[  554.192267] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  554.203903] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  554.211362] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  554.224736] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  554.232656] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  554.242041] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  554.248242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  554.261667] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  554.271370] 8021q: adding VLAN 0 to HW filter on device batadv0
[  554.660621] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:42:54 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:54 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setfsgid(r2)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:54 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x202600, 0x0)
ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f00000000c0)=0xfffffffffffffff9)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:54 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(0x0, &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:54 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:54 executing program 1 (fault-call:2 fault-nth:25):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  555.577889] FAULT_INJECTION: forcing a failure.
[  555.577889] name failslab, interval 1, probability 0, space 0, times 0
[  555.608961] CPU: 1 PID: 15609 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  555.616133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  555.625497] Call Trace:
[  555.625521]  dump_stack+0x138/0x19c
[  555.625543]  should_fail.cold+0x10f/0x159
[  555.625561]  should_failslab+0xdb/0x130
[  555.635925]  __kmalloc_track_caller+0x2ec/0x790
[  555.644568]  ? save_trace+0x290/0x290
[  555.648387]  ? check_preemption_disabled+0x3c/0x250
[  555.653412]  ? kstrdup_const+0x48/0x60
[  555.653425]  kstrdup+0x3a/0x70
[  555.653437]  kstrdup_const+0x48/0x60
[  555.653451]  __kernfs_new_node+0x2f/0x420
[  555.653462]  kernfs_new_node+0x80/0xf0
[  555.653475]  kernfs_create_link+0x2c/0x170
08:42:55 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:55 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
unshare(0x20000)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  555.653486]  sysfs_do_create_link_sd.isra.0+0x90/0x120
[  555.653497]  sysfs_create_link+0x65/0xc0
[  555.660586]  device_add+0x735/0x1490
[  555.660599]  ? device_private_init+0x190/0x190
[  555.660617]  hci_register_dev+0x2d9/0x810
[  555.660628]  ? hci_init_sysfs+0x7c/0xa0
[  555.660645]  __vhci_create_device+0x2a6/0x560
[  555.660655]  vhci_write+0x2a1/0x437
[  555.660670]  __vfs_write+0x4a7/0x6b0
[  555.660682]  ? kernel_read+0x120/0x120
[  555.668557]  ? rw_verify_area+0xea/0x2b0
[  555.668573]  vfs_write+0x198/0x500
[  555.668587]  SyS_write+0xfd/0x230
[  555.668598]  ? SyS_read+0x230/0x230
[  555.668613]  ? do_syscall_64+0x53/0x640
[  555.676752]  ? SyS_read+0x230/0x230
[  555.676769]  do_syscall_64+0x1e8/0x640
[  555.676779]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  555.676796]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  555.676808] RIP: 0033:0x459519
[  555.686129] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  555.686140] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:42:55 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  555.686145] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  555.686150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  555.686157] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  555.686163] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  555.815018] Bluetooth: Can't register HCI device
08:42:55 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

08:42:55 executing program 1 (fault-call:2 fault-nth:26):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:55 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x8, 0x70bd2b, 0x25dfdbfb, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x40000)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:55 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

08:42:55 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', 0x0)
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:55 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  555.969660] FAULT_INJECTION: forcing a failure.
[  555.969660] name failslab, interval 1, probability 0, space 0, times 0
08:42:55 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
close(r0)

[  556.028819] CPU: 1 PID: 15641 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  556.035972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.035978] Call Trace:
[  556.036001]  dump_stack+0x138/0x19c
[  556.036022]  should_fail.cold+0x10f/0x159
[  556.036039]  should_failslab+0xdb/0x130
[  556.036056]  __kmalloc_track_caller+0x2ec/0x790
[  556.036069]  ? save_trace+0x290/0x290
[  556.036082]  ? __mutex_unlock_slowpath+0x71/0x800
[  556.036100]  ? __lock_is_held+0xb6/0x140
[  556.036113]  ? kstrdup_const+0x48/0x60
[  556.036127]  kstrdup+0x3a/0x70
[  556.036140]  kstrdup_const+0x48/0x60
[  556.036151]  __kernfs_new_node+0x2f/0x420
[  556.036168]  kernfs_new_node+0x80/0xf0
[  556.036183]  kernfs_create_link+0x2c/0x170
[  556.036195]  sysfs_do_create_link_sd.isra.0+0x90/0x120
[  556.036209]  sysfs_create_link+0x65/0xc0
[  556.036222]  device_add+0x735/0x1490
[  556.036237]  ? device_private_init+0x190/0x190
[  556.036257]  hci_register_dev+0x2d9/0x810
[  556.036270]  ? hci_init_sysfs+0x7c/0xa0
[  556.036287]  __vhci_create_device+0x2a6/0x560
[  556.036301]  vhci_write+0x2a1/0x437
[  556.036319]  __vfs_write+0x4a7/0x6b0
[  556.036334]  ? kernel_read+0x120/0x120
[  556.036360]  ? rw_verify_area+0xea/0x2b0
[  556.036373]  vfs_write+0x198/0x500
[  556.036387]  SyS_write+0xfd/0x230
[  556.036399]  ? SyS_read+0x230/0x230
[  556.036410]  ? do_syscall_64+0x53/0x640
[  556.036421]  ? SyS_read+0x230/0x230
[  556.036435]  do_syscall_64+0x1e8/0x640
[  556.036446]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  556.036461]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  556.036471] RIP: 0033:0x459519
[  556.036478] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  556.036491] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  556.036498] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  556.036505] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  556.036512] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  556.036518] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  556.171965] Bluetooth: Can't register HCI device
08:42:55 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000000)={<r2=>0x0})
ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f0000000040)={<r3=>0x0, <r4=>0x0, 0xffff})
ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000080)={r2, r3})
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$DRM_IOCTL_GEM_CLOSE(r1, 0x40086409, &(0x7f00000000c0)={r4})
ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611)

08:42:55 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:55 executing program 4:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r0, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0)
symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r2 = socket$netlink(0x10, 0x3, 0x0)
writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:55 executing program 1 (fault-call:2 fault-nth:27):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:55 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:55 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000000c0), &(0x7f0000000100)=0x4)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0)
close(0xffffffffffffffff)

[  556.397715] FAULT_INJECTION: forcing a failure.
[  556.397715] name failslab, interval 1, probability 0, space 0, times 0
08:42:55 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = gettid()
getpgid(r2)
epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0)
ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000000))
fcntl$getown(r1, 0x9)
r3 = getpgrp(0x0)
r4 = syz_open_procfs(r3, &(0x7f0000000080)='net/mcfilter\x00')
ioctl$SIOCAX25DELFWD(r0, 0x89eb, &(0x7f0000000040)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}})
pwritev(r4, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000100)=@add_del={0x2, &(0x7f00000000c0)='rose0\x00'})

[  556.479933] CPU: 1 PID: 15673 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  556.487093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.496459] Call Trace:
[  556.499071]  dump_stack+0x138/0x19c
[  556.502725]  should_fail.cold+0x10f/0x159
[  556.506884]  should_failslab+0xdb/0x130
[  556.510867]  kmem_cache_alloc+0x2d7/0x780
[  556.510880]  ? wait_for_completion+0x420/0x420
[  556.510898]  __kernfs_new_node+0x70/0x420
[  556.510911]  kernfs_new_node+0x80/0xf0
[  556.510925]  __kernfs_create_file+0x46/0x323
[  556.510939]  sysfs_add_file_mode_ns+0x1e4/0x450
[  556.519764]  sysfs_add_file+0x4f/0x60
[  556.519777]  sysfs_merge_group+0xe2/0x210
[  556.519793]  dpm_sysfs_add+0x121/0x1b0
[  556.527805]  device_add+0x968/0x1490
[  556.527821]  ? device_private_init+0x190/0x190
[  556.527838]  hci_register_dev+0x2d9/0x810
[  556.536913]  ? hci_init_sysfs+0x7c/0xa0
[  556.536933]  __vhci_create_device+0x2a6/0x560
[  556.536945]  vhci_write+0x2a1/0x437
[  556.544880]  __vfs_write+0x4a7/0x6b0
08:42:56 executing program 4:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r0, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0)
symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r2 = socket$netlink(0x10, 0x3, 0x0)
writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:56 executing program 2:
syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
fchdir(r0)
pwritev(r0, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  556.544895]  ? kernel_read+0x120/0x120
[  556.544916]  ? rw_verify_area+0xea/0x2b0
[  556.552503]  vfs_write+0x198/0x500
[  556.552519]  SyS_write+0xfd/0x230
[  556.552531]  ? SyS_read+0x230/0x230
[  556.552546]  ? do_syscall_64+0x81/0x640
[  556.561257]  ? SyS_read+0x230/0x230
[  556.561271]  do_syscall_64+0x1e8/0x640
[  556.561281]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  556.561297]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  556.561306] RIP: 0033:0x459519
[  556.561312] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:42:56 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca5055e0bcfec7be070")
r1 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10)
sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x800004e23, @loopback}, 0x10)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000000)=0x5, 0x4)
sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0)
recvfrom$packet(r2, &(0x7f0000000400)=""/248, 0xf8, 0x0, 0x0, 0x0)

08:42:56 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={<r2=>0x0, r1, 0x0, 0x5, &(0x7f0000000000)='fd/4\x00'}, 0x30)
fcntl$setownex(r0, 0xf, &(0x7f0000000080)={0x1, r2})
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0, <r4=>0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f00000000c0)=0xe8)
getgroups(0x4, &(0x7f0000000240)=[0xee00, 0x0, 0xffffffffffffffff, <r5=>0xee01])
write$P9_RGETATTR(r1, &(0x7f0000000280)={0xa0, 0x19, 0x2, {0x2, {0x13, 0x3, 0x6}, 0x0, r4, r5, 0x1, 0x100, 0x8dfb, 0x5, 0x80000000, 0x8, 0x4, 0x3c, 0x7, 0x401, 0x9ad, 0x5008, 0x4, 0x0, 0x78}}, 0xa0)
setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000340)={@mcast2, r3}, 0x14)

[  556.569761] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  556.569768] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  556.569773] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  556.569779] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  556.569785] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:42:56 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x10000, 0x0)
getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000000c0)={'raw\x00'}, &(0x7f0000000140)=0x54)

08:42:56 executing program 1 (fault-call:2 fault-nth:28):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  556.679814] Bluetooth: Can't register HCI device
[  556.825481] FAULT_INJECTION: forcing a failure.
[  556.825481] name failslab, interval 1, probability 0, space 0, times 0
[  556.848878] CPU: 1 PID: 15705 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  556.856032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  556.856037] Call Trace:
[  556.856061]  dump_stack+0x138/0x19c
[  556.856083]  should_fail.cold+0x10f/0x159
[  556.856109]  should_failslab+0xdb/0x130
[  556.856126]  kmem_cache_alloc+0x2d7/0x780
[  556.856147]  __kernfs_new_node+0x70/0x420
[  556.883970]  kernfs_new_node+0x80/0xf0
[  556.883986]  kernfs_create_dir_ns+0x41/0x140
[  556.884000]  internal_create_group+0xea/0x7b0
[  556.884011]  ? kernfs_put+0x35e/0x490
[  556.896445]  sysfs_create_group+0x20/0x30
[  556.896461]  dpm_sysfs_add+0x26/0x1b0
[  556.896473]  device_add+0x968/0x1490
[  556.896487]  ? device_private_init+0x190/0x190
[  556.912842]  hci_register_dev+0x2d9/0x810
[  556.912856]  ? hci_init_sysfs+0x7c/0xa0
[  556.912874]  __vhci_create_device+0x2a6/0x560
[  556.912885]  vhci_write+0x2a1/0x437
[  556.921177]  __vfs_write+0x4a7/0x6b0
[  556.921192]  ? kernel_read+0x120/0x120
[  556.921214]  ? rw_verify_area+0xea/0x2b0
[  556.921225]  vfs_write+0x198/0x500
[  556.921239]  SyS_write+0xfd/0x230
[  556.921250]  ? SyS_read+0x230/0x230
[  556.929361]  ? do_syscall_64+0x53/0x640
[  556.929376]  ? SyS_read+0x230/0x230
[  556.929389]  do_syscall_64+0x1e8/0x640
[  556.929399]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  556.929415]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  556.929427] RIP: 0033:0x459519
[  556.937548] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  556.937560] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  556.937566] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  556.937572] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  556.937578] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  556.937584] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  557.033155] Bluetooth: Can't register HCI device
08:42:56 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:56 executing program 2:
setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x4e20, 0x6, @mcast2, 0x8001}, {0xa, 0x4e23, 0x3, @loopback, 0x180000}, 0x80000001, [0xfffffffffffff001, 0x8, 0xff, 0x3f, 0x1000, 0x5, 0x7, 0x7]}, 0x5c)
r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ion\x00', 0x0, 0x0)
ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f00000000c0)={0x3bf, 0x0, &(0x7f0000000040)})
fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000001c0))
r1 = gettid()
r2 = syz_open_procfs(r1, &(0x7f0000000100)='fd/4\x00')
socket$bt_cmtp(0x1f, 0x3, 0x5)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={<r3=>0x0, 0xac}, &(0x7f0000000040)=0xc)
write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000002c0)={<r4=>0xffffffffffffffff}, 0x13f, 0x9}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r2, &(0x7f0000000340)={0x10, 0x30, 0xfa00, {&(0x7f0000000240), 0x2, {0xa, 0x4e20, 0x7, @empty, 0x10001}, r4}}, 0x38)
ioctl$VIDIOC_DBG_G_REGISTER(r2, 0xc0385650, &(0x7f0000000200)={{0x4, @name="d6fca6fcfc595f97f03fcc17ea2f317df3c356ab7c61eb0afda0659a4a5e365e"}, 0x8, 0x81, 0x7fff})
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={r3, 0x200}, &(0x7f00000000c0)=0x8)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:56 executing program 4:
socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r0 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r0, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0)
symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r2 = socket$netlink(0x10, 0x3, 0x0)
writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:42:56 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@v2={0x5, 0x2, 0x4, 0x4, 0xe, "e9ed018e3126803ee151f2e54e8a"}, 0x18, 0x1)
epoll_create1(0x80000)
pipe(&(0x7f0000000100)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000200)={0x7, 0x3ff, 0x2, 0x800, r2})
getsockopt$TIPC_SRC_DROPPABLE(r2, 0x10f, 0x80, &(0x7f0000000140), &(0x7f0000000180)=0x4)
ioctl$BLKROSET(r2, 0x125d, &(0x7f00000001c0)=0x80000001)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:42:56 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x8010000000000084)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000005b40)={0x0, @in={{0x2, 0x0, @local}}}, 0x0)

08:42:56 executing program 1 (fault-call:2 fault-nth:29):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:56 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$KDDELIO(r1, 0x4b35, 0xe851)

[  557.329290] FAULT_INJECTION: forcing a failure.
[  557.329290] name failslab, interval 1, probability 0, space 0, times 0
[  557.367074] CPU: 1 PID: 15718 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  557.374277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.374283] Call Trace:
[  557.374306]  dump_stack+0x138/0x19c
[  557.374326]  should_fail.cold+0x10f/0x159
[  557.394023]  should_failslab+0xdb/0x130
[  557.398008]  kmem_cache_alloc+0x2d7/0x780
[  557.402160]  ? kernfs_find_and_get_ns+0x4b/0x60
[  557.406834]  __kernfs_new_node+0x70/0x420
[  557.410987]  ? lock_downgrade+0x6e0/0x6e0
[  557.415144]  kernfs_new_node+0x80/0xf0
[  557.419037]  __kernfs_create_file+0x46/0x323
[  557.423447]  sysfs_add_file_mode_ns+0x1e4/0x450
[  557.423464]  sysfs_add_file+0x4f/0x60
[  557.423476]  sysfs_merge_group+0xe2/0x210
[  557.423492]  dpm_sysfs_add+0x121/0x1b0
[  557.423504]  device_add+0x968/0x1490
[  557.436110]  ? device_private_init+0x190/0x190
[  557.436130]  hci_register_dev+0x2d9/0x810
[  557.436141]  ? hci_init_sysfs+0x7c/0xa0
[  557.436157]  __vhci_create_device+0x2a6/0x560
[  557.457207]  vhci_write+0x2a1/0x437
[  557.457225]  __vfs_write+0x4a7/0x6b0
[  557.457238]  ? kernel_read+0x120/0x120
[  557.457258]  ? rw_verify_area+0xea/0x2b0
[  557.477050]  vfs_write+0x198/0x500
[  557.477066]  SyS_write+0xfd/0x230
[  557.477078]  ? SyS_read+0x230/0x230
[  557.477098]  ? do_syscall_64+0x53/0x640
[  557.491679]  ? SyS_read+0x230/0x230
[  557.495317]  do_syscall_64+0x1e8/0x640
[  557.495328]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  557.495345]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  557.495354] RIP: 0033:0x459519
[  557.495363] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246
[  557.509251]  ORIG_RAX: 0000000000000001
[  557.509259] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  557.509265] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  557.509271] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  557.509277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  557.509284] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  557.581621] Bluetooth: Can't register HCI device
08:42:57 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070")
clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
r1 = gettid()
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={<r2=>0xffffffffffffffff})
r3 = memfd_create(&(0x7f0000000700)='posix_acl_accessvboxnet1&vboxnet1cpuset\x00', 0x0)
pwritev(r3, &(0x7f0000000240)=[{&(0x7f0000000440)=',', 0x1}], 0x1, 0x4081806)
sendfile(r2, r3, 0x0, 0x20020102000007)
ptrace$setopts(0x4206, r1, 0x0, 0x0)
tkill(r1, 0x38)

08:42:57 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={<r1=>0x0})
ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000040)={r1, 0x3d})
r2 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080))
getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000000c0)={<r3=>0x0}, &(0x7f0000000140)=0xc)
r4 = syz_open_procfs(r3, &(0x7f0000000100)='fd/4\x00')
pwritev(r4, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:42:57 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:42:57 executing program 1 (fault-call:2 fault-nth:30):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:42:57 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x60, 0x400)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000380), 0x106, 0xb}}, 0x20)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000300)={0x0, 0x224, 0xfa00, {0x4, &(0x7f0000000400)={<r2=>0xffffffffffffffff}, 0x111, 0xe}}, 0x20)
write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000340)={0x5, 0x10, 0xfa00, {&(0x7f00000000c0), r2, 0x2}}, 0x18)

[  557.631463] device bridge_slave_1 left promiscuous mode
[  557.637188] bridge0: port 2(bridge_slave_1) entered disabled state
08:42:57 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
ioctl$SCSI_IOCTL_STOP_UNIT(r0, 0x6)
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000000)={<r3=>0x0, @in6={{0xa, 0x4e23, 0x5, @ipv4={[], [], @empty}, 0x3}}, 0x1bc6, 0x2, 0x1, 0x7, 0x1}, &(0x7f00000000c0)=0x98)
ioctl$IMGETVERSION(r2, 0x80044942, &(0x7f0000000180))
setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r3, 0xffff}, 0x8)

[  557.722864] device bridge_slave_0 left promiscuous mode
[  557.730958] FAULT_INJECTION: forcing a failure.
[  557.730958] name failslab, interval 1, probability 0, space 0, times 0
[  557.745279] bridge0: port 1(bridge_slave_0) entered disabled state
[  557.783474] CPU: 1 PID: 15743 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  557.790655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  557.790661] Call Trace:
[  557.790686]  dump_stack+0x138/0x19c
[  557.790709]  should_fail.cold+0x10f/0x159
[  557.790724]  should_failslab+0xdb/0x130
[  557.814406]  kmem_cache_alloc+0x2d7/0x780
[  557.818563]  ? wait_for_completion+0x420/0x420
[  557.823164]  __kernfs_new_node+0x70/0x420
[  557.827321]  kernfs_new_node+0x80/0xf0
[  557.831211]  __kernfs_create_file+0x46/0x323
[  557.835619]  sysfs_add_file_mode_ns+0x1e4/0x450
[  557.835635]  sysfs_add_file+0x4f/0x60
[  557.835646]  sysfs_merge_group+0xe2/0x210
[  557.835662]  dpm_sysfs_add+0x121/0x1b0
[  557.852166]  device_add+0x968/0x1490
[  557.855890]  ? device_private_init+0x190/0x190
[  557.860483]  hci_register_dev+0x2d9/0x810
[  557.860495]  ? hci_init_sysfs+0x7c/0xa0
[  557.860511]  __vhci_create_device+0x2a6/0x560
[  557.860527]  vhci_write+0x2a1/0x437
[  557.876757]  __vfs_write+0x4a7/0x6b0
[  557.880476]  ? kernel_read+0x120/0x120
[  557.884370]  ? rw_verify_area+0xea/0x2b0
[  557.884385]  vfs_write+0x198/0x500
[  557.884399]  SyS_write+0xfd/0x230
[  557.884410]  ? SyS_read+0x230/0x230
[  557.899053]  ? do_syscall_64+0x53/0x640
[  557.899069]  ? SyS_read+0x230/0x230
[  557.899082]  do_syscall_64+0x1e8/0x640
[  557.899097]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  557.899113]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  557.910580] RIP: 0033:0x459519
[  557.910586] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:42:57 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, 0x0, 0x0)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  557.910597] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  557.910603] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  557.910612] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  557.923834] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  557.923841] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  558.047173] Bluetooth: Can't register HCI device
[  558.112988] device hsr_slave_1 left promiscuous mode
[  558.164295] device hsr_slave_0 left promiscuous mode
[  558.215416] team0 (unregistering): Port device team_slave_1 removed
[  558.240918] team0 (unregistering): Port device team_slave_0 removed
[  558.268328] bond0 (unregistering): Releasing backup interface bond_slave_1
[  558.323049] bond0 (unregistering): Releasing backup interface bond_slave_0
[  558.383415] bond0 (unregistering): Released all slaves
[  560.950198] IPVS: ftp: loaded support on port[0] = 21
[  561.395260] chnl_net:caif_netlink_parms(): no params data found
[  561.427580] bridge0: port 1(bridge_slave_0) entered blocking state
[  561.434327] bridge0: port 1(bridge_slave_0) entered disabled state
[  561.441222] device bridge_slave_0 entered promiscuous mode
[  561.447664] bridge0: port 2(bridge_slave_1) entered blocking state
[  561.454139] bridge0: port 2(bridge_slave_1) entered disabled state
[  561.462481] device bridge_slave_1 entered promiscuous mode
[  561.478235] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  561.487329] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  561.505370] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  561.512734] team0: Port device team_slave_0 added
[  561.518051] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  561.525316] team0: Port device team_slave_1 added
[  561.530682] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  561.537848] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  561.622205] device hsr_slave_0 entered promiscuous mode
[  561.690366] device hsr_slave_1 entered promiscuous mode
[  561.730593] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  561.737485] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  561.749763] bridge0: port 2(bridge_slave_1) entered blocking state
[  561.756155] bridge0: port 2(bridge_slave_1) entered forwarding state
[  561.762829] bridge0: port 1(bridge_slave_0) entered blocking state
[  561.769167] bridge0: port 1(bridge_slave_0) entered forwarding state
[  561.796174] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  561.802962] 8021q: adding VLAN 0 to HW filter on device bond0
[  561.810921] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  561.818899] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  561.827134] bridge0: port 1(bridge_slave_0) entered disabled state
[  561.833801] bridge0: port 2(bridge_slave_1) entered disabled state
[  561.844785] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  561.851051] 8021q: adding VLAN 0 to HW filter on device team0
[  561.859257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  561.867036] bridge0: port 1(bridge_slave_0) entered blocking state
[  561.873395] bridge0: port 1(bridge_slave_0) entered forwarding state
[  561.890997] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  561.898548] bridge0: port 2(bridge_slave_1) entered blocking state
[  561.904949] bridge0: port 2(bridge_slave_1) entered forwarding state
[  561.912501] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  561.920098] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  561.928110] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  561.937175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  561.948995] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  561.959290] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  561.965613] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  561.974170] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  561.986548] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  561.997142] 8021q: adding VLAN 0 to HW filter on device batadv0
[  562.390964] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:02 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:02 executing program 2:
r0 = gettid()
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180))
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0))
r1 = syz_open_procfs(r0, &(0x7f0000000200)='map_files\x00')
openat$cgroup_ro(r1, &(0x7f0000000700)='mem\x00\x01y7SwaS.\x06ur\x06\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}\xe36\xd5~{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\x19\x03\x00\x00\x00\x00\x00\x00|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xa9\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x064fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@\xfb\xa0\x17\xe6u0\xd0/\x8b$\x18\xf2\x80\x04\xc0\xd5C\xb0\xc2\xa5\f\xff\xa8\xdcT\x89\xd5;\xdd\xf7w\x00\xc4\xd99\xee\xddE', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$IMSETDEVNAME(r2, 0x80184947, &(0x7f0000000000)={0x7, 'syz1\x00'})

