0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:49 executing program 3: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 275.240090] input: syz1 as /devices/virtual/input/input89 [ 275.261186] input: syz1 as /devices/virtual/input/input90 [ 275.278538] input: syz1 as /devices/virtual/input/input91 07:01:50 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} audit_backlog_limit=64 [ 276.909725] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.919834] audit: audit_backlog=65 > audit_backlog_limit=64 [ 276.923545] audit: audit_lost=13 audit_rate_limit=0 audit_backlog_limit=64 [ 276.933604] audit: backlog limit exceeded [ 276.937414] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 276.938336] audit: type=1400 audit(1570086111.206:4607): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 276.947720] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 276.975413] input: syz1 as /devices/virtual/input/input108 07:01:51 executing program 3: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 277.073775] input: syz1 as /devices/virtual/input/input109 07:01:51 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:51 executing program 1: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 277.187847] input: syz1 as /devices/virtual/input/input110 07:01:51 executing program 1: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:51 executing program 1: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:51 executing program 1: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) syz_open_dev$radio(0x0, 0x0, 0x2) ioctl$LOOP_GET_STATUS64(0xffffffffffffffff, 0x4c05, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 277.361828] input: syz1 as /devices/virtual/input/input114 07:01:52 executing program 2: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:52 executing program 4: link(0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(0xffffffffffffffff, 0x4040ae72, 0x0) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:01:52 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r2 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.947115] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 299.947134] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 299.954790] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 299.954799] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.954808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 299.954816] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 07:02:14 executing program 1 (fault-call:5 fault-nth:0): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:14 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.417963] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.425675] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 300.432943] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 300.440226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.447495] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 300.454766] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 300.462071] CPU: 1 PID: 11381 Comm: syz-executor.2 Not tainted 4.19.76 #0 [ 300.469014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.478371] Call Trace: [ 300.480979] dump_stack+0x172/0x1f0 [ 300.484613] should_fail.cold+0xa/0x1b [ 300.488510] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.493623] ? lock_downgrade+0x880/0x880 [ 300.497783] __should_failslab+0x121/0x190 [ 300.502024] should_failslab+0x9/0x14 [ 300.505823] __kmalloc+0x2e2/0x750 [ 300.509372] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.514912] ? avc_has_extended_perms+0xa78/0x10f0 [ 300.519843] ? input_register_device+0x549/0xc30 [ 300.524607] input_register_device+0x549/0xc30 [ 300.529203] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 300.534487] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 300.539861] ? mark_held_locks+0x100/0x100 [ 300.544097] ? proc_cwd_link+0x1d0/0x1d0 [ 300.548170] ? __fget+0x340/0x540 [ 300.551641] uinput_ioctl+0x4a/0x60 [ 300.555269] ? uinput_compat_ioctl+0xb0/0xb0 [ 300.559683] do_vfs_ioctl+0xd5f/0x1380 [ 300.563573] ? selinux_file_ioctl+0x46f/0x5e0 [ 300.568074] ? selinux_file_ioctl+0x125/0x5e0 [ 300.572573] ? ioctl_preallocate+0x210/0x210 [ 300.576983] ? selinux_file_mprotect+0x620/0x620 [ 300.581746] ? iterate_fd+0x360/0x360 [ 300.585546] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.591087] ? fput+0x128/0x1a0 [ 300.594381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.599923] ? security_file_ioctl+0x8d/0xc0 [ 300.604337] ksys_ioctl+0xab/0xd0 [ 300.607793] __x64_sys_ioctl+0x73/0xb0 [ 300.611686] do_syscall_64+0xfd/0x620 [ 300.615497] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.620688] RIP: 0033:0x459a29 [ 