08:43:02 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
fcntl$getown(r0, 0x9)
ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000000)={0x3})
close(r0)

08:43:02 executing program 1 (fault-call:2 fault-nth:31):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:02 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:02 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
creat(0x0, 0x0)
getresuid(0x0, 0x0, 0x0)
close(r0)

08:43:02 executing program 3:
r0 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2)
ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f00000001c0)={0x1, 0xfffffffffffffe01, 0x1})
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)
r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x800, 0x0)
ioctl$VIDIOC_S_JPEGCOMP(r2, 0x408c563e, &(0x7f00000000c0)={0x150b096a, 0x1, 0x3c, "37755e16635c8d0263ca9a39f97caed1c88eed4e693f959775c3b7d027934ba93c4bd9889a73281ba7720c5079ea0c6960cb9e6b82ef911ec1fe9b88", 0x16, "72c1803796cb246f38177083aa7dba3a8f6fda2ab2252ab995128e5302a2c9e7e797d5c7cae6a20f23e5a0c0135b6be9e3ae4f52fd4f2fa0500bdbec"})

08:43:02 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000700)=""/4096, &(0x7f0000000200)=0x6e)
getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x59a62b9a7b52b814)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000001700)=ANY=[@ANYBLOB="7c020000", @ANYRES16=r3, @ANYBLOB="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"], 0x27c}, 0x1, 0x0, 0x0, 0x800}, 0x1)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  563.230002] FAULT_INJECTION: forcing a failure.
[  563.230002] name failslab, interval 1, probability 0, space 0, times 0
[  563.258907] CPU: 0 PID: 15790 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  563.266058] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  563.266063] Call Trace:
[  563.266084]  dump_stack+0x138/0x19c
[  563.266101]  should_fail.cold+0x10f/0x159
[  563.285816]  should_failslab+0xdb/0x130
[  563.289805]  kmem_cache_alloc+0x2d7/0x780
[  563.289818]  ? wait_for_completion+0x420/0x420
[  563.289837]  __kernfs_new_node+0x70/0x420
[  563.298567]  kernfs_new_node+0x80/0xf0
[  563.298582]  __kernfs_create_file+0x46/0x323
[  563.298601]  sysfs_add_file_mode_ns+0x1e4/0x450
[  563.306701]  sysfs_add_file+0x4f/0x60
[  563.306714]  sysfs_merge_group+0xe2/0x210
[  563.306733]  dpm_sysfs_add+0x121/0x1b0
[  563.315796]  device_add+0x968/0x1490
[  563.315812]  ? device_private_init+0x190/0x190
[  563.315824]  ? kobject_set_name_vargs+0x101/0x150
[  563.315840]  hci_register_dev+0x2d9/0x810
[  563.323768]  ? hci_init_sysfs+0x7c/0xa0
[  563.323784]  __vhci_create_device+0x2a6/0x560
[  563.323795]  vhci_write+0x2a1/0x437
[  563.323811]  __vfs_write+0x4a7/0x6b0
[  563.323825]  ? kernel_read+0x120/0x120
[  563.323846]  ? rw_verify_area+0xea/0x2b0
[  563.323858]  vfs_write+0x198/0x500
[  563.331438]  SyS_write+0xfd/0x230
[  563.331451]  ? SyS_read+0x230/0x230
[  563.331463]  ? do_syscall_64+0x53/0x640
08:43:02 executing program 2:
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68)
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  563.331473]  ? SyS_read+0x230/0x230
[  563.331484]  do_syscall_64+0x1e8/0x640
[  563.331491]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  563.331510]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  563.340912] RIP: 0033:0x459519
[  563.340918] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  563.340928] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  563.340934] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  563.340941] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:43:02 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)

[  563.340947] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  563.340952] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:02 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  563.486255] Bluetooth: Can't register HCI device
08:43:02 executing program 2:
syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$TIOCSCTTY(r0, 0x540e, 0x4)
pwritev(r0, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:02 executing program 5:
r0 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000100)=0xb4, 0x4)
setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000001c0)=[{0x6}]}, 0x10)
close(r0)

08:43:02 executing program 1 (fault-call:2 fault-nth:32):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:03 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f0000000040)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
memfd_create(&(0x7f0000000000)='fd/4\x00', 0x2)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:03 executing program 3:
r0 = dup(0xffffffffffffffff)
setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
ioctl$TIOCNOTTY(r0, 0x5422)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)

[  563.639078] FAULT_INJECTION: forcing a failure.
[  563.639078] name failslab, interval 1, probability 0, space 0, times 0
[  563.691872] CPU: 0 PID: 15820 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  563.699039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  563.699046] Call Trace:
[  563.699069]  dump_stack+0x138/0x19c
[  563.699092]  should_fail.cold+0x10f/0x159
[  563.718812]  should_failslab+0xdb/0x130
[  563.722795]  kmem_cache_alloc+0x2d7/0x780
[  563.722808]  ? wait_for_completion+0x420/0x420
[  563.722828]  __kernfs_new_node+0x70/0x420
[  563.722842]  kernfs_new_node+0x80/0xf0
[  563.731586]  __kernfs_create_file+0x46/0x323
[  563.731606]  sysfs_add_file_mode_ns+0x1e4/0x450
[  563.731621]  sysfs_add_file+0x4f/0x60
[  563.731633]  sysfs_merge_group+0xe2/0x210
[  563.731650]  dpm_sysfs_add+0x121/0x1b0
[  563.731662]  device_add+0x968/0x1490
[  563.739684]  ? device_private_init+0x190/0x190
[  563.739698]  ? kobject_set_name_vargs+0x101/0x150
[  563.739713]  hci_register_dev+0x2d9/0x810
[  563.739722]  ? hci_alloc_dev+0x1770/0x1c60
[  563.739738]  __vhci_create_device+0x2a6/0x560
[  563.748791]  vhci_write+0x2a1/0x437
[  563.748808]  __vfs_write+0x4a7/0x6b0
[  563.748822]  ? kernel_read+0x120/0x120
[  563.748843]  ? rw_verify_area+0xea/0x2b0
[  563.768910]  vfs_write+0x198/0x500
[  563.768927]  SyS_write+0xfd/0x230
[  563.768939]  ? SyS_read+0x230/0x230
[  563.768951]  ? do_syscall_64+0x53/0x640
[  563.768962]  ? SyS_read+0x230/0x230
[  563.777977]  do_syscall_64+0x1e8/0x640
[  563.777988]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  563.778005]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  563.778014] RIP: 0033:0x459519
[  563.778023] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246
[  563.797919]  ORIG_RAX: 0000000000000001
[  563.797926] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  563.797932] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  563.797938] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  563.797944] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  563.797951] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  563.891052] Bluetooth: Can't register HCI device
08:43:03 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000040)={r0, 0x8, 0x1, 0x2, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20)
openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0)
openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x100, 0x0)
write$P9_RFLUSH(r0, &(0x7f0000000080)={0x7, 0x6d, 0x2}, 0x7)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:03 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:03 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x0)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:03 executing program 5:
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x40001)
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendmsg$key(0xffffffffffffffff, 0x0, 0x4008000)
r1 = socket(0x1, 0x2, 0x8000)
r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00')
sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x48001}, 0x0)
r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80000, 0x0)
ioctl$TIOCGPGRP(r3, 0x540f, 0x0)
setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000880)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000500, 0x0, 0x0, 0x200006ec, 0x2000071c], 0x0, &(0x7f0000000400), &(0x7f0000000500)=ANY=[]}, 0x78)
r4 = perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1)
syz_open_dev$sndseq(0x0, 0x0, 0x20401)
r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, r4, 0x9)
r6 = socket$inet(0x2, 0x4000000000000001, 0x0)
bind$inet(r6, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10)
fcntl$lock(0xffffffffffffffff, 0x0, 0x0)
fsetxattr$security_smack_entry(r5, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x8000000000001, 0x118, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r7 = socket$inet6_udp(0xa, 0x2, 0x0)
getsockname$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000300)=0x1c)
sendto$inet(r6, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10)
getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, 0x0, &(0x7f0000000340))
setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0)
r8 = dup2(r6, r6)
sendmsg$alg(r8, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000480)="f381ac72cdc40eefd1afb5e2d61afd215b96d4097a1504eb9a41c95bd46c389f19ec32ab28f4da4188f68ef0cd811b0da0f8c6b790b2baa96338afeb15beb0fec4536fcbdd2915500fc74d8bdb78ceaf026681f7d4389ce33957ed135ece99b0611701a7ef7271e034d1e6c82c66b23ce5592db1f76986181a1ca9fc6329fbed44bce6158a8ced1d96f4a88e2ac555763b30713f8e58392b0c666e4a11cfd29d87ae0cb06071d33cdb0f76ba10a6176d4e9338c8b811cceff664245b6e4494140aba68faa5678a2b67391d5e33fb7c4cab196df0400554723094a5ae566f34efdf7df91557056737c34e7ade0101cf97328e81ebfd9d39dcd4124f7bab24e170f825d9d5b6", 0x105}], 0x1}, 0x8005)
socket(0x4, 0x800, 0x0)
setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, 0x0, 0x0)
sendto$inet(r6, &(0x7f0000000000), 0xffffff45, 0xc0, 0x0, 0x0)
gettid()

08:43:03 executing program 1 (fault-call:2 fault-nth:33):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:03 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x2, 0x0)
setsockopt$sock_int(r1, 0x1, 0xd, &(0x7f00000000c0)=0x78, 0x4)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  564.002275] FAULT_INJECTION: forcing a failure.
[  564.002275] name failslab, interval 1, probability 0, space 0, times 0
[  564.046341] CPU: 0 PID: 15838 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  564.053496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  564.062854] Call Trace:
[  564.065454]  dump_stack+0x138/0x19c
[  564.069093]  should_fail.cold+0x10f/0x159
[  564.073249]  should_failslab+0xdb/0x130
[  564.077229]  kmem_cache_alloc+0x2d7/0x780
[  564.081388]  ? trace_hardirqs_on_caller+0x400/0x590
[  564.081404]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[  564.081420]  __kernfs_new_node+0x70/0x420
[  564.081433]  kernfs_new_node+0x80/0xf0
[  564.091200]  __kernfs_create_file+0x46/0x323
[  564.091215]  sysfs_add_file_mode_ns+0x1e4/0x450
[  564.091229]  sysfs_add_file+0x4f/0x60
[  564.091239]  sysfs_merge_group+0xe2/0x210
[  564.091255]  dpm_sysfs_add+0x121/0x1b0
[  564.091266]  device_add+0x968/0x1490
[  564.091282]  ? device_private_init+0x190/0x190
[  564.128455]  hci_register_dev+0x2d9/0x810
[  564.132629]  ? hci_init_sysfs+0x7c/0xa0
[  564.136620]  __vhci_create_device+0x2a6/0x560
[  564.141130]  vhci_write+0x2a1/0x437
[  564.144942]  __vfs_write+0x4a7/0x6b0
[  564.148659]  ? kernel_read+0x120/0x120
[  564.152561]  ? rw_verify_area+0xea/0x2b0
[  564.156634]  vfs_write+0x198/0x500
[  564.160182]  SyS_write+0xfd/0x230
[  564.163643]  ? SyS_read+0x230/0x230
[  564.167273]  ? do_syscall_64+0x53/0x640
[  564.171248]  ? SyS_read+0x230/0x230
[  564.174907]  do_syscall_64+0x1e8/0x640
[  564.178797]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  564.183652]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  564.188842] RIP: 0033:0x459519
[  564.192088] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  564.199801] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  564.207070] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  564.214338] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  564.221636] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  564.228906] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:03 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='com.apple.system.Security\x00', &(0x7f0000000180)=""/189, 0xbd)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x4000, 0x0)
close(r0)
ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f00000000c0))

08:43:03 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  564.372932] device bridge_slave_1 left promiscuous mode
[  564.387476] bridge0: port 2(bridge_slave_1) entered disabled state
08:43:03 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000140)={0x4, 0x0, [], {0x50f380ba71dcf12, @bt={0x3, 0xfffffffffffffffe, 0x1, 0x2, 0xff, 0x10000, 0x7ff, 0x80000000, 0x3600000000000, 0xfffffffffffffff8, 0x6, 0x5, 0x400, 0x200, 0x5, 0x10}}})
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e20, @rand_addr=0x80000001}, @in6={0xa, 0x4e24, 0xfffffffffffffff8, @rand_addr="2c12ca792164def8d543368ff085fb8b", 0x80}, @in={0x2, 0x4e24, @multicast2}, @in6={0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0x1d}, 0x6f9}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e22, 0xbbc1, @empty, 0x8}], 0xa4)

08:43:03 executing program 3:
r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00')
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000180)={@mcast2, <r1=>0x0}, &(0x7f00000001c0)=0x14)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000340)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000fed000/0x13000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000240)="2a11be6b3faab9e3cdecec71179ae13eaa21d91ce11f0e577fed6e2d4ea8414c939c470a51079d65f3382651acdb318bad88232fb815c7daad29c08926b119657b98851636118ede92dfb9dd3f9fd7bd55efac4afb3766174ce300243c603b53d279ca42437287c618ad60a1a8e880ef495fe4a10d6c015e81e950fcc54f794f4ef9ab0a6f933ada5514b1a2913387ee26cdf703206faa610a5dcd2f099cde7c2fbc4292a524fdf8997026bdf6e4a4415257c262823410a93a7ff56427b995a739518ddee915", 0xc6, r0}, 0x68)
connect$packet(r0, &(0x7f0000000200)={0x11, 0x4, r1, 0x1, 0xffffffffffffffff, 0x6, @link_local}, 0x14)
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$bt_sco_SCO_OPTIONS(r0, 0x11, 0x1, &(0x7f00000000c0)=""/56, &(0x7f0000000100)=0x38)
close(r2)
remap_file_pages(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x0, 0x6, 0x41003)

[  564.466803] device bridge_slave_0 left promiscuous mode
[  564.479924] bridge0: port 1(bridge_slave_0) entered disabled state
08:43:03 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
fsync(r0)
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
sendto$isdn(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0100000009000000e108ca200ad8ac5967dd7c6fd761a560613e1e1f33bd6d7baca6fa311bf8a3db35f377360aca610a79cc93b0d1a7db4daa"], 0x43, 0x4000000, &(0x7f0000000080)={0x22, 0x8, 0x6, 0x100, 0x5}, 0x6)
r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdo>f#\x05\x00\x00\xad\x1cD$0uZ\xdc\v\x9ah*4\xfb\x93\xce%A\xa7]\xb6\xc3G}\x18\x8b\xb3\xe8\x83\xb5\xb8\xf5k\xed\x06I\xe1\x14b\x94\xa8\xe4\xbeW*~\x81\xb8\n\as\x03\xe8\xc7\x84~c\xa9\xd5\xf9=f')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:04 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0xa0702)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
fcntl$setpipe(r0, 0x407, 0xf)

08:43:04 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
r3 = getegid()
fchown(r0, r2, r3)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000000)=0x40, &(0x7f0000000040)=0x4)

[  564.732800] Bluetooth: Can't register HCI device
[  564.797417] device hsr_slave_1 left promiscuous mode
08:43:04 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(0xffffffffffffffff, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  564.844365] device hsr_slave_0 left promiscuous mode
[  564.886365] team0 (unregistering): Port device team_slave_1 removed
[  564.912774] team0 (unregistering): Port device team_slave_0 removed
[  564.948595] bond0 (unregistering): Releasing backup interface bond_slave_1
[  565.014839] bond0 (unregistering): Releasing backup interface bond_slave_0
[  565.083739] bond0 (unregistering): Released all slaves
08:43:04 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0)
r1 = dup(r0)
setreuid(0x0, 0x0)
recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00b85)

[  567.530216] IPVS: ftp: loaded support on port[0] = 21
[  567.836975] chnl_net:caif_netlink_parms(): no params data found
[  567.868836] bridge0: port 1(bridge_slave_0) entered blocking state
[  567.875330] bridge0: port 1(bridge_slave_0) entered disabled state
[  567.882690] device bridge_slave_0 entered promiscuous mode
[  567.889242] bridge0: port 2(bridge_slave_1) entered blocking state
[  567.895996] bridge0: port 2(bridge_slave_1) entered disabled state
[  567.903220] device bridge_slave_1 entered promiscuous mode
[  567.920743] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  567.929545] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  567.947875] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  567.955144] team0: Port device team_slave_0 added
[  567.960897] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  567.967941] team0: Port device team_slave_1 added
[  567.973325] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  567.980559] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  568.042221] device hsr_slave_0 entered promiscuous mode
[  568.110511] device hsr_slave_1 entered promiscuous mode
[  568.150806] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  568.157749] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  568.170746] bridge0: port 2(bridge_slave_1) entered blocking state
[  568.177111] bridge0: port 2(bridge_slave_1) entered forwarding state
[  568.183781] bridge0: port 1(bridge_slave_0) entered blocking state
[  568.190168] bridge0: port 1(bridge_slave_0) entered forwarding state
[  568.216960] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  568.223314] 8021q: adding VLAN 0 to HW filter on device bond0
[  568.231977] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  568.239975] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  568.247795] bridge0: port 1(bridge_slave_0) entered disabled state
[  568.255026] bridge0: port 2(bridge_slave_1) entered disabled state
[  568.265266] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  568.271566] 8021q: adding VLAN 0 to HW filter on device team0
[  568.279932] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  568.287603] bridge0: port 1(bridge_slave_0) entered blocking state
[  568.293974] bridge0: port 1(bridge_slave_0) entered forwarding state
[  568.310840] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  568.318399] bridge0: port 2(bridge_slave_1) entered blocking state
[  568.324820] bridge0: port 2(bridge_slave_1) entered forwarding state
[  568.333185] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  568.341269] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  568.350238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  568.362822] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  568.373575] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  568.384318] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  568.391044] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  568.398530] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  568.406082] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  568.417843] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  568.427981] 8021q: adding VLAN 0 to HW filter on device batadv0
[  568.830825] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340), 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:09 executing program 1 (fault-call:2 fault-nth:34):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:09 executing program 2:
r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0xff, 0x0)
ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000180)={0x7, 0x5, 0x0, 0x100000000})
r1 = socket(0xa, 0x80000, 0x4)
ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000000)="479589b3e10cca1538385561f1a5a52f30812fe9cd8472add5c62acfd8fe82c3f73e015809b86ffcdc26b2de3f6a7a4be51cd1ed254da67d54a7df65e9c261c3919d2128ee51e8dcb707f079c49012ef46305f250492d368f1c31ffd46a3df02e3d1f5ea8eb179c0926958235770026e7c0e04a6512f6c6e91fd9d1143d00e20f2027ad1aecfbbe6ec9255dbb41d896b4b10ec3a888cbc06b90278921d60ff7b09e933e1345fbf50e3fbcd08b2b7fecf0885c79e40623496e100dc6e7ef16bccc48ca22b00ad49c953f32f46ae968a28a805e14354827ab527b431419ee39f9a783f5bc2a75b")
open_by_handle_at(r0, &(0x7f00000002c0)={0x3e, 0x9, "0b841491ca858c587c606e783cd278eff1d7e6af0227cc9c1c3227260fdfdec1519e482ef47620322574585e3830ee8e15e84c0febf3"}, 0x410100)
r2 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r3 = openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r4, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
pread64(r3, &(0x7f00000001c0)=""/237, 0xed, 0x0)

08:43:09 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x0, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:09 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x6, 0x200)
setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f00000000c0)=0x8, 0x4)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4)
close(r0)

08:43:09 executing program 5:
r0 = socket$vsock_stream(0x28, 0x1, 0x0)
connect$vsock_dgram(r0, &(0x7f0000000640)={0x28, 0x0, 0x0, @my}, 0x10)

08:43:09 executing program 5:
r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x7, 0x0)
ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x0, 0x1, 0x0, [], 0x0})