300.623885] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.642790] RSP: 002b:00007f41e0a6ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.650506] RAX: ffffffffffffffda RBX: 00007f41e0a6ec90 RCX: 0000000000459a29 [ 300.657777] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 300.665047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.672328] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f41e0a6f6d4 [ 300.679598] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 300.686915] CPU: 0 PID: 11382 Comm: syz-executor.1 Not tainted 4.19.76 #0 [ 300.693865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.693870] Call Trace: [ 300.693892] dump_stack+0x172/0x1f0 [ 300.693914] should_fail.cold+0xa/0x1b 07:02:15 executing program 2 (fault-call:5 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 300.693938] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.693952] ? lock_downgrade+0x880/0x880 [ 300.693975] __should_failslab+0x121/0x190 [ 300.705894] should_failslab+0x9/0x14 [ 300.705908] __kmalloc+0x2e2/0x750 [ 300.705933] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.705949] ? avc_has_extended_perms+0xa78/0x10f0 [ 300.705963] ? input_register_device+0x549/0xc30 [ 300.705980] input_register_device+0x549/0xc30 [ 300.713463] uinput_ioctl_handler.isra.0+0x1035/0x1c50 07:02:15 executing program 4 (fault-call:5 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 300.713483] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 300.713503] ? mark_held_locks+0x100/0x100 [ 300.713517] ? proc_cwd_link+0x1d0/0x1d0 [ 300.713539] ? __fget+0x340/0x540 [ 300.722792] uinput_ioctl+0x4a/0x60 [ 300.722805] ? uinput_compat_ioctl+0xb0/0xb0 [ 300.722821] do_vfs_ioctl+0xd5f/0x1380 [ 300.722837] ? selinux_file_ioctl+0x46f/0x5e0 [ 300.722851] ? selinux_file_ioctl+0x125/0x5e0 [ 300.722867] ? ioctl_preallocate+0x210/0x210 [ 300.722882] ? selinux_file_mprotect+0x620/0x620 [ 300.730900] ? iterate_fd+0x360/0x360 [ 300.730919] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.730940] ? fput+0x128/0x1a0 [ 300.730960] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.730976] ? security_file_ioctl+0x8d/0xc0 [ 300.744967] ksys_ioctl+0xab/0xd0 [ 300.744987] __x64_sys_ioctl+0x73/0xb0 [ 300.745005] do_syscall_64+0xfd/0x620 [ 300.745024] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.795849] FAULT_INJECTION: forcing a failure. [ 300.795849] name failslab, interval 1, probability 0, space 0, times 0 [ 300.798216] RIP: 0033:0x459a29 [ 300.798232] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.798241] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 300.798258] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 300.798265] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 300.798276] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.846249] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 300.846258] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 300.896998] CPU: 1 PID: 11389 Comm: syz-executor.2 Not tainted 4.19.76 #0 [ 300.911988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.911993] Call Trace: [ 300.912012] dump_stack+0x172/0x1f0 [ 300.912033] should_fail.cold+0xa/0x1b [ 300.912050] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 300.912064] ? lock_downgrade+0x880/0x880 [ 300.912087] __should_failslab+0x121/0x190 [ 300.912104] should_failslab+0x9/0x14 [ 300.926244] FAULT_INJECTION: forcing a failure. [ 300.926244] name failslab, interval 1, probability 0, space 0, times 0 [ 300.926658] kmem_cache_alloc_trace+0x2cc/0x760 [ 300.940833] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 300.940851] ? refcount_inc_checked+0x2b/0x70 [ 300.940873] device_add+0xe5e/0x1760 [ 300.940893] ? get_device_parent.isra.0+0x570/0x570 [ 300.940910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.940926] ? avc_has_extended_perms+0xa78/0x10f0 [ 300.940944] ? input_register_device+0x549/0xc30 [ 300.940960] input_register_device+0x6d2/0xc30 [ 301.031872] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 301.037164] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 301.042534] ? mark_held_locks+0x100/0x100 [ 301.046770] ? proc_cwd_link+0x1d0/0x1d0 [ 301.050843] ? __fget+0x340/0x540 [ 301.054321] uinput_ioctl+0x4a/0x60 [ 301.057954] ? uinput_compat_ioctl+0xb0/0xb0 [ 301.062368] do_vfs_ioctl+0xd5f/0x1380 [ 301.066262] ? selinux_file_ioctl+0x46f/0x5e0 [ 301.070760] ? selinux_file_ioctl+0x125/0x5e0 [ 301.075264] ? ioctl_preallocate+0x210/0x210 [ 301.079678] ? selinux_file_mprotect+0x620/0x620 [ 301.084454] ? iterate_fd+0x360/0x360 [ 301.088273] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.093813] ? fput+0x128/0x1a0 [ 301.097100] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.102640] ? security_file_ioctl+0x8d/0xc0 [ 