[  569.688486] FAULT_INJECTION: forcing a failure.
[  569.688486] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  569.700351] CPU: 1 PID: 15912 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  569.707449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  569.716801] Call Trace:
[  569.719420]  dump_stack+0x138/0x19c
[  569.723056]  should_fail.cold+0x10f/0x159
[  569.727206]  __alloc_pages_nodemask+0x1d6/0x7a0
[  569.731873]  ? __alloc_pages_slowpath+0x2930/0x2930
[  569.736908]  cache_grow_begin+0x80/0x400
[  569.740974]  kmem_cache_alloc_trace+0x6b2/0x790
[  569.745638]  ? retint_kernel+0x2d/0x2d
[  569.749527]  ? devm_device_remove_groups+0x50/0x50
[  569.754451]  kobject_uevent_env+0x378/0xc23
[  569.758768]  ? wait_for_completion+0x420/0x420
[  569.763437]  ? _raw_spin_unlock_irq+0x54/0x90
[  569.767936]  kobject_uevent+0x20/0x26
[  569.771739]  device_add+0xa3e/0x1490
[  569.775451]  ? device_private_init+0x190/0x190
[  569.780038]  hci_register_dev+0x2d9/0x810
[  569.784190]  __vhci_create_device+0x2a6/0x560
[  569.788686]  vhci_write+0x2a1/0x437
[  569.792312]  __vfs_write+0x4a7/0x6b0
[  569.796023]  ? kernel_read+0x120/0x120
[  569.799916]  ? rw_verify_area+0xea/0x2b0
[  569.803977]  vfs_write+0x198/0x500
[  569.807513]  SyS_write+0xfd/0x230
[  569.810965]  ? SyS_read+0x230/0x230
[  569.814590]  ? do_syscall_64+0x53/0x640
[  569.818561]  ? SyS_read+0x230/0x230
[  569.822194]  do_syscall_64+0x1e8/0x640
[  569.826079]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  569.830927]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  569.836112] RIP: 0033:0x459519
[  569.839293] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  569.847173] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  569.854438] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  569.861708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  569.868976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  569.876242] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:09 executing program 2:
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=<r0=>0x0)
r1 = syz_open_procfs(r0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000))
gettid()
r2 = getpgid(0x0)
r3 = syz_open_procfs(r2, &(0x7f0000000100)='fd/4\x00')
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:09 executing program 3:
r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='net/udplite6\x00')
ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000240))
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x5)
r2 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x3, 0x2)
r3 = getuid()
getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000880)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000980)=0xe8)
openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000d00)='/selinux/enforce\x00', 0x8000, 0x0)
getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000009c0)={{{@in=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@empty}, 0x0, @in=@remote}}, &(0x7f0000000ac0)=0xe8)
getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b00)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}}, {{@in6=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000000c00)=0xe8)
syz_mount_image$hfsplus(&(0x7f0000000280)='hfsplus\x00', &(0x7f00000002c0)='./file0\x00', 0x5, 0xa, &(0x7f0000000780)=[{&(0x7f0000000300)="d669eadee443eea6bd219b87931e164e8552279fb637192790a47be5b5df43ca0dd70a", 0x23, 0x14}, {&(0x7f0000000340)="1890b9f3da25f6700360ceb1aba1defbdb19eafe7a1163dc4802f043b7f175e67fc95d2f5c8878d192eb0ce0188cb066aa242119567394d05442b56b83034fffa6225055eb4501f373b4d9fbd351391768ad2a6fb0029308f636491465f62f8bcec51ddfcdec7a5eaa934d72c29b6a56d92f968ee565", 0x76, 0x1}, {&(0x7f00000003c0)="4732fe70f8dd2043ef13315b68226eeb9f025d52628a1430a269a9912cb7b7ea10b40f", 0x23, 0xbde4}, {&(0x7f0000000400)="71d3550e29054b8a8abc0bbef13a5079b682cc1d576c8e7e874c01e74939e82f3dcf", 0x22, 0x2}, {&(0x7f0000000440)="9b914610bd6220bc25ed106ffab6568102bf7e3d717f60273983a0bda12486cc9069bbf221955dfd7ee5a0816573491e34fab3f5982c683bb96eab21a110f7f4", 0x40, 0x8}, {&(0x7f0000000480)="cb0ebb411f6483d0d9cfc1d6396323867f0a8e33c1de002dfe5ca1f3d6b0a0718fdf18f74deab1b62a8a481c7ec64ed1c6bf52120a9c5e9fd14a46e906e00849622e00eacc865861af94d29380a18a887ce9d1afced63fb765ade69b997e9e39c1884607e45719692802a762559deafc917ee1", 0x73, 0x1359}, {&(0x7f0000000500)="2feac7ccd17d02009ee3d39271bef2c9e50887355c79ff94fb6927f224242539afc17e3c5271e8cfe6e6f4e52be019ea124f848845ea42bbc28f2927f59637be47322657acc61da83c1f5e3d43c4f1dd25506b21bb3f74e8d901401293dc064a31b02402da9ac57b34dc711bd842010e0ae8207df7d5ff42aa2da5e1803c03b4af3fd55b9339e8931f490605f04a8e206e583923e90ebf2559a6a642b9a0bb7d51c944a0a615c7dff54eb3518441a90dcac801335bfdac2d2e7bc3019550122129f7ea55c3c82a9b555279f641b6ed66aeba", 0xd2, 0x4}, {&(0x7f0000000600)="57dcc1f8aedb8392ce406d5fb72e98346f13ee26b82e848b7f514e38adb2087933c09b9778b69853558094cde148e202d3c5161b8c7189ac2bbe1806e9e5b02b0e94d52679b52912fa6d7e64e748c4b1db37136c83cfb88622831aa6a84a176575cb5a7800cdc0c6ea73ccba445b3a98", 0x70, 0x7}, {&(0x7f0000000680)="e1b61dc6590a187f32514f00a6ed551e95dc3a7bd6cae1275b625599365fd3e36ca3847a10049f1005be997cd9c97d5287c16bed9a4e428dc03179a7c9ca75ebe3ed0f39601245795d60e4984b0008f1402a7e27335909757cdaa866c1f7113ade7902c74064b7eb65c1df1c0c76633e6bc747e7d3dc6220764cb0beb58ae93f8a64b15901e56a3b934a43af5cc05d84da7ac8af452c6049b649279d983111", 0x9f, 0x9}, {&(0x7f0000000740)="962fc532ccb5e1fc69cff61a5e6945869763bfa3be08b8153e056a1a14d2a7d8", 0x20, 0x5}], 0x80, &(0x7f0000000c40)={[{@nodecompose='nodecompose'}], [{@euid_gt={'euid>', r3}}, {@measure='measure'}, {@euid_gt={'euid>', r4}}, {@uid_lt={'uid<', r5}}, {@seclabel='seclabel'}, {@seclabel='seclabel'}, {@fowner_eq={'fowner', 0x3d, r6}}]})
write$selinux_load(r2, &(0x7f0000000140)={0xf97cff8c, 0x8, 'SE Linux', "25645500aba0a9944f750e49f719dd62192a308f94fca832abcd67ed4b"}, 0x2d)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000001c0))
socket$packet(0x11, 0x2, 0x300)
close(r1)
syz_open_dev$audion(&(0x7f00000000c0)='/dev/audio#\x00', 0x2, 0x240000)
write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000180)={0x2, 0x200}, 0x2)
syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x80000000, 0xc000)

08:43:09 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
readv(r0, &(0x7f00000018c0)=[{&(0x7f0000000600)=""/153, 0x99}, {0x0}, {0x0}], 0x3)
r1 = dup(r0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505)
shutdown(r1, 0x0)
dup(0xffffffffffffffff)
shutdown(0xffffffffffffffff, 0x0)
readv(r2, &(0x7f00000009c0)=[{&(0x7f0000000040)=""/49, 0x31}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8)
shutdown(r2, 0x0)

08:43:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340), 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:09 executing program 1 (fault-call:2 fault-nth:35):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  570.049756] hfsplus: unable to parse mount options
08:43:09 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000000))
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180))
ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000440)=<r1=>0x0)
r2 = syz_open_procfs(r1, &(0x7f0000000340)='net/rt_acct\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  570.075113] FAULT_INJECTION: forcing a failure.
[  570.075113] name failslab, interval 1, probability 0, space 0, times 0
08:43:09 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340), 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

[  570.117240] CPU: 1 PID: 15946 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  570.124482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  570.133887] Call Trace:
[  570.136498]  dump_stack+0x138/0x19c
[  570.140152]  should_fail.cold+0x10f/0x159
[  570.144319]  should_failslab+0xdb/0x130
[  570.148308]  __kmalloc+0x2f0/0x7a0
[  570.151862]  ? kobject_get_path+0xbb/0x1a0
[  570.156108]  kobject_get_path+0xbb/0x1a0
[  570.160186]  ? devm_device_remove_groups+0x50/0x50
[  570.165138]  kobject_uevent_env+0x39c/0xc23
[  570.169479]  ? wait_for_completion+0x420/0x420
[  570.174065]  ? _raw_spin_unlock_irq+0x54/0x90
[  570.178578]  kobject_uevent+0x20/0x26
[  570.182392]  device_add+0xa3e/0x1490
[  570.186121]  ? device_private_init+0x190/0x190
[  570.190718]  hci_register_dev+0x2d9/0x810
[  570.194877]  __vhci_create_device+0x2a6/0x560
[  570.199378]  vhci_write+0x2a1/0x437
[  570.203015]  __vfs_write+0x4a7/0x6b0
[  570.206733]  ? kernel_read+0x120/0x120
[  570.210635]  ? rw_verify_area+0xea/0x2b0
[  570.214704]  vfs_write+0x198/0x500
[  570.218253]  SyS_write+0xfd/0x230
[  570.221708]  ? SyS_read+0x230/0x230
[  570.225341]  ? do_syscall_64+0x53/0x640
[  570.229576]  ? SyS_read+0x230/0x230
[  570.233209]  do_syscall_64+0x1e8/0x640
[  570.237107]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  570.241958]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  570.247147] RIP: 0033:0x459519
[  570.250334] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  570.258040] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:43:09 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='cpuset.effective_mems\x00', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  570.265314] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  570.272584] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  570.279864] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  570.287134] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:09 executing program 1 (fault-call:2 fault-nth:36):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  570.376552] hfsplus: unable to parse mount options
08:43:09 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x0, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:09 executing program 2:
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x882, 0x0)
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x16, 0x3, 0x5, 0x28, 0x0, 0x70bd2c, 0x25dfdbfb, [@sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e21, 0x7f, @remote, 0x1}, @in6={0xa, 0x4e22, 0x4, @local, 0x8000}}, @sadb_lifetime={0x4, 0x3, 0x7, 0x10000, 0x1}, @sadb_ident={0x2, 0xb, 0x7, 0x0, 0x1}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e21, @rand_addr=0x81}, @in={0x2, 0x4e23, @loopback}}, @sadb_ident={0x2, 0xa, 0xfffffffffffffffd, 0x0, 0xfffffffffffffff9}, @sadb_x_sec_ctx={0xa, 0x18, 0x0, 0x1000, 0x45, "d2532e65ec8716a81094ee1788b909067bfc33388660aea0b2b244bebbd6f1a1cb4b67a4e62944c2fda0576dac0369ef159c22e79a4907546251dbb828a1c25d8a1dc3c6ed"}, @sadb_x_sa2={0x2, 0x13, 0x200, 0x0, 0x0, 0x70bd29, 0x3503}, @sadb_address={0x5, 0x17, 0x32, 0x80, 0x0, @in6={0xa, 0x4e22, 0x4, @loopback, 0x5399cec7}}]}, 0x140}}, 0x4040000)

08:43:09 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100, 0x0)
setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000100)=0x6, 0x4)
setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), 0x4)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r1)

08:43:09 executing program 5:
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = memfd_create(&(0x7f0000000080)='dev ', 0x3)
write(r2, &(0x7f0000000180)="16", 0x1)
sendfile(r1, r2, &(0x7f0000000000), 0x0)
fcntl$addseals(r2, 0x409, 0xd)
dup2(r1, r0)

[  570.533501] FAULT_INJECTION: forcing a failure.
[  570.533501] name failslab, interval 1, probability 0, space 0, times 0
[  570.561424] CPU: 1 PID: 15965 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  570.568695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  570.578051] Call Trace:
[  570.580703]  dump_stack+0x138/0x19c
[  570.584347]  should_fail.cold+0x10f/0x159
[  570.588510]  should_failslab+0xdb/0x130
[  570.592495]  kmem_cache_alloc_node+0x287/0x780
[  570.592516]  __alloc_skb+0x9c/0x500
[  570.592527]  ? skb_scrub_packet+0x4b0/0x4b0
[  570.592543]  ? netlink_has_listeners+0x20a/0x330
[  570.592558]  kobject_uevent_env+0x781/0xc23
[  570.592574]  kobject_uevent+0x20/0x26
[  570.605625]  device_add+0xa3e/0x1490
[  570.622187]  ? device_private_init+0x190/0x190
[  570.626822]  hci_register_dev+0x2d9/0x810
[  570.630977]  ? hci_init_sysfs+0x7c/0xa0
[  570.634964]  __vhci_create_device+0x2a6/0x560
[  570.639475]  vhci_write+0x2a1/0x437
[  570.643120]  __vfs_write+0x4a7/0x6b0
[  570.646846]  ? kernel_read+0x120/0x120
[  570.650747]  ? rw_verify_area+0xea/0x2b0
[  570.654813]  vfs_write+0x198/0x500
[  570.658360]  SyS_write+0xfd/0x230
[  570.661816]  ? SyS_read+0x230/0x230
[  570.665620]  ? do_syscall_64+0x53/0x640
[  570.669631]  ? SyS_read+0x230/0x230
[  570.673270]  do_syscall_64+0x1e8/0x640
[  570.677163]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  570.682018]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  570.687210] RIP: 0033:0x459519
[  570.690396] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  570.698111] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  570.705383] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  570.712655] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  570.719928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  570.727206] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:10 executing program 2:
r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x3f, 0x111000)
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000140)={0x1, <r1=>0x0, 0x10001, 0x3})
ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000180)={0xd0, r1})
ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000000)=<r2=>0x0)
r3 = syz_open_procfs(r2, &(0x7f0000000040)='\x00\x00\x00\x00\x00egy\xe5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x00\x00\x00\x00\x00')
openat$cgroup_ro(r3, &(0x7f0000001500)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf0\x1f\x18&\x9e\x88\xe3\x80\x1d\xad9\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\x03\x00\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xc0(\x81\x9a\xcf\xf8\xdbj6\xaa\\\xe9K\xef\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8n\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7\xd2\x85\xd1\xae\xaa\x9d\x85+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91@\x00\x00\x00\xa9\xab\x05&\xfb\x94\xd12\xeec\xa3\x85\x13\x93\xd0q\x1c\xc0K\x8aj[\xa3\xa0\a\x82uG;L\x97q\xd5\xdb\xa8\xb8.ZB\xa1_\xb1\xaf\x0eU\xf9\xd7;\xfd:,!\xb6\xac\nN\xda3\xfd\x02\x1b9\xe7J\x1c\x96\x10of\xb9\x7f\x9e\xbc\x7f\x16S/\xb8D\xb7\x8cM\x1b\xe1\x9fo<\x9dp', 0x0, 0x0)
r4 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r4, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:10 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
poll(0x0, 0x0, 0x4e)
r1 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r1, 0x0, 0x100000007, 0x0, 0x0, 0x800e00525)
readv(r0, &(0x7f0000001040)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1)
shutdown(r1, 0x0)

[  570.780562] device bridge_slave_1 left promiscuous mode
[  570.786281] bridge0: port 2(bridge_slave_1) entered disabled state
08:43:10 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000))
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:10 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000000)={0x6, [0x9, 0x2, 0xebf5, 0x1f9a5558, 0x0, 0x3]}, 0x10)
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  570.863526] device bridge_slave_0 left promiscuous mode
[  570.873827] bridge0: port 1(bridge_slave_0) entered disabled state
08:43:10 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080))

[  571.142690] device hsr_slave_1 left promiscuous mode
[  571.195490] device hsr_slave_0 left promiscuous mode
[  571.263048] team0 (unregistering): Port device team_slave_1 removed
[  571.273600] team0 (unregistering): Port device team_slave_0 removed
[  571.282889] bond0 (unregistering): Releasing backup interface bond_slave_1
[  571.335275] bond0 (unregistering): Releasing backup interface bond_slave_0
[  571.413670] bond0 (unregistering): Released all slaves
[  573.980265] IPVS: ftp: loaded support on port[0] = 21
[  574.367140] chnl_net:caif_netlink_parms(): no params data found
[  574.402768] bridge0: port 1(bridge_slave_0) entered blocking state
[  574.409173] bridge0: port 1(bridge_slave_0) entered disabled state
[  574.416961] device bridge_slave_0 entered promiscuous mode
[  574.423847] bridge0: port 2(bridge_slave_1) entered blocking state
[  574.430329] bridge0: port 2(bridge_slave_1) entered disabled state
[  574.437203] device bridge_slave_1 entered promiscuous mode
[  574.454560] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  574.463433] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  574.479201] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  574.486441] team0: Port device team_slave_0 added
[  574.492593] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  574.499642] team0: Port device team_slave_1 added
[  574.505002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  574.512238] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  574.592197] device hsr_slave_0 entered promiscuous mode
[  574.640459] device hsr_slave_1 entered promiscuous mode
[  574.710730] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  574.717651] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  574.729962] bridge0: port 2(bridge_slave_1) entered blocking state
[  574.736357] bridge0: port 2(bridge_slave_1) entered forwarding state
[  574.743036] bridge0: port 1(bridge_slave_0) entered blocking state
[  574.749379] bridge0: port 1(bridge_slave_0) entered forwarding state
[  574.775993] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  574.782545] 8021q: adding VLAN 0 to HW filter on device bond0
[  574.790670] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  574.799614] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  574.807450] bridge0: port 1(bridge_slave_0) entered disabled state
[  574.814417] bridge0: port 2(bridge_slave_1) entered disabled state
[  574.824956] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  574.831340] 8021q: adding VLAN 0 to HW filter on device team0
[  574.839503] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  574.847217] bridge0: port 1(bridge_slave_0) entered blocking state
[  574.853599] bridge0: port 1(bridge_slave_0) entered forwarding state
[  574.863128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  574.870874] bridge0: port 2(bridge_slave_1) entered blocking state
[  574.877219] bridge0: port 2(bridge_slave_1) entered forwarding state
[  574.891251] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  574.898907] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  574.909476] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  574.919469] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  574.931985] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  574.941812] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  574.947821] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  574.959468] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  574.969266] 8021q: adding VLAN 0 to HW filter on device batadv0
[  575.360962] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:15 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
socket$netlink(0x10, 0x3, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:15 executing program 2:
syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x40000)
r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r0, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:15 executing program 1 (fault-call:2 fault-nth:37):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:15 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x3)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:15 executing program 5:
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x0, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0)
request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd)
r0 = inotify_init()
setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0)
syz_open_dev$loop(0x0, 0x0, 0x10000)
sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd84)
getuid()
getresgid(0x0, &(0x7f0000000180), 0x0)
getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={[], [], @empty}, @in6=@initdev}}, {{@in=@initdev}, 0x0, @in6}}, 0x0)
inotify_rm_watch(r0, 0x0)
stat(0x0, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x0, 0x0)
clock_gettime(0x0, 0x0)

08:43:15 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x0, &(0x7f0000000040)=0x401)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:15 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup.cpu\x00\x97\xebH\x88N\x81CxA\xdb\xa6\xfd*\xb6mY\xb8\xac\xc3\x94TD\xb3\xca\x135\xcf7\xab\xb9\xee\x8e\x89\x94#\x83\xb3\xfcC\x80\xc38\'\x12\')\xb3\x19\x18\x11\xceD\a\xf2\xe1\x86\x84F\x88O\xf5V\x90_\x10$o;\xa9[\x185\x92{/\x99\x8d*<\x98 \xb2G\xf4?g3.\xb9\v\x96\x9f~\x90B*\x0f\x93y\n\xd8-\xc11\xa2\t\x00\x00\x00\x00\x00\x00\x00\xa8\xef\x17\x83vY\x82\xa62V\x87(\x8c\x8c4[\x1c\x99\x98\x96\x89\xf4\x861\xb9\x8e\xf2(\x8dC\xb3pd\xda\xcbK\xcaz\xcd\xa3\x88dH\x8a\xf3m\xad\x9e\xd9\x1d@r\xc2\x95w\x80\x83:\x8e \x10\x15\xc4\xcf\xefPT.[\xb5\xf9\x86/pD\b\xcf;n+\rxi\x91\xc1\fw\x95\xc7>\x8d\xb7\xafY\x9a\x06\x87;G\xbc\xd2\x01\x00\x00\x00C\xb9\xcc\"\xe5\x91E\xe9\xfd\x86`\xf8\xd3\xbd\xe4\xa2>=Z\xa5\x9fU6cf\a\xb1\xbd\x8a\xcf\x13\x03\x87[(\x95\xf7\xcf\xf0\xabJ\x85a:\'ah\x7f\xf0\x8b\xf5\x01\xd0`g\xa7>\xb2\xf8ND;e\x06y@\xc3\xb5\xb3\xef\xa8=f\xf11\xddGL\x18s\xb3$\xa9\xc8s\b0\xc6{\x8b\x18o/\x7f\xa2\x87', 0x200002, 0x0)
syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0)
r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0)
fchdir(r2)
r3 = open(&(0x7f0000000040)='./bus\x00', 0x1fe, 0x0)
write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x5)
perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
unlink(&(0x7f0000001e00)='./bus\x00')
setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0)
sendfile(r3, r3, &(0x7f0000000000), 0x8080fffffffe)
socket$nl_netfilter(0x10, 0x3, 0xc)
creat(&(0x7f00000003c0)='./file1\x00', 0x8)
openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0)
r4 = openat$cgroup_int(r1, &(0x7f00000000c0)='cpuset.mem_exclusive\x00', 0x2, 0x0)
getsockopt$EBT_SO_GET_INIT_INFO(0xffffffffffffffff, 0x0, 0x82, &(0x7f0000000140)={'nat\x00'}, &(0x7f00000001c0)=0x78)
sendfile(r4, 0xffffffffffffffff, 0x0, 0x2)
ioctl$SG_SET_DEBUG(0xffffffffffffffff, 0x227e, &(0x7f0000000080)=0x1)
getsockopt(0xffffffffffffffff, 0x5d8, 0x7, 0x0, &(0x7f0000000100))
close(r0)
r5 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2)
ioctl$KVM_SET_SIGNAL_MASK(r5, 0x4004ae8b, &(0x7f00000000c0)={0x4f, "33f9ebe0ccdd149db1be0452b9ef5c8be03d53af63c84eb27fe468008b7d788450f78b0a3398f84eba67f1b3c5df83a45358ca3768fd546fd89bd173d3f9fbcb5fc1ee891b34c71266bac8b9df95ee"})
close(r0)

[  576.174036] FAULT_INJECTION: forcing a failure.
[  576.174036] name failslab, interval 1, probability 0, space 0, times 0
[  576.203322] CPU: 1 PID: 16028 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  576.210469] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  576.210475] Call Trace:
08:43:15 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xe0\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;\x13@\xbf\xd2\x03|`\xc0W5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@\x00'/395, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000500))
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000440)={'broute\x00', 0x0, 0x3, 0x7e, [], 0x6, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000300)=""/126}, &(0x7f0000000380)=0x78)
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000004c0))
getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000), &(0x7f0000000040)=0xfffffffffffffe3f)

[  576.210497]  dump_stack+0x138/0x19c
[  576.210519]  should_fail.cold+0x10f/0x159
[  576.210541]  should_failslab+0xdb/0x130
[  576.210558]  kmem_cache_alloc_node_trace+0x280/0x770
[  576.210573]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  576.230292]  __kmalloc_node_track_caller+0x3d/0x80
[  576.230310]  __kmalloc_reserve.isra.0+0x40/0xe0
[  576.230323]  __alloc_skb+0xcf/0x500
[  576.230333]  ? skb_scrub_packet+0x4b0/0x4b0
[  576.230344]  ? strlen+0x65/0xa0
[  576.230357]  kobject_uevent_env+0x781/0xc23
[  576.230371]  ? _raw_spin_unlock_irq+0x54/0x90
[  576.230385]  kobject_uevent+0x20/0x26
[  576.230396]  device_add+0xa3e/0x1490
[  576.230409]  ? device_private_init+0x190/0x190
[  576.230418]  ? kobject_set_name_vargs+0x101/0x150
[  576.230430]  hci_register_dev+0x2d9/0x810
[  576.230446]  __vhci_create_device+0x2a6/0x560
[  576.230459]  vhci_write+0x2a1/0x437
[  576.230472]  __vfs_write+0x4a7/0x6b0
[  576.230485]  ? kernel_read+0x120/0x120
[  576.230505]  ? rw_verify_area+0xea/0x2b0
[  576.239572]  vfs_write+0x198/0x500
[  576.239588]  SyS_write+0xfd/0x230
08:43:15 executing program 5:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c)
write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c)

[  576.239600]  ? SyS_read+0x230/0x230
[  576.239611]  ? do_syscall_64+0x53/0x640
[  576.239622]  ? SyS_read+0x230/0x230
[  576.249980]  do_syscall_64+0x1e8/0x640
[  576.249992]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  576.250008]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  576.250017] RIP: 0033:0x459519
[  576.250023] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  576.250035] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
08:43:15 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
ioctl$PPPIOCDISCONN(r1, 0x7439)
setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000000080)={0x1, {{0xa, 0x4e21, 0x8000, @remote, 0x13}}}, 0x88)
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000000)=<r2=>0x0)
ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000040))
r3 = syz_open_procfs(r2, &(0x7f00000007c0)='f\xe9/X\x8e2X\x05>\xe7\x994\x00&Q\xf3;?T\x9a\x05\x97\x01)\"\f\x1b\xef/0\x11\xd9D\xc7X\x1c3\xda\xf8\x14G\xb7O\x16\x05\xf2\x81\xd9\xa7I\x88\xfc\xd1\x04#\xe58U\x8d\t\xfd\xaf\xc8SF\x96q\xad\xd2k\xd6\t\x98\xad\x18\xe6]\x1c{E\x06|\xd4\xa2wH\xf5\xe1\xc7h\x9f_\x1f\x16\'H\xddB;\x97&\xden\xdc\xcd\x9d\xe9\x11kg\xf7\xdd\xc7\x17J\xad\x87+\xfa\xf1\r\xcbg [~\x14a\xea\xab\x12\xb2\xda\x871\x92\xa2\xc0\x81\xc3\xaa\xd5\x8cK\x19\x80\xd9\xf7\"\x1d\xcc\x1f\x83X\x16\x97\xe2)+\xb2\x8d\x1f\xdd*\xf9\xe6\xaf\x00'/183)
pwritev(r3, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  576.250040] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  576.250045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  576.250050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  576.250056] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:15 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
socket$netlink(0x10, 0x3, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:15 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x3e, &(0x7f0000000000)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0)
syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0)
r1 = dup(r0)
geteuid()
recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00b85)

08:43:16 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0xffffffff, 0x49})

08:43:16 executing program 1 (fault-call:2 fault-nth:38):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  576.622968] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  576.649267] FAT-fs (loop3): Filesystem has been set read-only
[  576.680348] FAULT_INJECTION: forcing a failure.
[  576.680348] name failslab, interval 1, probability 0, space 0, times 0
[  576.692362] FAT-fs (loop3): error, invalid access to FAT (entry 0x00006500)
[  576.694405] CPU: 0 PID: 16071 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  576.706623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  576.715973] Call Trace:
[  576.715994]  dump_stack+0x138/0x19c
[  576.722193]  should_fail.cold+0x10f/0x159
[  576.722209]  should_failslab+0xdb/0x130
08:43:16 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
socket$netlink(0x10, 0x3, 0x0)
writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1)

08:43:16 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
syz_open_dev$binder(&(0x7f00000001c0)='/dev/binder#\x00', 0x0, 0x0)
prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000200)="11834fa8a1457b11bc5a9aa7d2c2a6dc3717157872cf8534b14b0b3ff89a359eca58cf0e71a5ce7cf8081a3bcd63a9ad68c3fe12112a40f0ab6722", 0x3b, r0}, 0x68)
socket$nl_xfrm(0x10, 0x3, 0x6)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00')
syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x7f, 0x200)
syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x6, 0x804800)
sendmsg$TIPC_CMD_SHOW_PORTS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x800, 0x70bd2a, 0x25dfdbfd, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20040001}, 0x94)

[  576.722223]  kmem_cache_alloc_node_trace+0x280/0x770
[  576.722237]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  576.722252]  __kmalloc_node_track_caller+0x3d/0x80
[  576.730354]  __kmalloc_reserve.isra.0+0x40/0xe0
[  576.740903]  __alloc_skb+0xcf/0x500
[  576.740915]  ? skb_scrub_packet+0x4b0/0x4b0
[  576.740928]  ? netlink_has_listeners+0x20a/0x330
[  576.740939]  ? kobject_uevent_env+0x6a1/0xc23
[  576.740950]  kobject_uevent_env+0x781/0xc23
[  576.750571]  kobject_uevent+0x20/0x26
[  576.750585]  device_add+0xa3e/0x1490
[  576.750598]  ? device_private_init+0x190/0x190
[  576.750622]  hci_register_dev+0x2d9/0x810
[  576.788386]  ? hci_init_sysfs+0x7c/0xa0
[  576.792377]  __vhci_create_device+0x2a6/0x560
[  576.796880]  vhci_write+0x2a1/0x437
[  576.800516]  __vfs_write+0x4a7/0x6b0
[  576.804233]  ? kernel_read+0x120/0x120
[  576.808132]  ? rw_verify_area+0xea/0x2b0
[  576.812230]  vfs_write+0x198/0x500
[  576.815775]  SyS_write+0xfd/0x230
[  576.819229]  ? SyS_read+0x230/0x230
[  576.822860]  ? do_syscall_64+0x53/0x640
[  576.826835]  ? SyS_read+0x230/0x230
[  576.830464]  do_syscall_64+0x1e8/0x640
[  576.834351]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  576.839203]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  576.844390] RIP: 0033:0x459519
[  576.847578] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  576.855295] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  576.862608] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  576.869878] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  576.877149] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  576.884421] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:16 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, 0x0)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:16 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
sendmmsg$unix(r0, &(0x7f0000000840)=[{&(0x7f0000000000)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000080)="c7f717e1", 0x4}, {&(0x7f0000000140)="d394fe26c09937f2a1c81a94e7fdf18478ccfaa28794a4f181016a623ce81ed5a9d9685a5b258a07a9713cb0a1a88ba1f7fc075f07a5a47f9d6f5891dfa8e42bb7fb7955ac0cbe1997b13eb581f6735a9726636ca71c542bca18455325c4799a8d32827353d2ce3ec3a1e95e76de2ad6406cf139ec35a87e4767f78032fde02114bf0cd3685b9559675af2156854b41c46cb69b657f16ef67a8459e1f26ef0c9e2cf4d143f31b938e116b8c64f7a12e37eee9fa32cd39b2b2bcd3b8a6691bce05231ace554378117d9aa6e01", 0xcc}, {&(0x7f0000000240)="d0f58305200b1fa8f52ca60dc5f0b110cb956ea73a1895d12771a90623182f3cfbae069b8104aed9a077625a641ec0cc404ec38c99596b538a73b9b9a81e9cb8e053f44c", 0x44}, {&(0x7f00000002c0)="bb68efffc8dabebebf84c778e144c201f84eab845bb35efed2b7f1c0bd78cf8dd2cda63937ec6626bc6eb5f93a26acc9ff616858e82124f767c119862ce134986f9f9ba0485e94df1d4c19fa595c0b019d2d7421393e42ca5c79be20358bca80832b33bbf37be325544e3657eb", 0x6d}, {&(0x7f0000000340)="af329e83b99667aeed8754d3fa6bbf161b3cff6fc2022ba7709579369ee3923ac7a573660bbe3b76d4da6e13e788bcf63998a8f996806eceb5e8ae27f3184ecbac26550e1628fe21ae9e250e4f59f382a4e9fb24aba259f7e8ae5000c944b47b689bad4e17b80b", 0x67}, {&(0x7f0000000700)="ff28d4e1d134abc85cdfe1e952d182780d315543224a2aeb5dd2fd0136e066a87865d8050c28f0883cbfc5f9a1b8d257aaacc45a7b743b3861f71904a722676dec8b76f356ec42e9f913a6aae7378de6be7837e8b7794e184f40148df446bb7ab1e72f06fc73d70328606fca173ec33b5617acec7a6c8b1068b5352f5c85639619149ce1f1aff21f2ede84762660a00552267a91", 0x94}, {&(0x7f00000000c0)}, {&(0x7f0000000640)="6b94246fc64c4a3eb7f340b1e64da2f615983f4bd9a482ce29a6787d30b3ee3d2544f99f0207bbdda34500e76692bdb8b93182b510610cf0863a5b8b35fc3991570c5e99a5f654a060df4ef749f38e4c8f4925de43c35d31e1b7b488dc0b43ed3914f70e142e7abab620352371e31f", 0x6f}], 0x8, &(0x7f0000000440)=[@rights={{0x18, 0x1, 0x1, [r0, r1]}}], 0x18}], 0x1, 0x4000000)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:16 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f00000000c0)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0xffffffffffffffe4)
close(r0)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x40040, 0x0)
getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @remote, @remote}, &(0x7f0000000140)=0xc)
socket(0x10, 0x804, 0x9)
r2 = fcntl$dupfd(r0, 0x0, r0)
ioctl$KVM_ASSIGN_SET_MSIX_NR(r2, 0x4008ae73, &(0x7f0000000000)={0x2, 0x5})

08:43:16 executing program 1 (fault-call:2 fault-nth:39):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:16 executing program 2:
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=<r0=>0x0)
getpgid(0x0)
clock_settime(0x4, &(0x7f0000000040))
r1 = getpid()
r2 = syz_open_procfs(r1, &(0x7f0000000240)='autogroup\x00')
openat$cgroup_ro(r2, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r3 = syz_open_procfs(r0, &(0x7f0000000000)='fd/4\x00')
ioctl$DRM_IOCTL_SET_MASTER(r2, 0x641e)
pwritev(r3, &(0x7f00000000c0)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  577.100536] device bridge_slave_1 left promiscuous mode
[  577.106111] bridge0: port 2(bridge_slave_1) entered disabled state
[  577.169537] audit: type=1400 audit(1561538596.573:81): avc:  denied  { write } for  pid=16092 comm="syz-executor.3" name="net" dev="proc" ino=61859 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1
[  577.172854] FAULT_INJECTION: forcing a failure.
[  577.172854] name failslab, interval 1, probability 0, space 0, times 0
08:43:16 executing program 3:
syz_init_net_socket$x25(0x9, 0x5, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:16 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000700)={0x2, 0x0, 0x2080, {0x10f000, 0xd000, 0x2}, [], "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", "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"})
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

[  577.241135] device bridge_slave_0 left promiscuous mode
[  577.246281] audit: type=1400 audit(1561538596.603:82): avc:  denied  { add_name } for  pid=16092 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1
[  577.247827] bridge0: port 1(bridge_slave_0) entered disabled state
[  577.319238] CPU: 1 PID: 16091 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  577.326421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  577.335779] Call Trace:
[  577.338382]  dump_stack+0x138/0x19c
[  577.342139]  should_fail.cold+0x10f/0x159
[  577.346302]  should_failslab+0xdb/0x130
[  577.350289]  kmem_cache_alloc_node+0x287/0x780
[  577.355407]  __alloc_skb+0x9c/0x500
[  577.359041]  ? skb_scrub_packet+0x4b0/0x4b0
[  577.363366]  ? netlink_has_listeners+0x20a/0x330
[  577.368136]  kobject_uevent_env+0x781/0xc23
[  577.372469]  kobject_uevent+0x20/0x26
[  577.376271]  device_add+0xa3e/0x1490
[  577.379990]  ? device_private_init+0x190/0x190
[  577.384576]  hci_register_dev+0x2d9/0x810
[  577.388726]  ? hci_init_sysfs+0x7c/0xa0
[  577.392705]  __vhci_create_device+0x2a6/0x560
[  577.397202]  vhci_write+0x2a1/0x437
[  577.400864]  __vfs_write+0x4a7/0x6b0
[  577.404581]  ? kernel_read+0x120/0x120
[  577.408468]  ? __inode_security_revalidate+0xd6/0x130
[  577.413664]  ? selinux_file_permission+0x14e/0x480
[  577.418609]  ? rw_verify_area+0xea/0x2b0
[  577.422675]  vfs_write+0x198/0x500
[  577.426225]  SyS_write+0xfd/0x230
[  577.429686]  ? SyS_read+0x230/0x230
[  577.433315]  ? do_syscall_64+0x53/0x640
[  577.437318]  ? SyS_read+0x230/0x230
[  577.440950]  do_syscall_64+0x1e8/0x640
[  577.444841]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  577.449689]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  577.454881] RIP: 0033:0x459519
[  577.458071] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  577.465785] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  577.473056] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  577.480326] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  577.487619] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  577.494895] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  577.511565] audit: type=1400 audit(1561538596.603:83): avc:  denied  { create } for  pid=16092 comm="syz-executor.3" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1
[  577.692889] device hsr_slave_1 left promiscuous mode
[  577.732874] device hsr_slave_0 left promiscuous mode
[  577.784904] team0 (unregistering): Port device team_slave_1 removed
[  577.795051] team0 (unregistering): Port device team_slave_0 removed
[  577.804730] bond0 (unregistering): Releasing backup interface bond_slave_1
[  577.854686] bond0 (unregistering): Releasing backup interface bond_slave_0
[  577.945280] bond0 (unregistering): Released all slaves
08:43:17 executing program 5:
poll(&(0x7f0000000000)=[{0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x40}, {}, {}], 0x6, 0x8000000000043)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xfd6f, 0x0, 0x0, 0x800e004de)
r1 = dup(r0)
poll(&(0x7f0000000080)=[{r1}], 0x1, 0x1ff)
shutdown(r1, 0x0)

08:43:17 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="0e", 0x1}], 0x1, 0x0)
ioctl$BLKALIGNOFF(r1, 0x127a, &(0x7f00000000c0))
ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000000)={'nr0\x00', {0x2, 0x4e20, @rand_addr=0x5}})
ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000040)=0x3f)

08:43:17 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x62000, 0x0)
ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x3)
syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x4, 0x100)
r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x5fda81, 0x0)
ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e22, @local}, {0x306, @dev={[], 0x29}}, 0x10, {0x2, 0x4e21, @remote}, 'gretap0\x00'})
close(r0)
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000300)={0xe0, <r3=>0x0, 0x10000, 0x9})
ioctl$DRM_IOCTL_AGP_UNBIND(r2, 0x40106437, &(0x7f00000000c0)={r3, 0x1})
r4 = gettid()
ptrace$getsig(0x4202, r4, 0x401, &(0x7f0000000100))

[  580.420238] IPVS: ftp: loaded support on port[0] = 21
[  580.747447] chnl_net:caif_netlink_parms(): no params data found
[  580.780630] bridge0: port 1(bridge_slave_0) entered blocking state
[  580.787067] bridge0: port 1(bridge_slave_0) entered disabled state
[  580.794162] device bridge_slave_0 entered promiscuous mode
[  580.801455] bridge0: port 2(bridge_slave_1) entered blocking state
[  580.807842] bridge0: port 2(bridge_slave_1) entered disabled state
[  580.814945] device bridge_slave_1 entered promiscuous mode
[  580.832973] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  580.842288] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  580.858486] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  580.865730] team0: Port device team_slave_0 added
[  580.871434] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  580.878446] team0: Port device team_slave_1 added
[  580.883843] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  580.891214] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  580.943824] device hsr_slave_0 entered promiscuous mode
[  580.990470] device hsr_slave_1 entered promiscuous mode
[  581.030731] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  581.037628] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  581.051270] bridge0: port 2(bridge_slave_1) entered blocking state
[  581.062032] bridge0: port 2(bridge_slave_1) entered forwarding state
[  581.068679] bridge0: port 1(bridge_slave_0) entered blocking state
[  581.075071] bridge0: port 1(bridge_slave_0) entered forwarding state
[  581.102509] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  581.108621] 8021q: adding VLAN 0 to HW filter on device bond0
[  581.118269] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  581.126935] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  581.134045] bridge0: port 1(bridge_slave_0) entered disabled state
[  581.141447] bridge0: port 2(bridge_slave_1) entered disabled state
[  581.151779] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  581.157861] 8021q: adding VLAN 0 to HW filter on device team0
[  581.167356] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  581.178893] bridge0: port 1(bridge_slave_0) entered blocking state
[  581.185288] bridge0: port 1(bridge_slave_0) entered forwarding state
[  581.194971] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  581.202725] bridge0: port 2(bridge_slave_1) entered blocking state
[  581.209095] bridge0: port 2(bridge_slave_1) entered forwarding state
[  581.229180] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  581.239021] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  581.250581] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  581.257418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  581.265237] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  581.273076] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  581.280825] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  581.288917] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  581.296137] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  581.308612] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  581.318760] 8021q: adding VLAN 0 to HW filter on device batadv0
[  581.730763] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:21 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, 0x0, 0x0)

08:43:21 executing program 1 (fault-call:2 fault-nth:40):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:21 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, 0x0)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:21 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000140)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r1 = getpgrp(0x0)
r2 = syz_open_procfs(r1, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:21 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2)
r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82)
ioctl$LOOP_CTL_ADD(r1, 0x4c80, r2)
ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x3)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:21 executing program 5:
r0 = socket(0x1000000010, 0x4008000000803, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @rand_addr="33bda44dc67ec86b5485bc626cd63f99"}}}, 0x90)

[  582.339592] FAULT_INJECTION: forcing a failure.
[  582.339592] name failslab, interval 1, probability 0, space 0, times 0
[  582.356975] CPU: 0 PID: 16143 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  582.364201] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  582.373563] Call Trace:
[  582.376167]  dump_stack+0x138/0x19c
[  582.379807]  should_fail.cold+0x10f/0x159
[  582.383971]  should_failslab+0xdb/0x130
08:43:21 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
r1 = openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x111000, 0x0)
pwritev(0xffffffffffffffff, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bcsh0\x00', <r2=>0x0})
connect$packet(r1, &(0x7f0000000040)={0x11, 0x8, r2, 0x1, 0x3, 0x6, @broadcast}, 0x14)

[  582.387954]  kmem_cache_alloc_node_trace+0x280/0x770
[  582.393064]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  582.393083]  __kmalloc_node_track_caller+0x3d/0x80
[  582.393099]  __kmalloc_reserve.isra.0+0x40/0xe0
[  582.393112]  __alloc_skb+0xcf/0x500
[  582.403495]  ? skb_scrub_packet+0x4b0/0x4b0
[  582.403509]  ? netlink_has_listeners+0x20a/0x330
[  582.403524]  kobject_uevent_env+0x781/0xc23
[  582.403542]  kobject_uevent+0x20/0x26
[  582.403554]  device_add+0xa3e/0x1490
[  582.403567]  ? device_private_init+0x190/0x190
08:43:21 executing program 2:
r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0)
ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000040))
r1 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r1, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
r2 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
pwritev(r2, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)

08:43:21 executing program 2:
r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80')
openat$cgroup_ro(r0, &(0x7f0000000480)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed<?\xc7\xb6s\xca\xff\x96\x9a}+Q\xd2\xd9{\xca\x86Vw\xde\xb3\x86\x91\xfd\xb5p\xdb$ j\xfb\xf8\xedw\xf4\x161a.\xc7\n\xe0X?\xc4\xf4BW\x01\x1f-\xcc\x01\xd0W\xc8\xf09\fV\x1b|A)\xb8\xda#NP\x1c\x9d\x93#V\x9f\"Kgn{\x96\xaa\xbd0\x8ef\x9d\xb88CP(}w\x8c\xbb\xdc%\ax \x10\xd1\n(\xa8=\xf54\xa9\xcb\xe9\x97T\xcf\xcf\x87t\x81\xfa\xaa\xf30\x8b\xb7\xea\xfc^\xb6\x95\x87E\x11\x89\x7f\xa0m\xd3&\tHvtD\x83\\6\xe0t\xa8\xdd\xa3\xa4\xd2\xb9\xb9{+\x1d\xa3\xd5Z;]*2\x99Os\bVW5\xe6\xe7\xdb\x95\x8d\xffY\xe0s\x7f\x9eK,\xae\xaeX\x15M@\xdd\x04`\xea\x03\xf7\x7f:\xc8HU3\xabX}\xa7S8s\xdb_\xc5\x9c\xc9Rw\x90G\xf3J\x9c\x8f\x91\xa1\xd6\x055?m\xed\x94\x9c\xb7(\x0f\xd3\xbc\xba\xc6T\xdd\x15\xf7+*Z3\x8e_Z\xa3k\xe4R\x1e\xc8\vYV\x8a\x8d\xad\x8cI\x88\fM\x19JX\x1f\xffe#|\x06\xfa86\xcb\x93\xea\xab\xcc\x864fC*I\x7fM\t7\x94}\x06\x1d\xc3\x9co-\xdd\xa6\x1b\xa8_\x1fBl\xc4:\xae\xfe4\x9e\xa9T\x91\xd9w\x05\xf8{\xd6@', 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x549883, 0x0)
r1 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/4\x00')
r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x0, 0x0)
pwritev(r1, &(0x7f0000003980)=[{&(0x7f00000006c0)="0e", 0x1}], 0x1, 0x0)
syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x1132f05e, 0x0)
openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x20000, 0x0)
fsetxattr$security_evm(r2, &(0x7f00000000c0)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "7722a9649732ac3b4467dbfff6c84f31a473c327"}, 0x15, 0x6)
bind$isdn(r0, &(0x7f0000000000)={0x22, 0x8001, 0x8, 0x1, 0x2}, 0x6)