301.107054] ksys_ioctl+0xab/0xd0 [ 301.110516] __x64_sys_ioctl+0x73/0xb0 [ 301.114410] do_syscall_64+0xfd/0x620 [ 301.118219] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.123412] RIP: 0033:0x459a29 [ 301.126606] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.145512] RSP: 002b:00007f41e0a6ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.153224] RAX: ffffffffffffffda RBX: 00007f41e0a6ec90 RCX: 0000000000459a29 [ 301.160492] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 301.167762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.175030] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f41e0a6f6d4 [ 301.182300] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 301.197205] CPU: 0 PID: 11391 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 301.204166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.213513] Call Trace: [ 301.216093] dump_stack+0x172/0x1f0 [ 301.219729] should_fail.cold+0xa/0x1b [ 301.223610] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.228702] ? lock_downgrade+0x880/0x880 [ 301.232847] __should_failslab+0x121/0x190 [ 301.237075] should_failslab+0x9/0x14 [ 301.240878] __kmalloc_track_caller+0x2de/0x750 [ 301.245609] ? finish_task_switch+0x146/0x780 [ 301.250093] ? finish_task_switch+0x118/0x780 [ 301.254623] ? switch_mm_irqs_off+0x7fa/0x1360 [ 301.259214] ? kstrdup_const+0x66/0x80 [ 301.263091] kstrdup+0x3a/0x70 [ 301.266284] kstrdup_const+0x66/0x80 [ 301.270011] __kernfs_new_node+0xb0/0x680 [ 301.274153] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 301.278901] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 301.284474] ? irq_work_claim+0x98/0xc0 [ 301.288440] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.293964] ? irq_work_queue+0x30/0x90 [ 301.297930] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.303501] ? wake_up_klogd+0x99/0xd0 [ 301.307377] ? vprintk_emit+0x264/0x690 [ 301.311343] kernfs_new_node+0x99/0x130 [ 301.315316] kernfs_create_dir_ns+0x52/0x160 [ 301.319727] sysfs_create_dir_ns+0x131/0x290 [ 301.324124] ? sysfs_create_mount_point+0xa0/0xa0 [ 301.328962] ? class_dir_child_ns_type+0xd/0x60 [ 301.333622] kobject_add_internal.cold+0xe5/0x5d1 [ 301.338458] kobject_add+0x150/0x1c0 [ 301.347458] ? kset_create_and_add+0x1a0/0x1a0 [ 301.352033] ? kasan_check_read+0x11/0x20 [ 301.356171] ? mutex_unlock+0xd/0x10 [ 301.359876] device_add+0x3cc/0x1760 [ 301.363586] ? get_device_parent.isra.0+0x570/0x570 [ 301.368595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.374127] ? avc_has_extended_perms+0xa78/0x10f0 [ 301.379048] ? input_register_device+0x549/0xc30 [ 301.383794] input_register_device+0x6d2/0xc30 [ 301.388373] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 301.393644] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 301.398998] ? mark_held_locks+0x100/0x100 [ 301.403239] ? proc_cwd_link+0x1d0/0x1d0 [ 301.407292] ? __fget+0x340/0x540 [ 301.410742] uinput_ioctl+0x4a/0x60 [ 301.414357] ? uinput_compat_ioctl+0xb0/0xb0 [ 301.418755] do_vfs_ioctl+0xd5f/0x1380 [ 301.422633] ? selinux_file_ioctl+0x46f/0x5e0 [ 301.427114] ? selinux_file_ioctl+0x125/0x5e0 [ 301.431602] ? ioctl_preallocate+0x210/0x210 [ 301.435998] ? selinux_file_mprotect+0x620/0x620 [ 301.440747] ? iterate_fd+0x360/0x360 [ 301.444538] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.450061] ? fput+0x128/0x1a0 [ 301.453334] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.458872] ? security_file_ioctl+0x8d/0xc0 [ 301.463272] ksys_ioctl+0xab/0xd0 [ 301.466728] __x64_sys_ioctl+0x73/0xb0 [ 301.470610] do_syscall_64+0xfd/0x620 [ 301.474408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.479584] RIP: 0033:0x459a29 [ 301.482768] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.501655] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.509352] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 07:02:15 executing program 1 (fault-call:5 fault-nth:1): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:15 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.846968] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 301.854676] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 301.861952] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 301.869221] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.876486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 301.883755] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 301.891049] CPU: 1 PID: 11397 Comm: syz-executor.2 Not tainted 4.19.76 #0 [ 301.897991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.907343] Call Trace: [ 301.907362] dump_stack+0x172/0x1f0 [ 301.907383] should_fail.cold+0xa/0x1b [ 301.907401] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 301.907416] ? lock_downgrade+0x880/0x880 [ 301.907441] __should_failslab+0x121/0x190 [ 301.907457] should_failslab+0x9/0x14 [ 301.907470] __kmalloc_track_caller+0x2de/0x750 [ 301.907483] ? finish_task_switch+0x146/0x780 [ 301.907494] ? finish_task_switch+0x118/0x780 [ 301.907511] ? switch_mm_irqs_off+0x7fa/0x1360 [ 301.907528] ? kstrdup_const+0x66/0x80 [ 301.907544] kstrdup+0x3a/0x70 [ 301.907560] kstrdup_const+0x66/0x80 [ 301.913901] __kernfs_new_node+0xb0/0x680 [ 301.913919] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 301.913945] ? preempt_schedule+0x4b/0x60 [ 301.922909] ? ___preempt_schedule+0x16/0x18 [ 301.922925] ? preempt_count_add+0xbc/0x1b0 07:02:16 executing program 4 (fault-call:5 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 301.922940] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.922954] ? wake_up_klogd+0x99/0xd0 [ 301.922967] ? vprintk_emit+0x264/0x690 [ 301.922984] kernfs_new_node+0x99/0x130 [ 301.923002] kernfs_create_dir_ns+0x52/0x160 [ 301.923021] sysfs_create_dir_ns+0x131/0x290 [ 301.923036] ? sysfs_create_mount_point+0xa0/0xa0 [ 301.923060] ? class_dir_child_ns_type+0xd/0x60 [ 301.923078] kobject_add_internal.cold+0xe5/0x5d1 [ 301.923095] kobject_add+0x150/0x1c0 [ 301.923110] ? kset_create_and_add+0x1a0/0x1a0 [ 301.923130] ? kasan_check_read+0x11/0x20 [ 301.923149] ? mutex_unlock+0xd/0x10 [ 301.931522] device_add+0x3cc/0x1760 [ 301.931546] ? get_device_parent.isra.0+0x570/0x570 [ 301.931565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.931581] ? avc_has_extended_perms+0xa78/0x10f0 [ 301.931595] ? input_register_device+0x549/0xc30 [ 301.931611] input_register_device+0x6d2/0xc30 [ 301.940070] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 301.940103] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 301.940123] ? mark_held_locks+0x100/0x100 07:02:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 301.940137] ? proc_cwd_link+0x1d0/0x1d0 [ 301.940157] ? __fget+0x340/0x540 [ 301.940181] uinput_ioctl+0x4a/0x60 [ 301.957584] ? uinput_compat_ioctl+0xb0/0xb0 [ 301.964460] do_vfs_ioctl+0xd5f/0x1380 [ 301.964475] ? selinux_file_ioctl+0x46f/0x5e0 [ 301.964490] ? selinux_file_ioctl+0x125/0x5e0 [ 301.973359] ? ioctl_preallocate+0x210/0x210 [ 301.973372] ? selinux_file_mprotect+0x620/0x620 [ 301.973392] ? iterate_fd+0x360/0x360 [ 301.973407] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 301.973421] ? fput+0x128/0x1a0 [ 301.973443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 301.973456] ? security_file_ioctl+0x8d/0xc0 [ 301.973472] ksys_ioctl+0xab/0xd0 [ 301.973487] __x64_sys_ioctl+0x73/0xb0 [ 301.973505] do_syscall_64+0xfd/0x620 [ 301.986376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 301.986389] RIP: 0033:0x459a29 [ 301.986405] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.003715] RSP: 002b:00007f41e0a6ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.003732] RAX: ffffffffffffffda RBX: 00007f41e0a6ec90 RCX: 0000000000459a29 [ 302.003740] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 302.003748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.003756] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f41e0a6f6d4 [ 302.003767] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 302.012009] input: syz1 as /devices/virtual/input/input382 [ 302.018346] kauditd_printk_skb: 1163 callbacks suppressed [ 302.018358] audit: type=1400 audit(1570086136.296:14113): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.041026] audit: type=1400 audit(1570086136.296:14114): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.047291] audit: type=1400 audit(1570086136.346:14115): avc: denied { prog_load } for pid=11394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=0 [ 302.089580] kobject_add_internal failed for input383 (error: -12 parent: input) [ 302.131158] audit: type=1400 audit(1570086136.386:14116): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.217900] FAULT_INJECTION: forcing a failure. [ 302.217900] name failslab, interval 1, probability 0, space 0, times 0 [ 302.225849] audit: type=1400 audit(1570086136.386:14117): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.240275] CPU: 1 PID: 11407 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 302.265385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.265391] Call Trace: [ 302.265411] dump_stack+0x172/0x1f0 [ 302.265430] should_fail.cold+0xa/0x1b [ 302.265448] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.265462] ? lock_downgrade+0x880/0x880 [ 302.265485] __should_failslab+0x121/0x190 [ 302.309878] should_failslab+0x9/0x14 [ 302.309896] kmem_cache_alloc+0x2ae/0x700 [ 302.309910] ? memcpy+0x46/0x50 [ 302.309925] ? kstrdup+0x5a/0x70 [ 302.309946] __kernfs_new_node+0xef/0x680 [ 302.309966] ? kernfs_dop_revalidate+0x3c0/0x3c0 