[  582.403583]  hci_register_dev+0x2d9/0x810
[  582.403594]  ? hci_init_sysfs+0x7c/0xa0
[  582.403617]  __vhci_create_device+0x2a6/0x560
[  582.403629]  vhci_write+0x2a1/0x437
[  582.453549]  __vfs_write+0x4a7/0x6b0
[  582.457273]  ? kernel_read+0x120/0x120
[  582.461184]  ? rw_verify_area+0xea/0x2b0
[  582.465254]  vfs_write+0x198/0x500
[  582.468805]  SyS_write+0xfd/0x230
[  582.472261]  ? SyS_read+0x230/0x230
[  582.475892]  ? do_syscall_64+0x53/0x640
[  582.479878]  ? SyS_read+0x230/0x230
[  582.483510]  do_syscall_64+0x1e8/0x640
08:43:21 executing program 2:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0)
msgrcv(0x0, 0x0, 0x0, 0x0, 0x0)
recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00412)

[  582.487405]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  582.492260]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  582.497450] RIP: 0033:0x459519
[  582.500642] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  582.508356] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  582.515638] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  582.522940] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  582.530216] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
08:43:21 executing program 5:
r0 = socket$inet6(0xa, 0x2, 0x0)
sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x4e22, @remote}, 0x10, 0x0}, 0x0)

08:43:21 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, 0x0)
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  582.537487] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:22 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, 0x0, 0x0)

08:43:22 executing program 1 (fault-call:2 fault-nth:41):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = open(&(0x7f0000000080)='./file0\x00', 0x18d128615eceac08, 0x40)
ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0xffffffffffffff09)
close(r0)

08:43:22 executing program 5:
r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1)
syz_emit_ethernet(0x3e, &(0x7f0000000200)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}}, @icmp=@parameter_prob={0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @empty=0x1000000}}}}}}, 0x0)
r1 = dup(r0)
getitimer(0x0, &(0x7f0000000000))
recvfrom$inet(r1, 0x0, 0x0, 0x0, 0x0, 0x800e00b85)

08:43:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x81)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:22 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, 0x0, 0x0)

[  582.739374] FAULT_INJECTION: forcing a failure.
[  582.739374] name failslab, interval 1, probability 0, space 0, times 0
[  582.775386] CPU: 0 PID: 16175 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  582.782546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  582.791940] Call Trace:
[  582.794544]  dump_stack+0x138/0x19c
[  582.798198]  should_fail.cold+0x10f/0x159
[  582.802356]  should_failslab+0xdb/0x130
[  582.806339]  kmem_cache_alloc_node_trace+0x280/0x770
[  582.811449]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  582.817021]  __kmalloc_node_track_caller+0x3d/0x80
[  582.821983]  __kmalloc_reserve.isra.0+0x40/0xe0
[  582.826682]  __alloc_skb+0xcf/0x500
[  582.830315]  ? skb_scrub_packet+0x4b0/0x4b0
[  582.834650]  ? netlink_has_listeners+0x20a/0x330
[  582.839437]  kobject_uevent_env+0x781/0xc23
[  582.843770]  kobject_uevent+0x20/0x26
[  582.847576]  device_add+0xa3e/0x1490
[  582.851301]  ? device_private_init+0x190/0x190
[  582.855902]  hci_register_dev+0x2d9/0x810
[  582.860077]  ? hci_alloc_dev+0x16ee/0x1c60
[  582.864322]  __vhci_create_device+0x2a6/0x560
[  582.868828]  vhci_write+0x2a1/0x437
[  582.872466]  __vfs_write+0x4a7/0x6b0
[  582.876194]  ? kernel_read+0x120/0x120
[  582.880120]  ? __sanitizer_cov_trace_pc+0x9/0x60
[  582.884894]  ? rw_verify_area+0xea/0x2b0
[  582.888957]  vfs_write+0x198/0x500
[  582.892504]  SyS_write+0xfd/0x230
[  582.895958]  ? SyS_read+0x230/0x230
[  582.899585]  ? do_syscall_64+0x53/0x640
[  582.903562]  ? SyS_read+0x230/0x230
[  582.907194]  do_syscall_64+0x1e8/0x640
[  582.911084]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  582.915963]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  582.921154] RIP: 0033:0x459519
[  582.924344] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  582.932100] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  582.939377] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  582.946650] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  582.953926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  582.961201] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:22 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040))
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2)
ioctl$KVM_SET_DEBUGREGS(r1, 0x4080aea2, &(0x7f0000000080)={[0x0, 0x1, 0xd000, 0x2000], 0x428732ee, 0xa2, 0x4})
write$vhci(r0, &(0x7f0000000100)=@HCI_VENDOR_PKT={0xff, 0xc0}, 0x2)
close(r0)

08:43:22 executing program 1 (fault-call:2 fault-nth:42):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  583.212776] FAULT_INJECTION: forcing a failure.
[  583.212776] name failslab, interval 1, probability 0, space 0, times 0
[  583.237729] CPU: 0 PID: 16195 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  583.248278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  583.257646] Call Trace:
[  583.260256]  dump_stack+0x138/0x19c
[  583.263897]  should_fail.cold+0x10f/0x159
[  583.268056]  should_failslab+0xdb/0x130
[  583.272039]  kmem_cache_alloc_node_trace+0x280/0x770
[  583.277153]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  583.282622]  __kmalloc_node_track_caller+0x3d/0x80
[  583.287565]  __kmalloc_reserve.isra.0+0x40/0xe0
[  583.292271]  __alloc_skb+0xcf/0x500
[  583.295903]  ? skb_scrub_packet+0x4b0/0x4b0
[  583.300233]  ? netlink_has_listeners+0x20a/0x330
[  583.304994]  kobject_uevent_env+0x781/0xc23
[  583.309326]  kobject_uevent+0x20/0x26
[  583.313128]  device_add+0xa3e/0x1490
[  583.316852]  ? device_private_init+0x190/0x190
[  583.321450]  hci_register_dev+0x2d9/0x810
[  583.325602]  ? hci_init_sysfs+0x7c/0xa0
[  583.329592]  __vhci_create_device+0x2a6/0x560
[  583.334104]  vhci_write+0x2a1/0x437
[  583.337746]  __vfs_write+0x4a7/0x6b0
[  583.341470]  ? kernel_read+0x120/0x120
[  583.345371]  ? rw_verify_area+0xea/0x2b0
[  583.349440]  vfs_write+0x198/0x500
[  583.352987]  SyS_write+0xfd/0x230
[  583.356442]  ? SyS_read+0x230/0x230
[  583.360076]  ? do_syscall_64+0x53/0x640
[  583.364054]  ? SyS_read+0x230/0x230
[  583.367682]  do_syscall_64+0x1e8/0x640
[  583.371572]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  583.376448]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  583.381639] RIP: 0033:0x459519
[  583.384826] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  583.392535] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  583.399889] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
08:43:22 executing program 2:
r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
sched_setaffinity(0x0, 0xfffffffffffffdbd, &(0x7f00000000c0)=0x1)
ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000000))
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$inet6(0xa, 0x2, 0x0)
connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c)
setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8)
flistxattr(0xffffffffffffffff, 0x0, 0x0)
semctl$GETNCNT(0x0, 0x0, 0xe, 0x0)
sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0)
pipe(0x0)
r2 = shmget(0x0, 0x1000, 0x201, &(0x7f0000ffc000/0x1000)=nil)
shmctl$IPC_INFO(r2, 0x3, 0x0)
ftruncate(0xffffffffffffffff, 0x208200)
open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000180)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2, 0x0, 0x0, 0x0, 0x72}, 0x20)
getpgrp(0x0)
ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0)
ioctl$EVIOCREVOKE(0xffffffffffffffff, 0x40044591, &(0x7f00000001c0)=0x9)

[  583.407187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  583.414456] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  583.421723] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000100)=@HCI_EVENT_PKT={0x4, "82fcf4e48ccba87532b41754ae125efe10ab0a8805f525a6b40e623c3076693f001e877fa34389cc40007373c7cbdd44a0d361aa5c0c3041dc78692c5f554b5d72ba9f018d65e0b8d30ef02542577e07a6c83fe96f94168ea98e9bc08210600dc975078f7c95d928612d2eae42f50c55b53f902868542da5c03f3fed191548ee40042a13032ad34cb0339f49e5de7a83b09d52075761674a23df943712cbf6236dba0ffd972787516f134c293d0fa7be4f49ccd832c07f03e07548dd0c6cbaa7ddb39b4bae917efb38e0dbb04d3c21f474a331c6ff29a2513f69774299af17affde0"}, 0xfffffffffffffd58)
close(r0)

08:43:22 executing program 1 (fault-call:2 fault-nth:43):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:22 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  583.550473] device bridge_slave_1 left promiscuous mode
[  583.556239] bridge0: port 2(bridge_slave_1) entered disabled state
[  583.624268] device bridge_slave_0 left promiscuous mode
[  583.632272] bridge0: port 1(bridge_slave_0) entered disabled state
[  583.648667] FAULT_INJECTION: forcing a failure.
[  583.648667] name failslab, interval 1, probability 0, space 0, times 0
[  583.666150] CPU: 0 PID: 16215 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  583.673378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  583.682759] Call Trace:
[  583.685359]  dump_stack+0x138/0x19c
[  583.689022]  should_fail.cold+0x10f/0x159
[  583.693179]  should_failslab+0xdb/0x130
[  583.697158]  kmem_cache_alloc_node_trace+0x280/0x770
[  583.702268]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  583.707732]  __kmalloc_node_track_caller+0x3d/0x80
[  583.712670]  __kmalloc_reserve.isra.0+0x40/0xe0
[  583.717342]  __alloc_skb+0xcf/0x500
[  583.720977]  ? skb_scrub_packet+0x4b0/0x4b0
[  583.725321]  ? netlink_has_listeners+0x20a/0x330
[  583.730106]  kobject_uevent_env+0x781/0xc23
[  583.734439]  kobject_uevent+0x20/0x26
[  583.738241]  device_add+0xa3e/0x1490
[  583.741958]  ? device_private_init+0x190/0x190
[  583.746547]  hci_register_dev+0x2d9/0x810
[  583.750698]  ? hci_init_sysfs+0x7c/0xa0
[  583.754678]  __vhci_create_device+0x2a6/0x560
[  583.759178]  vhci_write+0x2a1/0x437
[  583.762814]  __vfs_write+0x4a7/0x6b0
[  583.766515]  ? kernel_read+0x120/0x120
[  583.770402]  ? rw_verify_area+0xea/0x2b0
[  583.774476]  vfs_write+0x198/0x500
[  583.778005]  SyS_write+0xfd/0x230
[  583.781442]  ? SyS_read+0x230/0x230
[  583.785053]  ? do_syscall_64+0x53/0x640
[  583.789028]  ? SyS_read+0x230/0x230
[  583.792641]  do_syscall_64+0x1e8/0x640
[  583.796509]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  583.801338]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  583.806510] RIP: 0033:0x459519
[  583.809687] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  583.817398] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  583.824664] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  583.831916] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  583.839194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  583.846552] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:23 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040))
read$FUSE(r1, &(0x7f0000000480), 0x1000)

08:43:23 executing program 1 (fault-call:2 fault-nth:44):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  584.004653] device hsr_slave_1 left promiscuous mode
[  584.013425] FAULT_INJECTION: forcing a failure.
[  584.013425] name failslab, interval 1, probability 0, space 0, times 0
[  584.026297] CPU: 0 PID: 16226 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  584.033412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  584.033419] Call Trace:
[  584.033442]  dump_stack+0x138/0x19c
[  584.033462]  should_fail.cold+0x10f/0x159
[  584.049023]  should_failslab+0xdb/0x130
[  584.049040]  kmem_cache_alloc_node_trace+0x280/0x770
[  584.049054]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  584.057197]  __kmalloc_node_track_caller+0x3d/0x80
[  584.057215]  __kmalloc_reserve.isra.0+0x40/0xe0
[  584.057227]  __alloc_skb+0xcf/0x500
[  584.067921]  ? skb_scrub_packet+0x4b0/0x4b0
[  584.077496]  ? netlink_has_listeners+0x20a/0x330
[  584.077512]  kobject_uevent_env+0x781/0xc23
[  584.077530]  kobject_uevent+0x20/0x26
[  584.090198]  device_add+0xa3e/0x1490
[  584.090214]  ? device_private_init+0x190/0x190
[  584.090230]  hci_register_dev+0x2d9/0x810
[  584.090241]  ? hci_init_sysfs+0x7c/0xa0
[  584.090257]  __vhci_create_device+0x2a6/0x560
[  584.090272]  vhci_write+0x2a1/0x437
[  584.098388]  __vfs_write+0x4a7/0x6b0
[  584.098403]  ? kernel_read+0x120/0x120
[  584.098424]  ? rw_verify_area+0xea/0x2b0
[  584.110837]  vfs_write+0x198/0x500
[  584.110853]  SyS_write+0xfd/0x230
[  584.110863]  ? SyS_read+0x230/0x230
[  584.110874]  ? do_syscall_64+0x53/0x640
[  584.110885]  ? SyS_read+0x230/0x230
[  584.110896]  do_syscall_64+0x1e8/0x640
[  584.110905]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  584.110921]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  584.119370] RIP: 0033:0x459519
[  584.119376] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  584.119388] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  584.119394] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  584.119400] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  584.119408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  584.130600] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  584.220448] device hsr_slave_0 left promiscuous mode
[  584.282685] team0 (unregistering): Port device team_slave_1 removed
[  584.294318] team0 (unregistering): Port device team_slave_0 removed
[  584.304115] bond0 (unregistering): Releasing backup interface bond_slave_1
[  584.353451] bond0 (unregistering): Releasing backup interface bond_slave_0
[  584.415671] bond0 (unregistering): Released all slaves
08:43:23 executing program 5:
r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x20000000cd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='cpu&5\n\n\n\x00\x00\x00\x05\x00\x03\x9c\xd3\x0e5\xcc\xa0\x1d=\v\n\x1c`fo\x8d\xccm\\v\xfd.\x9e\tbk1\xde\xea\x1b\r;\x81\x84\x87-X\xb6,\xc5\xb4\"7&\xb5yt\x82\xfb\x1d\x83\xe6\xf8.-m\n\xf3\xb1(\xe9`D\x01i\\\x8dl\x86lh\xa8\xfc\x80\xde,Kt\xf4\x1a\xc5]Y;\t\x06\xbe*\xaa&\xbd\x16xQ\x86\xf3\xd6\x1a\xfd\xd0\x04\'y\x9b|\xe4\xb7\bE\xed\x97\x80s\x19W\xb7[\xf0%>MM\xf5\x98\xbe^=q!\xa6\x0fp\x012\x00\xbb\xbe\x9dr5\xafep\x10R\v&\xaf\xa8$\x7f7V\xedLJ4\xcf\x90@\xd5T\n\xca\xc2\x86_\xc1\xce\x8d\xedbS\x8d\xe9t\x82\xf41zwr\xe6o\x88\xe5\xe3\xe7Gcx\xc0\x91I\x8d\xfd\xe4\xbbs\xbf\n\x00K\x9e\xe5[\xa0\n\x0f\x04\xa6\xb0sE)\x8a\xd0R\xc3\xc1,b \x1c#IRz6\xfeJ~\xda\xd7_\xbe\x1f\xe5\x86\xb1x\x00\x00\x00\x00\x00\x00\x00\x00\x93\xab\x05')

08:43:23 executing program 2:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0xffbc)
connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x34)
setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4)
sendmmsg(r0, &(0x7f00000005c0)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)='f', 0x1}], 0x1}}], 0x1, 0x0)
setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240), 0x20e)
close(r0)

[  586.710225] IPVS: ftp: loaded support on port[0] = 21
[  587.015894] chnl_net:caif_netlink_parms(): no params data found
[  587.049175] bridge0: port 1(bridge_slave_0) entered blocking state
[  587.055747] bridge0: port 1(bridge_slave_0) entered disabled state
[  587.062740] device bridge_slave_0 entered promiscuous mode
[  587.069308] bridge0: port 2(bridge_slave_1) entered blocking state
[  587.075856] bridge0: port 2(bridge_slave_1) entered disabled state
[  587.082985] device bridge_slave_1 entered promiscuous mode
[  587.100797] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  587.109537] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  587.128536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  587.135812] team0: Port device team_slave_0 added
[  587.141294] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  587.148335] team0: Port device team_slave_1 added
[  587.153740] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  587.161013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  587.242437] device hsr_slave_0 entered promiscuous mode
[  587.310510] device hsr_slave_1 entered promiscuous mode
[  587.360628] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  587.367495] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  587.381932] bridge0: port 2(bridge_slave_1) entered blocking state
[  587.388314] bridge0: port 2(bridge_slave_1) entered forwarding state
[  587.394973] bridge0: port 1(bridge_slave_0) entered blocking state
[  587.401338] bridge0: port 1(bridge_slave_0) entered forwarding state
[  587.428660] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  587.435016] 8021q: adding VLAN 0 to HW filter on device bond0
[  587.443340] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  587.453103] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  587.460501] bridge0: port 1(bridge_slave_0) entered disabled state
[  587.467103] bridge0: port 2(bridge_slave_1) entered disabled state
[  587.476938] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  587.483070] 8021q: adding VLAN 0 to HW filter on device team0
[  587.492424] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  587.500000] bridge0: port 1(bridge_slave_0) entered blocking state
[  587.506636] bridge0: port 1(bridge_slave_0) entered forwarding state
[  587.515898] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  587.523694] bridge0: port 2(bridge_slave_1) entered blocking state
[  587.530087] bridge0: port 2(bridge_slave_1) entered forwarding state
[  587.545391] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  587.553012] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  587.566229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  587.573771] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  587.585315] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  587.594448] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  587.600891] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  587.613093] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  587.624914] 8021q: adding VLAN 0 to HW filter on device batadv0
[  588.000783] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:27 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040), 0x0)

08:43:27 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x10001, 0x10180)
accept4$llc(r1, 0x0, &(0x7f00000000c0), 0x80800)

08:43:27 executing program 1 (fault-call:2 fault-nth:45):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:27 executing program 2:
perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
pipe(0x0)
ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0)
syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1)
sched_setaffinity(0x0, 0xffffffffffffffbd, &(0x7f00000000c0))
prlimit64(0x0, 0xf, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xe6)
sendto$inet(0xffffffffffffffff, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', <r1=>0x0})
bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14)
sendmmsg(r0, &(0x7f0000008a80), 0x400000000000328, 0x0)

08:43:27 executing program 5:
r0 = socket(0x1000000010, 0x4008000000803, 0x0)
setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x33c)
setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x122)

08:43:27 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040))
read$FUSE(r1, &(0x7f0000000480), 0x1000)

[  588.571712] FAULT_INJECTION: forcing a failure.
[  588.571712] name failslab, interval 1, probability 0, space 0, times 0
[  588.584081] CPU: 0 PID: 16259 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  588.591202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  588.591207] Call Trace:
[  588.591231]  dump_stack+0x138/0x19c
[  588.591252]  should_fail.cold+0x10f/0x159
[  588.591271]  should_failslab+0xdb/0x130
[  588.591287]  kmem_cache_alloc+0x2d7/0x780
[  588.591298]  ? memcpy+0x46/0x50
[  588.591310]  ? kstrdup+0x5a/0x70
[  588.591329]  __kernfs_new_node+0x70/0x420
[  588.591342]  ? vprintk_func+0x65/0x159
[  588.591358]  kernfs_new_node+0x80/0xf0
[  588.591370]  kernfs_create_dir_ns+0x41/0x140
[  588.591383]  sysfs_create_dir_ns+0xbe/0x1d0
[  588.591396]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  588.591409]  kobject_add+0x11f/0x180
[  588.591419]  ? kset_create_and_add+0x180/0x180
[  588.591435]  ? mutex_unlock+0xd/0x10
[  588.591452]  device_add+0x383/0x1490
[  588.591470]  ? device_initialize+0x430/0x430
[  588.671998]  ? device_private_init+0x190/0x190
[  588.676587]  hci_register_dev+0x2d9/0x810
[  588.680742]  __vhci_create_device+0x2a6/0x560
[  588.685233]  vhci_write+0x2a1/0x437
[  588.688859]  __vfs_write+0x4a7/0x6b0
[  588.692572]  ? kernel_read+0x120/0x120
[  588.696469]  ? rw_verify_area+0xea/0x2b0
[  588.700526]  vfs_write+0x198/0x500
[  588.704083]  SyS_write+0xfd/0x230
[  588.707550]  ? SyS_read+0x230/0x230
[  588.711174]  ? do_syscall_64+0x81/0x640
[  588.715141]  ? SyS_read+0x230/0x230
[  588.718766]  do_syscall_64+0x1e8/0x640
[  588.722651]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  588.727494]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  588.732679] RIP: 0033:0x459519
[  588.735882] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  588.743583] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  588.750847] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  588.758112] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  588.765374] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
08:43:28 executing program 5:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="000000000000000018001200080001007369740005c351ac2f91a52700000000"], 0x1}}, 0x0)

08:43:28 executing program 5:
r0 = socket$inet6(0xa, 0x5, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x1, [<r1=>0x0]}, &(0x7f0000000140)=0x8)
setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r1, @in6={{0xa, 0x4e21, 0x0, @loopback}}}, 0x98)

08:43:28 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x1)
close(r0)
r1 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x200, 0x0)
getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14)
clock_gettime(0x0, &(0x7f0000000180)={<r3=>0x0, <r4=>0x0})
sendmsg$can_bcm(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x0, 0x8, 0x600, {r3, r4/1000+30000}, {}, {0x0, 0x8001, 0xff, 0x1}, 0x1, @canfd={{0x1, 0xb35, 0x972, 0x7fff}, 0x28, 0x2, 0x0, 0x0, "870736f0e4f4bba53521409b1ccac41d2d308346210bf95661234f1684cfec18bd7ac65dcaa7cec2736303149d335804c8b5516339dfa7c9ec4602bee2936450"}}, 0x80}, 0x1, 0x0, 0x0, 0x840}, 0x40)

[  588.772639] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  588.794262] kobject_add_internal failed for hci2 (error: -12 parent: bluetooth)
[  588.812716] Bluetooth: Can't register HCI device
08:43:28 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040), 0x0)

08:43:28 executing program 1 (fault-call:2 fault-nth:46):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

[  588.923934] FAULT_INJECTION: forcing a failure.
[  588.923934] name failslab, interval 1, probability 0, space 0, times 0
[  588.945187] CPU: 0 PID: 16277 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  588.952341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  588.952347] Call Trace:
[  588.952370]  dump_stack+0x138/0x19c
[  588.952397]  should_fail.cold+0x10f/0x159
[  588.972126]  should_failslab+0xdb/0x130
[  588.976108]  kmem_cache_alloc_node_trace+0x280/0x770
[  588.976123]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  588.976139]  __kmalloc_node_track_caller+0x3d/0x80
[  588.976154]  __kmalloc_reserve.isra.0+0x40/0xe0
[  588.996298]  __alloc_skb+0xcf/0x500
[  588.999942]  ? skb_scrub_packet+0x4b0/0x4b0
[  588.999959]  ? netlink_has_listeners+0x20a/0x330
[  588.999974]  kobject_uevent_env+0x781/0xc23
[  589.013411]  kobject_uevent+0x20/0x26
[  589.017217]  device_add+0xa3e/0x1490
08:43:28 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040), 0x0)

[  589.017233]  ? device_private_init+0x190/0x190
[  589.017246]  ? debugfs_create_dir+0x2c2/0x3b0
[  589.017262]  hci_register_dev+0x2d9/0x810
[  589.025538]  ? hci_init_sysfs+0x7c/0xa0
[  589.038156]  __vhci_create_device+0x2a6/0x560
[  589.042659]  vhci_write+0x2a1/0x437
[  589.046293]  __vfs_write+0x4a7/0x6b0
[  589.050015]  ? kernel_read+0x120/0x120
[  589.053917]  ? rw_verify_area+0xea/0x2b0
[  589.057980]  vfs_write+0x198/0x500
[  589.061525]  SyS_write+0xfd/0x230
[  589.064980]  ? SyS_read+0x230/0x230
[  589.068605]  ? do_syscall_64+0x53/0x640
[  589.072587]  ? SyS_read+0x230/0x230
[  589.076222]  do_syscall_64+0x1e8/0x640
[  589.080109]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  589.084960]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  589.092151] RIP: 0033:0x459519
[  589.095336] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  589.103051] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  589.110320] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  589.117582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:43:28 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
dup(r0)
close(r0)
fsetxattr$security_smack_entry(r0, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f00000000c0)='\\nodev}posix_acl_accessvboxnet1\x00', 0x20, 0x1)

[  589.124881] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  589.132148] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:28 executing program 2:
r0 = gettid()
setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$unix(r1, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000))
dup2(0xffffffffffffffff, 0xffffffffffffff9c)
ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, 0x0)
timer_settime(0x0, 0x1, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x989680}}, 0x0)
mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x401, 0x6)
tkill(r0, 0x14)

08:43:28 executing program 1 (fault-call:2 fault-nth:47):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:28 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="03518ae452832ab975acdcc8565f57f8eadb5274001e8c15b38764e3b95ea81f0f4d8a903c7997dcfadea9d8f5ce7975ac3332354e74c150e6c1a0c19bbb8e65fd60a3d15eb822abcba7811a7602a676205c230aef4a3b3efe6ad6c6f4629d45119b20f1ac8c7a9a4d30a4c6975e593822606574612db43113b35e325b974a4cdf450795c398fc63496fc95acdcdb52c0e19e552f83a26692a7b7282c54ffa6166f93800922bfbf13a22a03dc33023d8f723564012e2ccab52b0534839087a8261000d17902daaeb8eeff09ac1cb14367e6deaccd03c2e604cd10c70c889e480b21f89f21fcd0000000000000000"], 0xf9)
close(r0)
exit_group(0x0)

08:43:28 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

08:43:28 executing program 5:
r0 = socket$inet6(0xa, 0x5, 0x0)
bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000000180)={0x1, [<r1=>0x0]}, &(0x7f0000000140)=0x8)
setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, 0x0)
tee(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000000)={r1, @in6={{0xa, 0x4e21, 0x0, @loopback}}}, 0x98)

08:43:28 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhci\x00', 0xfffffffffffffffd)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x80000, 0x0)
ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f00000000c0)={0x4, 0x6, 0x0, 0x7, 0xba, 0xed})

08:43:28 executing program 2:
recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socket(0x0, 0x5, 0x0)
ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0)
request_key(0x0, &(0x7f0000000040)={'syz'}, 0x0, 0xfffffffffffffffd)
r0 = inotify_init()
ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, 0x0)
setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0)
socket$inet(0x2, 0x4000000000000001, 0x0)
syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00')
msgget$private(0x0, 0x0)
getuid()
inotify_rm_watch(r0, 0x0)
stat(0x0, 0x0)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x0, 0x0)
clock_gettime(0x0, 0x0)

[  589.397988] FAULT_INJECTION: forcing a failure.
[  589.397988] name failslab, interval 1, probability 0, space 0, times 0
[  589.458154] CPU: 0 PID: 16293 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  589.465306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  589.465311] Call Trace:
[  589.465334]  dump_stack+0x138/0x19c
[  589.465355]  should_fail.cold+0x10f/0x159
[  589.465371]  should_failslab+0xdb/0x130
[  589.465388]  kmem_cache_alloc_node+0x287/0x780
[  589.465412]  __alloc_skb+0x9c/0x500
[  589.465424]  ? skb_scrub_packet+0x4b0/0x4b0
[  589.465441]  ? netlink_has_listeners+0x20a/0x330
[  589.465457]  kobject_uevent_env+0x781/0xc23
[  589.465478]  kobject_uevent+0x20/0x26
[  589.501617]  device_add+0xa3e/0x1490
[  589.501633]  ? device_private_init+0x190/0x190
[  589.501650]  hci_register_dev+0x2d9/0x810
[  589.501660]  ? hci_init_sysfs+0x7c/0xa0
[  589.501677]  __vhci_create_device+0x2a6/0x560
[  589.501689]  vhci_write+0x2a1/0x437
[  589.501703]  __vfs_write+0x4a7/0x6b0
[  589.501719]  ? kernel_read+0x120/0x120
[  589.514593]  ? rw_verify_area+0xea/0x2b0
[  589.514615]  vfs_write+0x198/0x500
[  589.522897]  SyS_write+0xfd/0x230
[  589.522910]  ? SyS_read+0x230/0x230
[  589.522922]  ? do_syscall_64+0x53/0x640
[  589.522931]  ? SyS_read+0x230/0x230
[  589.522942]  do_syscall_64+0x1e8/0x640
[  589.522952]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  589.522967]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  589.522976] RIP: 0033:0x459519
[  589.522982] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  589.522994] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  589.523000] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
08:43:29 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0)
ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000180))
openat$mixer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mixer\x00', 0x1fffd, 0x0)
write$vhci(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="033a064387c95cc818601aaf18325bb3f21ba3b39a7517e59c3e9ba6e292afd782a58a6d700b26d883767a6845a475876d212a771638386cd7e0c229d62ea724df7e2d4596db2fad90c980e1d78f5a1473d9c3245c2e15fc96034b6ab6f88b73e2f7f1d1eee06d6f866414875ed322b9be7cc5bf607b2103ac197ddad7a3"], 0x7e)
ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82)

08:43:29 executing program 5:
r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0)
syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='status\x00')
ioctl$FICLONERANGE(r0, 0x4020940d, 0x0)

[  589.523006] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  589.523011] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  589.523017] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:29 executing program 5:
poll(&(0x7f0000000180), 0x2271, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00a4f)
ppoll(&(0x7f0000000000)=[{}, {r0, 0xa0}], 0x2, 0x0, 0x0, 0x0)
shutdown(r0, 0x0)

[  589.760823] device bridge_slave_1 left promiscuous mode
[  589.769442] bridge0: port 2(bridge_slave_1) entered disabled state
[  589.851934] device bridge_slave_0 left promiscuous mode
[  589.857550] bridge0: port 1(bridge_slave_0) entered disabled state
[  590.003482] device hsr_slave_1 left promiscuous mode
[  590.043539] device hsr_slave_0 left promiscuous mode
[  590.084762] team0 (unregistering): Port device team_slave_1 removed
[  590.094623] team0 (unregistering): Port device team_slave_0 removed
[  590.104148] bond0 (unregistering): Releasing backup interface bond_slave_1
[  590.154561] bond0 (unregistering): Releasing backup interface bond_slave_0
[  590.245404] bond0 (unregistering): Released all slaves
[  592.600309] IPVS: ftp: loaded support on port[0] = 21
[  592.967800] chnl_net:caif_netlink_parms(): no params data found
[  593.001021] bridge0: port 1(bridge_slave_0) entered blocking state
[  593.007467] bridge0: port 1(bridge_slave_0) entered disabled state
[  593.014499] device bridge_slave_0 entered promiscuous mode
[  593.021886] bridge0: port 2(bridge_slave_1) entered blocking state
[  593.028264] bridge0: port 2(bridge_slave_1) entered disabled state
[  593.035339] device bridge_slave_1 entered promiscuous mode
[  593.052281] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  593.061405] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  593.077536] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  593.085428] team0: Port device team_slave_0 added
[  593.091058] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  593.098074] team0: Port device team_slave_1 added
[  593.103449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  593.111221] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  593.163868] device hsr_slave_0 entered promiscuous mode
[  593.200470] device hsr_slave_1 entered promiscuous mode
[  593.240767] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  593.247746] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  593.260251] bridge0: port 2(bridge_slave_1) entered blocking state
[  593.270416] bridge0: port 2(bridge_slave_1) entered forwarding state
[  593.277013] bridge0: port 1(bridge_slave_0) entered blocking state
[  593.283421] bridge0: port 1(bridge_slave_0) entered forwarding state
[  593.310946] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  593.317042] 8021q: adding VLAN 0 to HW filter on device bond0
[  593.325516] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  593.335421] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  593.342543] bridge0: port 1(bridge_slave_0) entered disabled state
[  593.349145] bridge0: port 2(bridge_slave_1) entered disabled state
[  593.359090] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  593.366047] 8021q: adding VLAN 0 to HW filter on device team0
[  593.374299] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  593.382024] bridge0: port 1(bridge_slave_0) entered blocking state
[  593.388382] bridge0: port 1(bridge_slave_0) entered forwarding state
[  593.397552] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  593.405290] bridge0: port 2(bridge_slave_1) entered blocking state
[  593.411683] bridge0: port 2(bridge_slave_1) entered forwarding state
[  593.427221] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  593.434977] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  593.446552] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  593.456887] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  593.468417] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  593.479092] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  593.485245] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  593.493055] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  593.505584] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  593.515761] 8021q: adding VLAN 0 to HW filter on device batadv0
[  593.950664] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:34 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{0x0}], 0x1)

08:43:34 executing program 2:

08:43:34 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x8000, 0x0)

08:43:34 executing program 1 (fault-call:2 fault-nth:48):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:34 executing program 5:

08:43:34 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

08:43:34 executing program 2:

08:43:34 executing program 5:

08:43:34 executing program 2:

08:43:34 executing program 2:

[  594.829343] FAULT_INJECTION: forcing a failure.
[  594.829343] name failslab, interval 1, probability 0, space 0, times 0
08:43:34 executing program 5:

08:43:34 executing program 2:

[  594.899206] CPU: 0 PID: 16355 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  594.906366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  594.915751] Call Trace:
[  594.918354]  dump_stack+0x138/0x19c
[  594.922001]  should_fail.cold+0x10f/0x159
[  594.926165]  should_failslab+0xdb/0x130
[  594.930150]  __kmalloc_track_caller+0x2ec/0x790
[  594.934832]  ? save_trace+0x290/0x290
[  594.938649]  ? __mutex_unlock_slowpath+0x71/0x800
[  594.943496]  ? __lock_is_held+0xb6/0x140
[  594.947569]  ? kstrdup_const+0x48/0x60
[  594.951490]  kstrdup+0x3a/0x70
[  594.954690]  kstrdup_const+0x48/0x60
[  594.958414]  __kernfs_new_node+0x2f/0x420
[  594.962575]  kernfs_new_node+0x80/0xf0
[  594.962588]  kernfs_create_link+0x2c/0x170
[  594.962599]  sysfs_do_create_link_sd.isra.0+0x90/0x120
[  594.962611]  sysfs_create_link+0x65/0xc0
[  594.962630]  device_add+0x735/0x1490
[  594.962642]  ? device_private_init+0x190/0x190
[  594.962660]  hci_register_dev+0x2d9/0x810
[  594.962677]  __vhci_create_device+0x2a6/0x560
[  594.971052]  vhci_write+0x2a1/0x437
[  594.971068]  __vfs_write+0x4a7/0x6b0
[  594.971082]  ? kernel_read+0x120/0x120
[  594.971105]  ? rw_verify_area+0xea/0x2b0
[  594.971115]  vfs_write+0x198/0x500
[  594.971127]  SyS_write+0xfd/0x230
[  594.971138]  ? SyS_read+0x230/0x230
[  594.971149]  ? do_syscall_64+0x53/0x640
[  594.971159]  ? SyS_read+0x230/0x230
[  594.971169]  do_syscall_64+0x1e8/0x640
[  594.971178]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  594.971193]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  594.971203] RIP: 0033:0x459519
08:43:34 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{0x0}], 0x1)

08:43:34 executing program 5:

08:43:34 executing program 2:

[  595.027277] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246
[  595.039601]  ORIG_RAX: 0000000000000001
[  595.039609] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  595.039621] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  595.039627] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  595.039633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  595.039639] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:34 executing program 1 (fault-call:2 fault-nth:49):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:34 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0)
ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000000c0)={0x40000000000, @reserved})
fsetxattr$security_ima(r0, &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000300)=@ng={0x4, 0x11, "d558b374c14cec920e17f6ab902d470f1d"}, 0x13, 0x1)
r2 = semget$private(0x0, 0x0, 0x80)
ioctl$SIOCX25SCUDMATCHLEN(r1, 0x89e7, &(0x7f00000001c0)={0x7b})
ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0x4, 0x800, 0x0, 0x8, 0x7e57, 0xffffffffffffffc0, 0x7, 0x800, 0x81, 0x7, 0x7fff, 0x9c7f, 0x9, 0x2, 0x1ff, 0x100000001, 0x2, 0xfbd1, 0x4, 0x3f, 0x9, 0x8, 0x1, 0x4000000000000000, 0x7, 0x6, 0x10000, 0x9, 0x8, 0x6, 0xfffffffffffffffb, 0x3]})
semctl$SEM_INFO(r2, 0x1, 0x13, &(0x7f0000000180)=""/53)

[  595.126970] Bluetooth: Can't register HCI device
[  595.245968] FAULT_INJECTION: forcing a failure.
[  595.245968] name failslab, interval 1, probability 0, space 0, times 0
[  595.263038] CPU: 1 PID: 16381 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  595.270168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  595.279534] Call Trace:
[  595.282139]  dump_stack+0x138/0x19c
[  595.285774]  should_fail.cold+0x10f/0x159
[  595.289921]  should_failslab+0xdb/0x130
[  595.293884]  kmem_cache_alloc_node_trace+0x280/0x770
[  595.298976]  ? rcu_lockdep_current_cpu_online+0xf2/0x140
[  595.304419]  __kmalloc_node_track_caller+0x3d/0x80
[  595.309354]  __kmalloc_reserve.isra.0+0x40/0xe0
[  595.314025]  __alloc_skb+0xcf/0x500
[  595.317641]  ? skb_scrub_packet+0x4b0/0x4b0
[  595.321949]  ? netlink_has_listeners+0x20a/0x330
[  595.326692]  kobject_uevent_env+0x781/0xc23
[  595.331002]  kobject_uevent+0x20/0x26
[  595.334785]  device_add+0xa3e/0x1490
[  595.338525]  ? device_private_init+0x190/0x190
[  595.343108]  hci_register_dev+0x2d9/0x810
[  595.347247]  ? hci_init_sysfs+0x7c/0xa0
[  595.351211]  __vhci_create_device+0x2a6/0x560
[  595.355691]  vhci_write+0x2a1/0x437
[  595.359304]  __vfs_write+0x4a7/0x6b0
[  595.363013]  ? kernel_read+0x120/0x120
[  595.366901]  ? rw_verify_area+0xea/0x2b0
[  595.370947]  vfs_write+0x198/0x500
[  595.374471]  SyS_write+0xfd/0x230
[  595.377909]  ? SyS_read+0x230/0x230
[  595.381518]  ? do_syscall_64+0x53/0x640
[  595.385491]  ? SyS_read+0x230/0x230
[  595.389131]  do_syscall_64+0x1e8/0x640
[  595.393007]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  595.397850]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  595.403025] RIP: 0033:0x459519
[  595.406209] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  595.413901] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  595.421153] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  595.428405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  595.435659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  595.442932] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:35 executing program 5:

08:43:35 executing program 2:

08:43:35 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0)
r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x0, 0x0)
ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @bt={0x7, 0x16, 0x7fff, 0x6, 0x0, 0x1, 0x1a, 0xf}})
write$vhci(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="02daf23fe4ccc3966c7bceffdac7b6e2acaf39e65b315d0c694f4fef018b4d146a1c3bc1353ca54a2ecafd8af94ef300f890ea452ca58e267b83b3f317aae9ae7158480408e009a15463260dbe745c518bf1533f80ae7664832086515e7e072ec0123980f11e5f163c231c24abcf3c888937d38bec8b2d5f390db5417a796c49f9bcbe7c8f779d240a1aab0f4de18eb631f33d335b316b92cddceab05cbc10987e86c903c7386a0300000000000000684272e7f74f4e7c404546f0396dc2363504ba5e5090d3a2cd45e934ae143fe9af3d81c1b53d13a45ad31e820b7fcd66c18c0b7599c994720d520f27a1c70a9654d97a9a"], 0xc2)
ioctl$TIOCMBIC(r1, 0x5417, &(0x7f00000002c0)=0x2)
r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x5c500, 0x0)
ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000300)=<r3=>0x0)
write$cgroup_pid(r1, &(0x7f0000000340)=r3, 0x12)
ioctl$TIOCLINUX3(r2, 0x541c, &(0x7f0000000180))
close(r0)

08:43:35 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000)

08:43:35 executing program 1 (fault-call:2 fault-nth:50):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:35 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{0x0}], 0x1)

[  595.614483] FAULT_INJECTION: forcing a failure.
[  595.614483] name failslab, interval 1, probability 0, space 0, times 0
[  595.640936] CPU: 1 PID: 16386 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  595.648122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  595.648131] Call Trace:
[  595.660095]  dump_stack+0x138/0x19c
[  595.663747]  should_fail.cold+0x10f/0x159
[  595.667905]  should_failslab+0xdb/0x130
[  595.671890]  kmem_cache_alloc_node_trace+0x280/0x770
[  595.677002]  ? vsnprintf+0x290/0x1560
[  595.680817]  __kmalloc_node_track_caller+0x3d/0x80
[  595.685760]  devm_kmalloc+0x62/0x170
[  595.689479]  devm_kvasprintf+0xaf/0x100
[  595.693459]  ? devm_kmemdup+0x60/0x60
[  595.697268]  devm_kasprintf+0xa5/0xd0
[  595.701078]  ? devm_kvasprintf+0x100/0x100
[  595.705320]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  595.710430]  ? devres_add+0x40/0x50
[  595.714073]  hci_leds_init+0xb1/0x1b0
[  595.717878]  hci_register_dev+0x2ee/0x810
[  595.717891]  ? hci_init_sysfs+0x7c/0xa0
[  595.717909]  __vhci_create_device+0x2a6/0x560
[  595.717921]  vhci_write+0x2a1/0x437
[  595.734151]  __vfs_write+0x4a7/0x6b0
[  595.737875]  ? kernel_read+0x120/0x120
[  595.741781]  ? rw_verify_area+0xea/0x2b0
[  595.741791]  ? vfs_write+0x76/0x500
[  595.741803]  vfs_write+0x198/0x500
[  595.741818]  SyS_write+0xfd/0x230
[  595.756480]  ? SyS_read+0x230/0x230
[  595.760120]  ? do_syscall_64+0x53/0x640
[  595.764101]  ? SyS_read+0x230/0x230
[  595.767740]  do_syscall_64+0x1e8/0x640
[  595.771629]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  595.776489]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  595.781681] RIP: 0033:0x459519
[  595.784872] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  595.792581] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  595.799857] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  595.807133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
08:43:35 executing program 5:

08:43:35 executing program 2:

08:43:35 executing program 2:

08:43:35 executing program 5:

[  595.814403] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  595.821683] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:35 executing program 2:

08:43:35 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x400, 0x0)
r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00')
sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000000240)={&(0x7f0000000140), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r2, 0x800, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40000)
close(r0)
pwritev(r0, &(0x7f0000000100), 0x0, 0x9)
r3 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x800, 0x2a00)
r4 = syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x0)
syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x0)
close(r4)
ioctl$SIOCAX25NOUID(r3, 0x89e3, &(0x7f00000000c0))

08:43:35 executing program 1 (fault-call:2 fault-nth:51):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:35 executing program 5:

08:43:35 executing program 2:

[  595.990799] device bridge_slave_1 left promiscuous mode
[  595.996627] bridge0: port 2(bridge_slave_1) entered disabled state
[  596.049544] FAULT_INJECTION: forcing a failure.
[  596.049544] name failslab, interval 1, probability 0, space 0, times 0
[  596.061122] device bridge_slave_0 left promiscuous mode
[  596.061260] bridge0: port 1(bridge_slave_0) entered disabled state
[  596.097789] CPU: 1 PID: 16410 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  596.104956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  596.104961] Call Trace:
[  596.104981]  dump_stack+0x138/0x19c
[  596.104998]  should_fail.cold+0x10f/0x159
[  596.105013]  should_failslab+0xdb/0x130
[  596.117167]  kmem_cache_alloc_node_trace+0x280/0x770
[  596.124918]  __kmalloc_node_track_caller+0x3d/0x80
[  596.133983]  ? led_trigger_unregister+0x2e0/0x2e0
[  596.133998]  __devres_alloc_node+0x39/0x120
[  596.134011]  devm_led_trigger_register+0x36/0xc0
[  596.143783]  hci_leds_init+0xe8/0x1b0
[  596.143799]  hci_register_dev+0x2ee/0x810
[  596.161167]  __vhci_create_device+0x2a6/0x560
[  596.165738]  vhci_write+0x2a1/0x437
[  596.169377]  __vfs_write+0x4a7/0x6b0
[  596.173099]  ? kernel_read+0x120/0x120
[  596.177008]  ? rw_verify_area+0xea/0x2b0
[  596.181076]  vfs_write+0x198/0x500
[  596.184621]  SyS_write+0xfd/0x230
[  596.188080]  ? SyS_read+0x230/0x230
[  596.191712]  ? do_syscall_64+0x53/0x640
[  596.195691]  ? SyS_read+0x230/0x230
[  596.199329]  do_syscall_64+0x1e8/0x640
[  596.203220]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  596.208076]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  596.213273] RIP: 0033:0x459519
[  596.216460] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  596.224177] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  596.231451] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  596.238727] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  596.245998] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  596.253265] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  596.456393] device hsr_slave_1 left promiscuous mode
[  596.504646] device hsr_slave_0 left promiscuous mode
[  596.557006] team0 (unregistering): Port device team_slave_1 removed
[  596.570341] team0 (unregistering): Port device team_slave_0 removed
[  596.579189] bond0 (unregistering): Releasing backup interface bond_slave_1
08:43:36 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, 0x0, 0x0)