07:02:16 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.420277] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 302.420292] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 302.420300] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 07:02:17 executing program 4 (fault-call:5 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 302.420308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.420316] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 302.420323] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 302.435400] audit: type=1400 audit(1570086136.386:14120): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.488589] input: syz1 as /devices/virtual/input/input385 [ 302.530975] audit: type=1400 audit(1570086136.386:14121): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.537351] audit: type=1400 audit(1570086136.386:14122): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 302.570650] kobject_add_internal failed for input386 (error: -12 parent: input) [ 302.820304] FAULT_INJECTION: forcing a failure. [ 302.820304] name failslab, interval 1, probability 0, space 0, times 0 [ 302.851288] CPU: 1 PID: 11420 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 302.858224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.867571] Call Trace: [ 302.867588] dump_stack+0x172/0x1f0 [ 302.867606] should_fail.cold+0xa/0x1b [ 302.867622] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 302.867635] ? lock_downgrade+0x880/0x880 [ 302.867659] __should_failslab+0x121/0x190 [ 302.873857] should_failslab+0x9/0x14 [ 302.873874] kmem_cache_alloc+0x2ae/0x700 [ 302.873888] ? kasan_check_write+0x14/0x20 [ 302.873905] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 302.882881] __kernfs_new_node+0xef/0x680 [ 302.882902] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 302.882917] ? __lock_acquire+0x6ee/0x49c0 [ 302.891272] ? kernfs_activate+0x192/0x1f0 [ 302.891291] ? kernfs_add_one+0x131/0x4d0 [ 302.891315] kernfs_new_node+0x99/0x130 [ 302.891332] __kernfs_create_file+0x51/0x33b [ 302.891351] sysfs_add_file_mode_ns+0x222/0x560 [ 302.891373] sysfs_create_file_ns+0x13a/0x1c0 [ 302.891390] ? sysfs_add_file_mode_ns+0x560/0x560 [ 302.891411] ? up_read+0x1a/0x110 [ 302.899332] device_create_file+0xfa/0x1e0 [ 302.899444] ? acpi_bind_one+0x830/0x830 [ 302.899462] device_add+0x411/0x1760 [ 302.908533] ? get_device_parent.isra.0+0x570/0x570 [ 302.908552] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 302.908567] ? avc_has_extended_perms+0xa78/0x10f0 [ 302.908584] ? input_register_device+0x549/0xc30 [ 302.917477] input_register_device+0x6d2/0xc30 [ 302.917502] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 302.917520] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 302.943158] ? mark_held_locks+0x100/0x100 [ 302.943176] ? proc_cwd_link+0x1d0/0x1d0 [ 302.943198] ? __fget+0x340/0x540 [ 302.943225] uinput_ioctl+0x4a/0x60 [ 303.018470] ? uinput_compat_ioctl+0xb0/0xb0 [ 303.022876] do_vfs_ioctl+0xd5f/0x1380 [ 303.026755] ? selinux_file_ioctl+0x46f/0x5e0 [ 303.031245] ? selinux_file_ioctl+0x125/0x5e0 [ 303.035731] ? ioctl_preallocate+0x210/0x210 [ 303.040126] ? selinux_file_mprotect+0x620/0x620 [ 303.044875] ? iterate_fd+0x360/0x360 [ 303.048680] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.054209] ? fput+0x128/0x1a0 [ 303.057481] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.063005] ? security_file_ioctl+0x8d/0xc0 [ 303.067419] ksys_ioctl+0xab/0xd0 [ 303.070863] __x64_sys_ioctl+0x73/0xb0 [ 303.074741] do_syscall_64+0xfd/0x620 [ 303.078534] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.083725] RIP: 0033:0x459a29 [ 303.086906] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.105794] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.113491] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 303.120750] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 303.128005] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.135260] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 07:02:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:17 executing program 1 (fault-call:5 fault-nth:2): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 303.142516] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 303.155495] input: syz1 as /devices/virtual/input/input387 [ 303.240533] FAULT_INJECTION: forcing a failure. [ 303.240533] name failslab, interval 1, probability 0, space 0, times 0 [ 303.268207] CPU: 0 PID: 11425 Comm: syz-executor.1 Not tainted 4.19.76 #0 [ 303.272643] input: syz1 as /devices/virtual/input/input389 [ 303.275260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.275268] Call Trace: [ 303.275289] dump_stack+0x172/0x1f0 [ 