[  596.605786] bond0 (unregistering): Releasing backup interface bond_slave_0
[  596.682451] bond0 (unregistering): Released all slaves
[  599.410188] IPVS: ftp: loaded support on port[0] = 21
[  599.747138] chnl_net:caif_netlink_parms(): no params data found
[  599.779273] bridge0: port 1(bridge_slave_0) entered blocking state
[  599.785779] bridge0: port 1(bridge_slave_0) entered disabled state
[  599.793132] device bridge_slave_0 entered promiscuous mode
[  599.799699] bridge0: port 2(bridge_slave_1) entered blocking state
[  599.806492] bridge0: port 2(bridge_slave_1) entered disabled state
[  599.813566] device bridge_slave_1 entered promiscuous mode
[  599.831138] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  599.839901] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  599.859215] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  599.866521] team0: Port device team_slave_0 added
[  599.871985] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  599.878996] team0: Port device team_slave_1 added
[  599.884382] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  599.891590] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  599.952216] device hsr_slave_0 entered promiscuous mode
[  600.010354] device hsr_slave_1 entered promiscuous mode
[  600.050601] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  600.057455] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  600.071525] bridge0: port 2(bridge_slave_1) entered blocking state
[  600.077876] bridge0: port 2(bridge_slave_1) entered forwarding state
[  600.084582] bridge0: port 1(bridge_slave_0) entered blocking state
[  600.090997] bridge0: port 1(bridge_slave_0) entered forwarding state
[  600.118977] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  600.125346] 8021q: adding VLAN 0 to HW filter on device bond0
[  600.134137] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  600.143684] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  600.150972] bridge0: port 1(bridge_slave_0) entered disabled state
[  600.157595] bridge0: port 2(bridge_slave_1) entered disabled state
[  600.167032] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  600.173200] 8021q: adding VLAN 0 to HW filter on device team0
[  600.181774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  600.189313] bridge0: port 1(bridge_slave_0) entered blocking state
[  600.195882] bridge0: port 1(bridge_slave_0) entered forwarding state
[  600.205735] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  600.213333] bridge0: port 2(bridge_slave_1) entered blocking state
[  600.219658] bridge0: port 2(bridge_slave_1) entered forwarding state
[  600.234420] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  600.246048] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  600.253374] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  600.264190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  600.274129] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  600.284879] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  600.291291] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  600.298254] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  600.312679] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  600.324004] 8021q: adding VLAN 0 to HW filter on device batadv0
[  600.740493] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:40 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{}], 0x1)

08:43:40 executing program 5:

08:43:40 executing program 2:

08:43:40 executing program 1 (fault-call:2 fault-nth:52):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:40 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x400, 0x0)
r1 = shmget(0x3, 0x1000, 0x78000840, &(0x7f0000ffe000/0x1000)=nil)
shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x4000)
openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0)
close(r0)

08:43:40 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, 0x0, 0x0)

08:43:40 executing program 2:

08:43:40 executing program 5:

[  601.450769] FAULT_INJECTION: forcing a failure.
[  601.450769] name failslab, interval 1, probability 0, space 0, times 0
[  601.491062] CPU: 1 PID: 16443 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  601.498242] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  601.507603] Call Trace:
[  601.507630]  dump_stack+0x138/0x19c
[  601.507651]  should_fail.cold+0x10f/0x159
[  601.507669]  should_failslab+0xdb/0x130
[  601.507685]  kmem_cache_alloc+0x2d7/0x780
[  601.507695]  ? memcpy+0x46/0x50
[  601.507710]  ? kstrdup+0x5a/0x70
[  601.507729]  __kernfs_new_node+0x70/0x420
[  601.522051]  kernfs_new_node+0x80/0xf0
08:43:40 executing program 5:

08:43:40 executing program 2:
perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
writev(0xffffffffffffffff, 0x0, 0x0)
r0 = eventfd2(0x401, 0x80801)
read$eventfd(r0, &(0x7f0000000080), 0x8)

[  601.522066]  kernfs_create_link+0x2c/0x170
[  601.522079]  sysfs_do_create_link_sd.isra.0+0x90/0x120
[  601.522089]  sysfs_create_link+0x65/0xc0
[  601.522105]  device_add+0x735/0x1490
[  601.532884]  ? device_private_init+0x190/0x190
[  601.532902]  hci_register_dev+0x2d9/0x810
[  601.532916]  ? hci_init_sysfs+0x7c/0xa0
[  601.540939]  __vhci_create_device+0x2a6/0x560
[  601.540953]  vhci_write+0x2a1/0x437
[  601.540967]  __vfs_write+0x4a7/0x6b0
[  601.540980]  ? kernel_read+0x120/0x120
[  601.541001]  ? rw_verify_area+0xea/0x2b0
[  601.550481]  vfs_write+0x198/0x500
[  601.550496]  SyS_write+0xfd/0x230
[  601.550507]  ? SyS_read+0x230/0x230
[  601.550518]  ? do_syscall_64+0x53/0x640
[  601.550531]  ? SyS_read+0x230/0x230
[  601.558291]  do_syscall_64+0x1e8/0x640
[  601.558303]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  601.558321]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  601.567016] RIP: 0033:0x459519
[  601.567022] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
08:43:41 executing program 5:

08:43:41 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = getpgid(0xffffffffffffffff)
r2 = msgget(0x0, 0x0)
stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000580)=0xe8)
fstat(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, <r6=>0x0})
msgctl$IPC_SET(r2, 0x1, &(0x7f0000000640)={{0x7, r3, r4, r5, r6, 0x30, 0x1}, 0x200, 0x6, 0x81, 0x1f, 0x4282, 0x80000001, r1, r1})
timer_create(0x1325b67f203dcab8, &(0x7f0000000180)={0x0, 0x1d, 0x4, @tid=r1}, &(0x7f00000001c0))
close(r0)
r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x4000, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={<r8=>0xffffffffffffffff}, 0x106, 0xa}}, 0x20)
write$RDMA_USER_CM_CMD_JOIN_MCAST(r7, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000200), 0x3, r8, 0x1c, 0x0, @in={0x2, 0x4e24, @local}}}, 0xa0)
write$RDMA_USER_CM_CMD_DISCONNECT(r7, &(0x7f0000000140)={0xa, 0x4, 0xfa00, {r8}}, 0xc)

08:43:41 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{}], 0x1)

[  601.567034] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  601.567040] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  601.567049] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  601.575491] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  601.575498] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  601.678247] Bluetooth: Can't register HCI device
08:43:41 executing program 2:

08:43:41 executing program 1 (fault-call:2 fault-nth:53):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:41 executing program 5:

08:43:41 executing program 2:

[  601.883151] FAULT_INJECTION: forcing a failure.
[  601.883151] name failslab, interval 1, probability 0, space 0, times 0
[  601.923597] CPU: 0 PID: 16473 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  601.930764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  601.940121] Call Trace:
[  601.942721]  dump_stack+0x138/0x19c
[  601.946362]  should_fail.cold+0x10f/0x159
[  601.950521]  should_failslab+0xdb/0x130
[  601.950536]  __kmalloc+0x2f0/0x7a0
[  601.950551]  ? _raw_spin_unlock_irqrestore+0xa4/0xe0
[  601.950565]  ? devres_add+0x40/0x50
[  601.950575]  ? rfkill_alloc+0x9c/0x2a0
[  601.950588]  rfkill_alloc+0x9c/0x2a0
[  601.950604]  hci_register_dev+0x308/0x810
[  601.950611]  ? hci_alloc_dev+0x1770/0x1c60
[  601.950637]  __vhci_create_device+0x2a6/0x560
[  601.958147]  vhci_write+0x2a1/0x437
[  601.958166]  __vfs_write+0x4a7/0x6b0
[  601.994631]  ? kernel_read+0x120/0x120
[  601.998537]  ? rw_verify_area+0xea/0x2b0
[  602.002613]  vfs_write+0x198/0x500
[  602.006156]  SyS_write+0xfd/0x230
[  602.009592]  ? SyS_read+0x230/0x230
[  602.013204]  ? do_syscall_64+0x53/0x640
[  602.017162]  ? SyS_read+0x230/0x230
[  602.020787]  do_syscall_64+0x1e8/0x640
[  602.024701]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  602.029553]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  602.034726] RIP: 0033:0x459519
[  602.037905] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  602.045606] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  602.052914] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  602.060209] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  602.067470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  602.074732] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:41 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = syz_open_dev$vcsa(&(0x7f0000004100)='/dev/vcsa#\x00', 0x9, 0x105080)
getsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000004140)=0x1, &(0x7f0000004180)=0xae85940c9b8ddad4)
close(r0)

08:43:41 executing program 5:

08:43:41 executing program 0:
r0 = gettid()
mkdir(&(0x7f00000000c0)='./file0\x00', 0x0)
r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0)
mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}})
read$FUSE(r1, &(0x7f0000002000), 0x1000)
openat$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0)
tkill(r0, 0x4)
write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50)
read$FUSE(r1, &(0x7f0000003000), 0x1000)
ioctl$int_in(r1, 0x5421, &(0x7f0000000040)=0x401)
read$FUSE(r1, 0x0, 0x0)

08:43:41 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{}], 0x1)

08:43:41 executing program 2:

08:43:41 executing program 1 (fault-call:2 fault-nth:54):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:41 executing program 5:

08:43:41 executing program 2:

08:43:41 executing program 2:

08:43:41 executing program 5:

[  602.330554] device bridge_slave_1 left promiscuous mode
[  602.336452] bridge0: port 2(bridge_slave_1) entered disabled state
[  602.355202] FAULT_INJECTION: forcing a failure.
[  602.355202] name failslab, interval 1, probability 0, space 0, times 0
08:43:41 executing program 2:

[  602.411314] device bridge_slave_0 left promiscuous mode
[  602.432388] bridge0: port 1(bridge_slave_0) entered disabled state
[  602.444459] CPU: 1 PID: 16485 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  602.451594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  602.460960] Call Trace:
[  602.463569]  dump_stack+0x138/0x19c
[  602.467214]  should_fail.cold+0x10f/0x159
[  602.471379]  should_failslab+0xdb/0x130
[  602.475363]  kmem_cache_alloc+0x2d7/0x780
[  602.479515]  ? memcpy+0x46/0x50
[  602.482799]  ? kstrdup+0x5a/0x70
[  602.486171]  __kernfs_new_node+0x70/0x420
[  602.490318]  ? vprintk_func+0x65/0x159
[  602.494209]  kernfs_new_node+0x80/0xf0
[  602.498103]  kernfs_create_dir_ns+0x41/0x140
[  602.502518]  sysfs_create_dir_ns+0xbe/0x1d0
[  602.506846]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  602.512391]  kobject_add+0x11f/0x180
[  602.516110]  ? kset_create_and_add+0x180/0x180
[  602.520703]  ? __raw_spin_lock_init+0x2d/0x100
[  602.525286]  ? refcount_inc_not_zero+0x88/0xe0
[  602.529870]  ? klist_init+0x71/0xe0
[  602.533510]  device_add+0x383/0x1490
[  602.537225]  ? retint_kernel+0x2d/0x2d
[  602.541115]  ? device_private_init+0x190/0x190
[  602.545708]  ? rfkill_register+0x194/0xb20
[  602.549948]  rfkill_register+0x19c/0xb20
[  602.554024]  hci_register_dev+0x34b/0x810
[  602.558182]  __vhci_create_device+0x2a6/0x560
[  602.562682]  vhci_write+0x2a1/0x437
[  602.566310]  __vfs_write+0x4a7/0x6b0
[  602.570028]  ? kernel_read+0x120/0x120
[  602.573934]  ? rw_verify_area+0xea/0x2b0
[  602.578000]  vfs_write+0x198/0x500
[  602.581544]  SyS_write+0xfd/0x230
[  602.584999]  ? SyS_read+0x230/0x230
[  602.588626]  ? do_syscall_64+0x53/0x640
[  602.592599]  ? SyS_read+0x230/0x230
[  602.596231]  do_syscall_64+0x1e8/0x640
[  602.600114]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  602.604966]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
08:43:42 executing program 2:

[  602.610151] RIP: 0033:0x459519
[  602.613334] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  602.621046] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  602.628341] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  602.635620] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  602.642889] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  602.650157] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  602.837233] device hsr_slave_1 left promiscuous mode
08:43:42 executing program 5:

[  602.883775] device hsr_slave_0 left promiscuous mode
[  602.892046] kobject_add_internal failed for rfkill266 (error: -12 parent: hci2)
08:43:42 executing program 3:
r0 = socket$alg(0x26, 0x5, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000080)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000180)=0xe8)
getgroups(0x2, &(0x7f00000001c0)=[0x0, <r2=>0xee00])
fchown(r0, r1, r2)
r3 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x5a, 0x2000)
ioctl$TUNSETTXFILTER(r3, 0x400454d1, &(0x7f0000000240)=ANY=[@ANYBLOB="01000400aaaaaaaaaaaa1088aaaaaa470a0c9a285612ffffffbfffff"])
r4 = gettid()
sched_setattr(r4, &(0x7f0000000280)={0x30, 0x1, 0x0, 0x0, 0x9, 0x0, 0x5, 0x20}, 0x0)
r5 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r5, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r5)

[  602.937337] team0 (unregistering): Port device team_slave_1 removed
[  602.976213] team0 (unregistering): Port device team_slave_0 removed
[  602.995559] bond0 (unregistering): Releasing backup interface bond_slave_1
[  603.034837] bond0 (unregistering): Releasing backup interface bond_slave_0
[  603.112573] bond0 (unregistering): Released all slaves
08:43:42 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000080)=@HCI_ACLDATA_PKT={0x2, "457b0e5c15af244ce4e29dc6f0d52be271fe815bff652ff828c4d2a6b41eb9a3c215eca25bfc6e47e551c92adb9d775ac8ba625e43d1870e7380c4e14d5bda2d54fe7960814fe0b860f0dde8bc6c364394f048387b44e17455b11adef650023e048e5024406a096d75433023645d26c8231a4086a8ac3ed643f3d1e75c03a8da69cdbcc107e81531ad4e30a8a81736ff59d0f8b238bea6d4a4517b6f81c1888c3c6ab2a6a2777ee3f2e65f3e31784cb86c0de48cf9e1cb1db62b013e6e37f5a550220673c509"}, 0xc7)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

[  605.530235] IPVS: ftp: loaded support on port[0] = 21
[  606.016144] chnl_net:caif_netlink_parms(): no params data found
[  606.048645] bridge0: port 1(bridge_slave_0) entered blocking state
[  606.055156] bridge0: port 1(bridge_slave_0) entered disabled state
[  606.062074] device bridge_slave_0 entered promiscuous mode
[  606.068591] bridge0: port 2(bridge_slave_1) entered blocking state
[  606.075368] bridge0: port 2(bridge_slave_1) entered disabled state
[  606.082382] device bridge_slave_1 entered promiscuous mode
[  606.099162] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  606.108289] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  606.124730] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  606.132019] team0: Port device team_slave_0 added
[  606.137434] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  606.144656] team0: Port device team_slave_1 added
[  606.149799] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  606.157139] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  606.223779] device hsr_slave_0 entered promiscuous mode
[  606.260475] device hsr_slave_1 entered promiscuous mode
[  606.300682] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  606.307572] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  606.319716] bridge0: port 2(bridge_slave_1) entered blocking state
[  606.326136] bridge0: port 2(bridge_slave_1) entered forwarding state
[  606.332813] bridge0: port 1(bridge_slave_0) entered blocking state
[  606.339188] bridge0: port 1(bridge_slave_0) entered forwarding state
[  606.365836] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  606.372337] 8021q: adding VLAN 0 to HW filter on device bond0
[  606.381092] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  606.389069] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  606.397352] bridge0: port 1(bridge_slave_0) entered disabled state
[  606.404119] bridge0: port 2(bridge_slave_1) entered disabled state
[  606.415522] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  606.421719] 8021q: adding VLAN 0 to HW filter on device team0
[  606.429841] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  606.437480] bridge0: port 1(bridge_slave_0) entered blocking state
[  606.443856] bridge0: port 1(bridge_slave_0) entered forwarding state
[  606.453316] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  606.461083] bridge0: port 2(bridge_slave_1) entered blocking state
[  606.467438] bridge0: port 2(bridge_slave_1) entered forwarding state
[  606.481417] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  606.489062] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  606.498079] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  606.510857] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  606.520931] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  606.532692] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  606.538702] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  606.545760] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  606.558054] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  606.567171] 8021q: adding VLAN 0 to HW filter on device batadv0
[  607.001009] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:47 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1)

08:43:47 executing program 2:

08:43:47 executing program 1 (fault-call:2 fault-nth:55):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:47 executing program 5:

08:43:47 executing program 0:

08:43:47 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x1, 0x7, 0x0, 0x3, 0x4})

08:43:47 executing program 0:

08:43:47 executing program 5:
r0 = memfd_create(&(0x7f0000000040)='\x00', 0x0)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8000000})

08:43:47 executing program 2:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0)
fchdir(r0)
mkdir(&(0x7f0000000440)='./control\x00', 0x0)

[  607.721847] FAULT_INJECTION: forcing a failure.
[  607.721847] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  607.721862] CPU: 1 PID: 16535 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  607.740792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  607.750149] Call Trace:
[  607.750170]  dump_stack+0x138/0x19c
[  607.750188]  should_fail.cold+0x10f/0x159
[  607.750202]  __alloc_pages_nodemask+0x1d6/0x7a0
[  607.750215]  ? __alloc_pages_slowpath+0x2930/0x2930
[  607.750240]  cache_grow_begin+0x80/0x400
[  607.750255]  kmem_cache_alloc_trace+0x6b2/0x790
[  607.750265]  ? retint_kernel+0x2d/0x2d
[  607.750281]  ? devm_device_remove_groups+0x50/0x50
[  607.778977]  kobject_uevent_env+0x378/0xc23
[  607.787777]  ? wait_for_completion+0x420/0x420
[  607.796654]  ? _raw_spin_unlock_irq+0x54/0x90
[  607.801156]  kobject_uevent+0x20/0x26
[  607.801169]  device_add+0xa3e/0x1490
[  607.801190]  ? device_private_init+0x190/0x190
[  607.801209]  hci_register_dev+0x2d9/0x810
[  607.808704]  ? hci_init_sysfs+0x7c/0xa0
[  607.808723]  __vhci_create_device+0x2a6/0x560
[  607.808735]  vhci_write+0x2a1/0x437
[  607.821406]  __vfs_write+0x4a7/0x6b0
[  607.821419]  ? kernel_read+0x120/0x120
[  607.821441]  ? rw_verify_area+0xea/0x2b0
[  607.821452]  vfs_write+0x198/0x500
[  607.821464]  SyS_write+0xfd/0x230
[  607.821475]  ? SyS_read+0x230/0x230
[  607.821487]  ? do_syscall_64+0x53/0x640
[  607.821496]  ? SyS_read+0x230/0x230
[  607.821506]  do_syscall_64+0x1e8/0x640
[  607.821515]  ? trace_hardirqs_off_thunk+0x1a/0x1c
08:43:47 executing program 2:
r0 = socket$alg(0x26, 0x5, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
close(r0)
syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0)
r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0)
r4 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r4, 0x1000008912, &(0x7f0000000040)="0800a1695e0bcfe87b0071")
syz_kvm_setup_cpu$x86(r0, r3, &(0x7f000000b000/0x18000)=nil, 0x0, 0x1c7, 0x0, 0x0, 0x0)

08:43:47 executing program 0:
poll(&(0x7f0000000000)=[{}], 0x1, 0x8000000000049)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x59c, 0x0, 0x0, 0x800e00501)
recvfrom$inet(r0, 0x0, 0x1000001ab, 0x2, 0x0, 0x800e004e1)
shutdown(r0, 0x0)

[  607.821530]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  607.821538] RIP: 0033:0x459519
[  607.821544] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  607.821554] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  607.821559] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  607.821563] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  607.821568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  607.821573] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
08:43:47 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhci\x00', 0x1ffffe)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:47 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1)

08:43:47 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhci\x00', 0x1)
r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x1, 0x0)
setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000100)={{0x80, 0xffffffffffffffc0}, 0x50}, 0x10)
ioctl$PPPIOCGFLAGS(r1, 0x8004745a, &(0x7f0000000000))
ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000380)={r1, 0x3})
fsetxattr$trusted_overlay_origin(r1, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x3)
setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@rc={0x1f, {0x6, 0x7ff, 0x1, 0x3b0, 0x1f, 0x9}, 0x8}, {&(0x7f00000001c0)=""/234, 0xea}, &(0x7f0000000080), 0x8}, 0xa0)
write$vhci(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="048bcbad9548d46a4fe02106f2453410ef023dab6d29689e5179b3e70ca8b2a6d1f1a6716f20019eabd2ddce72079f4422e564d216bc1bf332ca155d127b03c4b51067c991b6573e12576c859c9a9e2b8f87001bdb39cd"], 0x57)
close(r0)

08:43:47 executing program 1 (fault-call:2 fault-nth:56):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:47 executing program 2:
perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$inet(0x2, 0xa, 0x0)
bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @dev}, 0x10)

08:43:47 executing program 3:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40100, 0x0)
ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f00000000c0)={0xf6, ""/246})
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r1, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
ioctl$KDENABIO(r0, 0x4b36)
setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f00000001c0)={0x9804, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e24, @multicast1}}}, 0x108)
close(r1)

[  608.167579] FAULT_INJECTION: forcing a failure.
[  608.167579] name failslab, interval 1, probability 0, space 0, times 0
[  608.222741] CPU: 1 PID: 16566 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  608.229984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  608.239366] Call Trace:
[  608.241962]  dump_stack+0x138/0x19c
[  608.245594]  should_fail.cold+0x10f/0x159
[  608.249741]  should_failslab+0xdb/0x130
[  608.253809]  kmem_cache_alloc+0x2d7/0x780
[  608.257948]  ? memcpy+0x46/0x50
[  608.261224]  ? kstrdup+0x5a/0x70
[  608.264588]  __kernfs_new_node+0x70/0x420
[  608.268728]  ? vprintk_func+0x65/0x159
[  608.272635]  kernfs_new_node+0x80/0xf0
[  608.276525]  kernfs_create_dir_ns+0x41/0x140
[  608.280928]  sysfs_create_dir_ns+0xbe/0x1d0
[  608.285247]  kobject_add_internal.part.0.cold+0x114/0x5ae
[  608.290788]  kobject_add+0x11f/0x180
[  608.294509]  ? kset_create_and_add+0x180/0x180
[  608.299352]  ? __raw_spin_lock_init+0x2d/0x100
[  608.303933]  ? refcount_inc_not_zero+0x88/0xe0
[  608.308543]  ? klist_init+0x71/0xe0
[  608.312171]  device_add+0x383/0x1490
[  608.315880]  ? retint_kernel+0x2d/0x2d
[  608.319765]  ? device_private_init+0x190/0x190
[  608.324340]  ? kobject_set_name_vargs+0x101/0x150
[  608.329179]  rfkill_register+0x19c/0xb20
[  608.333241]  hci_register_dev+0x34b/0x810
[  608.337381]  ? hci_init_sysfs+0x7c/0xa0
[  608.341355]  __vhci_create_device+0x2a6/0x560
[  608.345844]  vhci_write+0x2a1/0x437
[  608.349468]  __vfs_write+0x4a7/0x6b0
[  608.353683]  ? kernel_read+0x120/0x120
[  608.357580]  ? rw_verify_area+0xea/0x2b0
[  608.361723]  vfs_write+0x198/0x500
[  608.365259]  SyS_write+0xfd/0x230
[  608.368706]  ? SyS_read+0x230/0x230
[  608.372327]  ? do_syscall_64+0x53/0x640
[  608.376294]  ? SyS_read+0x230/0x230
[  608.379919]  do_syscall_64+0x1e8/0x640
[  608.383804]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  608.388667]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  608.393852] RIP: 0033:0x459519
[  608.397031] RSP: 002b:00007f7768d4dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  608.404736] RAX: ffffffffffffffda RBX: 00007f7768d4dc90 RCX: 0000000000459519
[  608.412010] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
08:43:47 executing program 0:
r0 = creat(&(0x7f0000000000)='./file0\x00', 0x4003)
write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB='#! ./file0'], 0xa)
close(r0)
stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0))
getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0))
ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080))
perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)

08:43:47 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000", 0x15}], 0x1)

[  608.419278] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000
[  608.426556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d4e6d4
[  608.433904] R13: 00000000004c95ff R14: 00000000004e0958 R15: 0000000000000005
[  608.784486] device bridge_slave_1 left promiscuous mode
[  608.790146] bridge0: port 2(bridge_slave_1) entered disabled state
[  608.831220] kobject_add_internal failed for rfkill274 (error: -12 parent: hci1)
[  608.845080] device bridge_slave_0 left promiscuous mode
[  608.851797] bridge0: port 1(bridge_slave_0) entered disabled state
08:43:48 executing program 5:
perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40000000000600b, 0x0)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000100)={[], 0x0, 0x4, 0xac6c})
ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0)

08:43:48 executing program 2:
r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0)
r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0)
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x2000, &(0x7f0000ffe000/0x2000)=nil})
ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0xc018aec0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil})

08:43:48 executing program 0:
poll(&(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x4d)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xa09, 0x0, 0x0, 0x800e003c6)
r1 = dup(r0)
poll(&(0x7f0000000140)=[{r1}], 0x1, 0x3c)
shutdown(r1, 0x0)

08:43:48 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x800, 0x0)
ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000011c0)={0x2610ce15, 0xbf3, &(0x7f00000000c0)="12ce9ff39209d1f392f34a4b0fb80185d6e02c224884d8642545179a261ec19078ade35911fdb5f32dadcf2218b56ca92fa6b9eae7c4c38c41003abb82ceb6556d1a97198c979e7efe19f17f20229897133effedc5b255f80f51f0e7a213665ac458cdd5ae223456e13f85c51423881331cb6085c6d5065f4bfbc2d29d531c3ec0f7c66ec886e7739aad66bfa7ecd94de60d8cfdf171a19c2bda3280634d74349b7765af0d14ce3ce2d90641710c8f6a681ba47d9e5d960358ec1f57f7851f552f21e5c9f67a4ae9e4719ba33829d1aa19eb3a3e2d03f8c8709d3143fc6de7a04daca72bd39c7454", &(0x7f00000001c0)="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", 0xe8, 0x1000})

08:43:48 executing program 1:
sysinfo(&(0x7f0000000000)=""/22)
sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x392, &(0x7f0000000440)}, 0x0)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070")
mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x0, &(0x7f0000130000/0x800000)=nil)
r1 = socket$inet(0x10, 0x2, 0x0)
ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x00\xea:\x01\x00', @ifru_flags})
perf_event_open(&(0x7f000001d000)={0x2000000000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x8000, 0x0)
ioctl$PIO_SCRNMAP(r3, 0x4b41, &(0x7f00000002c0)="f1dc8dc5db2e3212d6efd2f0252348597292cf13299c8eb491448a244976dd4baf6a10de964e8f9e2d4455e49f474eeabe1fbd4aa53fbff2a971440fbee18d0c84fb5a1cb575903d3f74e36614744d44f8e0142372132beb4b7ce8136b06ac8b1295d9cdac826b07944de5b72ad6c4a6d856c3b2629fbc64b4224d44a06c6fa840a7f8ff910a65367713bb304a110530ff6787d0bf23aee15a8bf1fb87647dd62fd9c7e74d15fb9ddb118f763267c7f40e5faa")
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0)
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
fcntl$getownex(r2, 0x10, &(0x7f00000000c0)={0x0, <r4=>0x0})
waitid(0x0, r4, &(0x7f0000000140), 0x2000000b, &(0x7f00000001c0))
close(r2)

[  609.066409] device hsr_slave_1 left promiscuous mode
08:43:48 executing program 2:
r0 = socket(0x1, 0x1, 0x0)
sync_file_range(r0, 0x2, 0x0, 0x0)
r1 = gettid()
getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0)
ioctl$sock_ifreq(r0, 0x0, 0x0)
setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0xfffffffffffffd88)
timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000))
readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x4e21, @remote}, {0x307, @remote}, 0x10, {0x2, 0x0, @local}, 'bcsh0\x00'})
timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0)
mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0)
tkill(r1, 0x1000000000016)

08:43:48 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000004c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0)
write$vhci(r0, &(0x7f0000000080)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
recvmsg$kcm(r1, &(0x7f0000000400)={&(0x7f00000000c0)=@in={0x2, 0x0, @initdev}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000140)=""/189, 0xbd}, {&(0x7f0000000200)=""/122, 0x7a}, {&(0x7f0000000280)=""/37, 0x25}, {&(0x7f00000002c0)=""/38, 0x26}], 0x4, &(0x7f0000000340)=""/146, 0x92}, 0x40002041)
close(r0)
openat$cgroup_ro(r1, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0)

[  609.127744] device hsr_slave_0 left promiscuous mode
[  609.195850] team0 (unregistering): Port device team_slave_1 removed
08:43:48 executing program 2:
poll(&(0x7f0000001480)=[{}], 0x1, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x100000007, 0x0, 0x0, 0x800e00525)
poll(&(0x7f0000000080)=[{}], 0x1, 0x101)
shutdown(r0, 0x0)

08:43:48 executing program 5:
r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0)
fchdir(r0)
r1 = open(&(0x7f0000000380)='./bus\x00', 0x141046, 0x0)
r2 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r2, 0x1000008912, &(0x7f0000000000)="c0dca5055e0bcfec7be070")
r3 = creat(&(0x7f0000000180)='./file0\x00', 0x0)
fallocate(r3, 0x0, 0x0, 0x6d0)
r4 = creat(0x0, 0x0)
fcntl$setstatus(r4, 0x4, 0x6000)
io_setup(0x2, &(0x7f00000004c0)=<r5=>0x0)
io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}])
ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r3})

[  609.268167] team0 (unregistering): Port device team_slave_0 removed
08:43:48 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)
getsockname(0xffffffffffffffff, &(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, &(0x7f0000000100)=0x80)
setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000140)=@ccm_128={{0x307}, "3ace3e6087d98350", "b548261112810f9e92e02bccb7569035", "46fb8386", "4c7b02ebeabb19e9"}, 0x28)

08:43:48 executing program 0:
creat(&(0x7f0000000080)='./file0\x00', 0x0)
clone(0xffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=', @ANYRESHEX])
setxattr$trusted_overlay_origin(0x0, &(0x7f0000000140)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2)

[  609.368737] bond0 (unregistering): Releasing backup interface bond_slave_1
[  609.383787] 9pnet: Could not find request transport: 0xffffffffffffffff
[  609.403876] 9pnet: Could not find request transport: 0xffffffffffffffff
[  609.417760] bond0 (unregistering): Releasing backup interface bond_slave_0
[  609.477150] bond0 (unregistering): Released all slaves
[  612.060213] IPVS: ftp: loaded support on port[0] = 21
[  612.368734] chnl_net:caif_netlink_parms(): no params data found
[  612.402456] bridge0: port 1(bridge_slave_0) entered blocking state
[  612.408871] bridge0: port 1(bridge_slave_0) entered disabled state
[  612.415973] device bridge_slave_0 entered promiscuous mode
[  612.423364] bridge0: port 2(bridge_slave_1) entered blocking state
[  612.429755] bridge0: port 2(bridge_slave_1) entered disabled state
[  612.436782] device bridge_slave_1 entered promiscuous mode
[  612.453277] bond0: Enslaving bond_slave_0 as an active interface with an up link
[  612.462541] bond0: Enslaving bond_slave_1 as an active interface with an up link
[  612.479213] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready
[  612.486504] team0: Port device team_slave_0 added
[  612.491941] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready
[  612.498967] team0: Port device team_slave_1 added
[  612.504334] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready
[  612.511541] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready
[  612.563807] device hsr_slave_0 entered promiscuous mode
[  612.620372] device hsr_slave_1 entered promiscuous mode
[  612.660535] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready
[  612.667424] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready
[  612.681582] bridge0: port 2(bridge_slave_1) entered blocking state
[  612.687950] bridge0: port 2(bridge_slave_1) entered forwarding state
[  612.694604] bridge0: port 1(bridge_slave_0) entered blocking state
[  612.701009] bridge0: port 1(bridge_slave_0) entered forwarding state
[  612.727419] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready
[  612.733757] 8021q: adding VLAN 0 to HW filter on device bond0
[  612.741550] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready
[  612.749430] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready
[  612.758207] bridge0: port 1(bridge_slave_0) entered disabled state
[  612.765203] bridge0: port 2(bridge_slave_1) entered disabled state
[  612.775594] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready
[  612.781821] 8021q: adding VLAN 0 to HW filter on device team0
[  612.789844] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready
[  612.797912] bridge0: port 1(bridge_slave_0) entered blocking state
[  612.804274] bridge0: port 1(bridge_slave_0) entered forwarding state
[  612.819694] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready
[  612.827548] bridge0: port 2(bridge_slave_1) entered blocking state
[  612.833935] bridge0: port 2(bridge_slave_1) entered forwarding state
[  612.851519] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready
[  612.859142] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready
[  612.867135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready
[  612.875349] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready
[  612.883161] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready
[  612.891454] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready
[  612.897448] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready
[  612.911578] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready
[  612.921484] 8021q: adding VLAN 0 to HW filter on device batadv0
[  613.360427] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready
08:43:53 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d0006", 0x1f}], 0x1)

08:43:53 executing program 0:
r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0)
perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x28}, 0x45c)
ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0)

08:43:53 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000440)='/proc/capi/capi20\x00', 0x800, 0x0)
clock_gettime(0x0, &(0x7f0000000180)={<r2=>0x0, <r3=>0x0})
clock_gettime(0x0, &(0x7f00000001c0)={<r4=>0x0, <r5=>0x0})
clock_gettime(0x0, &(0x7f0000000200)={<r6=>0x0, <r7=>0x0})
write$sndseq(r1, &(0x7f0000000240)=[{0xffffffffffff1c49, 0x1, 0x401, 0x9, @tick=0x8001, {0x3ff, 0x8c82}, {0x6, 0xf2bf}, @quote={{0x5, 0x20}, 0x82, &(0x7f0000000140)={0x3, 0x1000, 0x2, 0x80000001, @time={0x0, 0x1c9c380}, {0x1, 0x4}, {0xfffffffffffffffc, 0xfffffffeffffffff}, @queue={0x7fffffff, {0x7, 0x2}}}}}, {0x0, 0x8, 0xff, 0xfffffffffffffc00, @tick=0x240000000000000, {0x6, 0x92}, {0x14, 0x4}, @addr={0xecb, 0x3}}, {0x1ff, 0x89b4, 0xfffffffffffffffb, 0xc1b, @tick=0x3, {0x4, 0x6}, {0x1, 0x5}, @connect={{0x2, 0x100000000}, {0x0, 0x3}}}, {0x1, 0x4, 0x100000000, 0x8, @tick=0x2, {0x1ff}, {0xffffffffffff5170, 0xfffffffffffffffd}, @raw8={"934802cb5ded8b32ff1db7ea"}}, {0x1, 0x8, 0x4, 0x2, @tick=0xef9, {0x2, 0x7f}, {0x1}, @result={0x100000001, 0x7}}, {0x2, 0xfffffffffffffc01, 0x400, 0xfffffffffffffffe, @tick=0x6, {0x3, 0xca7a}, {0xfffffffffffff8d9, 0x400000000000}, @raw32={[0x1ff, 0x1000, 0x7]}}, {0x80, 0x81, 0x2, 0x4, @time={r2, r3+30000000}, {0xf34, 0x81}, {0x0, 0xa692}, @result={0x2, 0x10001}}, {0x9, 0x5, 0x7, 0xfffffffffffffffe, @time={r4, r5+30000000}, {0xff, 0x80000000000}, {0x3, 0x101}, @result={0x4, 0x2e50}}, {0x1, 0x5, 0x3, 0x0, @tick=0xfffffffffffffffb, {0x1f, 0x9}, {0x7, 0x9}, @time=@time={r6, r7+10000000}}, {0x2, 0x2, 0x377e, 0xf05, @time, {0x1, 0x70}, {0x5, 0x7}, @time=@tick=0x4}], 0x1e0)
close(r0)
r8 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0)
ioctl$EVIOCSKEYCODE(r8, 0x40084504, &(0x7f0000000100)=[0x7, 0x5])

08:43:53 executing program 5:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
r1 = dup(r0)
shutdown(r1, 0x4)
recvfrom$inet(r1, 0x0, 0xed67, 0x2, 0x0, 0x800e00727)
shutdown(r0, 0x0)

08:43:53 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, 0x0)
close(r0)

08:43:53 executing program 2:
syz_mount_image$vfat(&(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)

08:43:53 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f00000001c0)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x40, 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000200)={0xfffffffffffffff7, 0x0, {0xffffffffffffffff, 0x2, 0x42, 0x2, 0x1}})
close(r0)
write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x2, 0x3ff, 0x8, 0x67, "d3a68e7427966d68f0e13163d5973c5a897f9ac89bb23314ce52e7c257c798a1dc6199d804b8ccc7d3286e7f7053cb31aee27c1a06893c3c19b779dac4989109463fd84ec919fa80d06f3f1614b7c76c30e61ba85bcfa2439029856a108826dd311b01599ff12f"}, 0x73)

[  614.114284] input: syz1 as /devices/virtual/input/input11
[  614.116287] FAT-fs (loop2): bogus number of reserved sectors
[  614.146202] FAT-fs (loop2): Can't find a valid FAT filesystem
08:43:53 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d0006", 0x1f}], 0x1)

08:43:53 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)

[  614.228659] FAT-fs (loop2): bogus number of reserved sectors
[  614.260529] FAT-fs (loop2): Can't find a valid FAT filesystem
08:43:53 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhci\x00', 0x10000)
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:53 executing program 2:
poll(&(0x7f0000000180), 0x2271, 0x4e)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0xcfb3abb5, 0x0, 0x0, 0x800e00a4f)
ppoll(&(0x7f0000000000)=[{r0, 0x4}, {r0, 0xa0}], 0x2, 0x0, 0x0, 0x0)
poll(&(0x7f0000001240)=[{r0}], 0x1, 0x391)
shutdown(r0, 0x0)

08:43:53 executing program 0:
poll(&(0x7f0000000000)=[{}], 0x1, 0x8000000000049)
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
recvfrom$inet(r0, 0x0, 0x59c, 0x2, 0x0, 0x800e00501)
recvfrom$inet(r0, 0x0, 0x1000001ab, 0x2, 0x0, 0x800e004e1)
shutdown(r0, 0x0)

08:43:53 executing program 1:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=<r1=>0x0)
write$FUSE_LK(r0, &(0x7f0000000140)={0x28, 0x0, 0x6, {{0x0, 0x8, 0x0, r1}}}, 0x28)
r2 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
write$vhci(r2, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, &(0x7f0000000100))
ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0xd9)
ioctl$CAPI_GET_SERIAL(0xffffffffffffffff, 0xc0044308, 0x0)
ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, 0x0)
close(r2)
r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0xac000, 0x0)
ioctl$TIOCLINUX3(r3, 0x541c, &(0x7f00000001c0))

08:43:53 executing program 5:
r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0)
mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0)
write$P9_RWALK(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='d'], 0x1)
perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = gettid()
rt_tgsigqueueinfo(r1, 0x0, 0x0, 0x0)

08:43:53 executing program 3:
r0 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x1)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000080)={0x79})
ioctl$KVM_ENABLE_CAP(r2, 0xc008ae67, &(0x7f0000000240))
write$vhci(r0, &(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x11cc1}, 0x2)
close(r0)

08:43:53 executing program 4:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040))
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0)
lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0)
r1 = creat(&(0x7f00000002c0)='\x00', 0x0)
write$P9_RLOCK(r1, &(0x7f0000000300)={0x8, 0x35, 0x2}, 0x8)
mkdir(&(0x7f0000000000)='./file0\x00', 0x0)
mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
shmctl$SHM_UNLOCK(0x0, 0xc)
setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:hald_var_lib_t:s0\x00', 0x24, 0x0)
openat$uinput(0xffffffffffffff9c, &(0x7f0000000400)='/dev/uinput\x00', 0x802, 0x0)
ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1)
symlinkat(&(0x7f0000000180)='./file0\x00', r2, &(0x7f00000001c0)='./file0\x00')
pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00')
setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000340)=0x3521, 0x4)
r3 = socket$netlink(0x10, 0x3, 0x0)
writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d0006", 0x1f}], 0x1)

08:43:54 executing program 5:
r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200000, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x80002)
pipe(&(0x7f0000000440)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
write(r2, &(0x7f0000000340), 0x41395527)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
clock_gettime(0x0, &(0x7f0000000380)={0x0, <r3=>0x0})
pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, 0x0)
vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0)

[  614.565724] refcount_t: increment on 0; use-after-free.
[  614.587043] ------------[ cut here ]------------
[  614.591857] WARNING: CPU: 1 PID: 16713 at lib/refcount.c:153 refcount_inc.cold+0x18/0x1f
[  614.594690] kobject: 'kvm' (ffff888219f6e410): kobject_uevent_env
[  614.600081] Kernel panic - not syncing: panic_on_warn set ...
[  614.600081] 
[  614.600095] CPU: 1 PID: 16713 Comm: syz-executor.1 Not tainted 4.14.130 #24
[  614.600103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[  614.600107] Call Trace:
[  614.600135]  dump_stack+0x138/0x19c
[  614.600154]  panic+0x1f2/0x426
[  614.616548] kobject: 'kvm' (ffff888219f6e410): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  614.620829]  ? add_taint.cold+0x16/0x16
[  614.620847]  ? refcount_inc.cold+0x18/0x1f
[  614.620856]  ? __warn.cold+0x14/0x36
[  614.620868]  ? refcount_inc.cold+0x18/0x1f
[  614.620880]  __warn.cold+0x2f/0x36
[  614.650247] kobject: 'kvm' (ffff888219f6e410): kobject_uevent_env
[  614.652637]  ? ist_end_non_atomic+0x10/0x10
[  614.652653]  ? refcount_inc.cold+0x18/0x1f
[  614.652668]  report_bug+0x216/0x254
[  614.652681]  do_error_trap+0x1bb/0x310
[  614.652692]  ? math_error+0x360/0x360
[  614.659355] kobject: 'kvm' (ffff888219f6e410): fill_kobj_path: path = '/devices/virtual/misc/kvm'
[  614.660631]  ? vprintk_emit+0x21c/0x600
[  614.660642]  ? vprintk_emit+0x171/0x600
[  614.660658]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  614.660674]  do_invalid_op+0x1b/0x20
[  614.660684]  invalid_op+0x1b/0x40
[  614.660697] RIP: 0010:refcount_inc.cold+0x18/0x1f
[  614.728152] RSP: 0018:ffff888085b279c0 EFLAGS: 00010286
[  614.733512] RAX: 000000000000002b RBX: ffffffff86fa8fe0 RCX: 0000000000000000
[  614.740773] RDX: 000000000000a826 RSI: ffffffff814afd95 RDI: ffffed1010b64f2e
[  614.748035] RBP: ffff888085b279c8 R08: 000000000000002b R09: ffff888064278bc8
[  614.755297] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a7c5e778
[  614.762558] R13: 0000000000000000 R14: ffff8880a7c5e740 R15: ffff8880910f3d20
[  614.769843]  ? vprintk_func+0x65/0x159
[  614.773733]  kobject_get+0x5b/0x70
[  614.777269]  kobject_add_internal.part.0+0xfc/0x340
[  614.782303]  ? kfree_const+0x40/0x50
[  614.786012]  kobject_add+0x11f/0x180
[  614.789718]  ? kset_create_and_add+0x180/0x180
[  614.794296]  ? get_device_parent.isra.0+0x34e/0x560
[  614.799312]  ? kmem_cache_alloc_trace+0x623/0x790
[  614.804171]  ? lock_downgrade+0x6e0/0x6e0
[  614.808323]  get_device_parent.isra.0+0x415/0x560
[  614.813166]  device_add+0x2d3/0x1490
[  614.816874]  ? device_initialize+0x430/0x430
[  614.821293]  ? device_private_init+0x190/0x190
[  614.825877]  hci_register_dev+0x2d9/0x810
[  614.830018]  ? hci_init_sysfs+0x7c/0xa0
[  614.833997]  __vhci_create_device+0x2a6/0x560
[  614.838502]  vhci_write+0x2a1/0x437
[  614.842188]  __vfs_write+0x4a7/0x6b0
[  614.845895]  ? kernel_read+0x120/0x120
[  614.849784]  ? rw_verify_area+0xea/0x2b0
[  614.853839]  vfs_write+0x198/0x500
[  614.857374]  SyS_write+0xfd/0x230
[  614.860820]  ? SyS_read+0x230/0x230
[  614.864438]  ? do_syscall_64+0x53/0x640
[  614.868404]  ? SyS_read+0x230/0x230
[  614.872024]  do_syscall_64+0x1e8/0x640
[  614.875906]  ? trace_hardirqs_off_thunk+0x1a/0x1c
[  614.880752]  entry_SYSCALL_64_after_hwframe+0x42/0xb7
[  614.885936] RIP: 0033:0x459519
[  614.889116] RSP: 002b:00007f7768d0bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  614.896821] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519
[  614.904081] RDX: 0000000000000002 RSI: 0000000020000000 RDI: 0000000000000004
[  614.911342] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000
[  614.918599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7768d0c6d4
[  614.925877] R13: 00000000004c95ff R14: 00000000004e0958 R15: 00000000ffffffff
[  614.934659] Kernel Offset: disabled
[  614.938407] Rebooting in 86400 seconds..