303.275312] should_fail.cold+0xa/0x1b [ 303.275335] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.305449] ? lock_downgrade+0x880/0x880 [ 303.309599] __should_failslab+0x121/0x190 [ 303.313821] should_failslab+0x9/0x14 [ 303.317608] __kmalloc_track_caller+0x2de/0x750 [ 303.322273] ? console_unlock+0x6ed/0x10b0 [ 303.326506] ? find_held_lock+0x35/0x130 [ 303.330554] ? kstrdup_const+0x66/0x80 [ 303.334442] kstrdup+0x3a/0x70 [ 303.337634] kstrdup_const+0x66/0x80 [ 303.341338] __kernfs_new_node+0xb0/0x680 [ 303.345485] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 303.350232] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 303.355753] ? irq_work_claim+0x98/0xc0 [ 303.359740] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.365280] ? irq_work_queue+0x30/0x90 [ 303.369243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.374780] ? wake_up_klogd+0x99/0xd0 [ 303.378656] kernfs_new_node+0x99/0x130 [ 303.382621] kernfs_create_dir_ns+0x52/0x160 [ 303.387016] sysfs_create_dir_ns+0x131/0x290 [ 303.391415] ? sysfs_create_mount_point+0xa0/0xa0 [ 303.396250] ? class_dir_child_ns_type+0xd/0x60 [ 303.400908] kobject_add_internal.cold+0xe5/0x5d1 [ 303.405740] kobject_add+0x150/0x1c0 [ 303.409440] ? kset_create_and_add+0x1a0/0x1a0 [ 303.414013] ? kasan_check_read+0x11/0x20 [ 303.418149] ? mutex_unlock+0xd/0x10 [ 303.421855] device_add+0x3cc/0x1760 [ 303.425561] ? get_device_parent.isra.0+0x570/0x570 [ 303.430571] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.436095] ? avc_has_extended_perms+0xa78/0x10f0 [ 303.441011] ? input_register_device+0x549/0xc30 [ 303.445764] input_register_device+0x6d2/0xc30 [ 303.450347] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 303.455613] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 303.460971] ? mark_held_locks+0x100/0x100 [ 303.465191] ? proc_cwd_link+0x1d0/0x1d0 [ 303.469256] ? __fget+0x340/0x540 [ 303.472716] uinput_ioctl+0x4a/0x60 [ 303.476329] ? uinput_compat_ioctl+0xb0/0xb0 [ 303.480740] do_vfs_ioctl+0xd5f/0x1380 [ 303.484642] ? selinux_file_ioctl+0x46f/0x5e0 07:02:17 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.563707] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.571400] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 303.578669] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 07:02:18 executing program 4 (fault-call:5 fault-nth:5): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 303.585935] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.593188] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 303.600456] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 303.612713] kobject_add_internal failed for input390 (error: -12 parent: input) 07:02:18 executing program 1 (fault-call:5 fault-nth:3): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x2, 0x0) [ 303.645851] FAULT_INJECTION: forcing a failure. [ 303.645851] name failslab, interval 1, probability 0, space 0, times 0 [ 303.665241] CPU: 0 PID: 11428 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 303.672204] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.681570] Call Trace: [ 303.684191] dump_stack+0x172/0x1f0 [ 303.687851] should_fail.cold+0xa/0x1b [ 303.691780] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 303.696943] ? lock_downgrade+0x880/0x880 [ 303.701118] __should_failslab+0x121/0x190 [ 303.705369] should_failslab+0x9/0x14 [ 303.709184] kmem_cache_alloc+0x2ae/0x700 [ 303.713354] __kernfs_new_node+0xef/0x680 [ 303.717519] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 303.722280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.722296] ? __kernfs_create_file+0x2a3/0x33b [ 303.722314] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 303.722333] ? find_held_lock+0x35/0x130 07:02:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x4b47, 0x0) [ 303.722348] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 303.722370] kernfs_new_node+0x99/0x130 [ 303.722389] kernfs_create_link+0xdd/0x250 [ 303.732580] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 303.732600] sysfs_create_link+0x65/0xc0 [ 303.732619] device_add+0x4a7/0x1760 [ 303.732642] ? get_device_parent.isra.0+0x570/0x570 [ 303.732659] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.732673] ? avc_has_extended_perms+0xa78/0x10f0 [ 303.732690] ? input_register_device+0x549/0xc30 [ 303.742193] input_register_device+0x6d2/0xc30 [ 303.742226] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 303.742245] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 303.742263] ? mark_held_locks+0x100/0x100 [ 303.751664] ? proc_cwd_link+0x1d0/0x1d0 [ 303.751689] ? __fget+0x340/0x540 [ 303.751719] uinput_ioctl+0x4a/0x60 [ 303.751731] ? uinput_compat_ioctl+0xb0/0xb0 [ 303.751746] do_vfs_ioctl+0xd5f/0x1380 [ 303.751761] ? selinux_file_ioctl+0x46f/0x5e0 [ 303.751772] ? selinux_file_ioctl+0x125/0x5e0 [ 303.751788] ? ioctl_preallocate+0x210/0x210 [ 303.761294] ? selinux_file_mprotect+0x620/0x620 [ 303.761320] ? iterate_fd+0x360/0x360 [ 303.761339] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 303.761355] ? fput+0x128/0x1a0 [ 303.761374] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 303.761387] ? security_file_ioctl+0x8d/0xc0 [ 303.761406] ksys_ioctl+0xab/0xd0 [ 303.769189] __x64_sys_ioctl+0x73/0xb0 [ 303.769209] do_syscall_64+0xfd/0x620 [ 303.769231] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 303.769242] RIP: 0033:0x459a29 [ 303.769258] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.769265] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 303.769287] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 303.812934] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 303.820008] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 303.820017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 303.820026] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 303.948448] FAULT_INJECTION: forcing a failure. [ 303.948448] name failslab, interval 1, probability 0, space 0, times 0 [ 303.968931] CPU: 1 PID: 11436 Comm: syz-executor.1 Not tainted 4.19.76 #0 [ 303.975887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.985238] Call Trace: [ 303.987840] dump_stack+0x172/0x1f0 [ 303.991482] should_fail.cold+0xa/0x1b [ 303.995387] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.000503] ? lock_downgrade+0x880/0x880 [ 304.004666] __should_failslab+0x121/0x190 [ 304.008903] should_failslab+0x9/0x14 [ 304.012690] kmem_cache_alloc+0x2ae/0x700 [ 304.016824] ? memcpy+0x46/0x50 [ 304.020100] ? kstrdup+0x5a/0x70 [ 304.023478] __kernfs_new_node+0xef/0x680 [ 304.027622] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 304.032367] ? debug_smp_processor_id+0x1c/0x20 [ 304.037023] ? tick_nohz_tick_stopped+0x1a/0x90 [ 304.041688] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.047232] ? __irq_work_queue_local+0xaf/0x170 [ 304.052033] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.057557] ? irq_work_queue+0x30/0x90 [ 304.061530] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.067061] ? wake_up_klogd+0x99/0xd0 [ 304.070933] ? vprintk_emit+0x264/0x690 [ 304.074896] kernfs_new_node+0x99/0x130 [ 304.078871] kernfs_create_dir_ns+0x52/0x160 [ 304.083281] sysfs_create_dir_ns+0x131/0x290 [ 304.087687] ? sysfs_create_mount_point+0xa0/0xa0 [ 304.092521] ? class_dir_child_ns_type+0xd/0x60 [ 304.097181] kobject_add_internal.cold+0xe5/0x5d1 [ 304.102027] kobject_add+0x150/0x1c0 [ 304.105748] ? kset_create_and_add+0x1a0/0x1a0 [ 304.110330] ? kasan_check_read+0x11/0x20 [ 304.114470] ? mutex_unlock+0xd/0x10 [ 304.118174] device_add+0x3cc/0x1760 [ 304.121897] ? get_device_parent.isra.0+0x570/0x570 [ 304.126910] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.132433] ? avc_has_extended_perms+0xa78/0x10f0 [ 304.137350] ? input_register_device+0x549/0xc30 [ 304.142106] input_register_device+0x6d2/0xc30 [ 304.146692] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 304.151957] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 304.157308] ? mark_held_locks+0x100/0x100 [ 304.161549] ? proc_cwd_link+0x1d0/0x1d0 [ 304.165624] ? __fget+0x340/0x540 [ 304.169080] uinput_ioctl+0x4a/0x60 [ 304.172698] ? uinput_compat_ioctl+0xb0/0xb0 [ 304.177090] do_vfs_ioctl+0xd5f/0x1380 [ 304.180970] ? selinux_file_ioctl+0x46f/0x5e0 [ 304.185468] ? selinux_file_ioctl+0x125/0x5e0 [ 304.189960] ? ioctl_preallocate+0x210/0x210 [ 304.194354] ? selinux_file_mprotect+0x620/0x620 [ 304.199109] ? iterate_fd+0x360/0x360 [ 304.202916] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.208451] ? fput+0x128/0x1a0 [ 304.211720] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.217243] ? security_file_ioctl+0x8d/0xc0 [ 304.221652] ksys_ioctl+0xab/0xd0 [ 304.225116] __x64_sys_ioctl+0x73/0xb0 [ 304.229002] do_syscall_64+0xfd/0x620 [ 304.232825] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 304.238000] RIP: 0033:0x459a29 [ 304.241190] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.260114] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.269568] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 304.276877] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 304.284142] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.291413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 304.298667] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 304.307555] kobject_add_internal failed for input395 (error: -12 parent: input) 07:02:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x4b49, 0x0) 07:02:18 executing program 4 (fault-call:5 fault-nth:6): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:18 executing program 1 (fault-call:5 fault-nth:4): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 304.380483] FAULT_INJECTION: forcing a failure. [ 304.380483] name failslab, interval 1, probability 0, space 0, times 0 [ 304.414665] CPU: 1 PID: 11443 Comm: syz-executor.4 Not tainted 4.19.76 #0 07:02:18 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x541b, 0x0) [ 304.421635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.421641] Call Trace: [ 304.421665] dump_stack+0x172/0x1f0 [ 304.421689] should_fail.cold+0xa/0x1b [ 304.421709] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.421724] ? lock_downgrade+0x880/0x880 [ 304.421753] __should_failslab+0x121/0x190 [ 304.421772] should_failslab+0x9/0x14 [ 304.421786] kmem_cache_alloc+0x2ae/0x700 [ 304.421810] __kernfs_new_node+0xef/0x680 [ 304.421829] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 304.421847] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.421862] ? __kernfs_create_file+0x2a3/0x33b [ 304.421879] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 304.421896] ? find_held_lock+0x35/0x130 [ 304.421913] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 304.421937] kernfs_new_node+0x99/0x130 [ 304.421958] kernfs_create_link+0xdd/0x250 [ 304.421978] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 304.421998] sysfs_create_link+0x65/0xc0 [ 304.422017] device_add+0x4a7/0x1760 [ 304.422040] ? get_device_parent.isra.0+0x570/0x570 [ 304.422056] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.422071] ? avc_has_extended_perms+0xa78/0x10f0 [ 304.422085] ? input_register_device+0x549/0xc30 [ 304.422102] input_register_device+0x6d2/0xc30 [ 304.422125] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 304.422144] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 304.422163] ? mark_held_locks+0x100/0x100 [ 304.422183] ? proc_cwd_link+0x1d0/0x1d0 [ 304.422207] ? __fget+0x340/0x540 [ 304.422234] uinput_ioctl+0x4a/0x60 [ 304.422249] ? uinput_compat_ioctl+0xb0/0xb0 [ 304.422267] do_vfs_ioctl+0xd5f/0x1380 [ 304.422283] ? selinux_file_ioctl+0x46f/0x5e0 [ 304.422297] ? selinux_file_ioctl+0x125/0x5e0 [ 304.422312] ? ioctl_preallocate+0x210/0x210 [ 304.422326] ? selinux_file_mprotect+0x620/0x620 [ 304.422348] ? iterate_fd+0x360/0x360 [ 304.422364] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.422378] ? fput+0x128/0x1a0 [ 304.422399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.422413] ? security_file_ioctl+0x8d/0xc0 [ 304.422430] ksys_ioctl+0xab/0xd0 07:02:19 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 304.422521] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 304.422536] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 07:02:19 executing program 4 (fault-call:5 fault-nth:7): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 304.422545] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 304.422553] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.422562] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 304.422570] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 304.569278] input: syz1 as /devices/virtual/input/input400 07:02:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5421, 0x0) [ 304.736477] input: syz1 as /devices/virtual/input/input401 [ 304.743448] FAULT_INJECTION: forcing a failure. [ 304.743448] name failslab, interval 1, probability 0, space 0, times 0 [ 304.776779] FAULT_INJECTION: forcing a failure. [ 304.776779] name failslab, interval 1, probability 0, space 0, times 0 [ 304.800474] CPU: 0 PID: 11458 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 304.807443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.816808] Call Trace: [ 304.819418] dump_stack+0x172/0x1f0 [ 304.823070] should_fail.cold+0xa/0x1b [ 304.826979] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 304.832090] ? lock_downgrade+0x880/0x880 [ 304.836258] __should_failslab+0x121/0x190 [ 304.840508] should_failslab+0x9/0x14 [ 304.844328] kmem_cache_alloc+0x2ae/0x700 [ 304.848484] ? memcpy+0x46/0x50 [ 304.851769] ? kstrdup+0x5a/0x70 [ 304.855146] __kernfs_new_node+0xef/0x680 [ 304.859303] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 304.864064] ? wait_for_completion+0x440/0x440 [ 304.868657] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 304.874113] ? find_held_lock+0x35/0x130 [ 304.878182] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 304.883646] kernfs_new_node+0x99/0x130 [ 304.887632] kernfs_create_link+0xdd/0x250 [ 304.891890] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 304.897176] sysfs_create_link+0x65/0xc0 [ 304.901246] device_add+0x7ce/0x1760 [ 304.904976] ? get_device_parent.isra.0+0x570/0x570 [ 304.909999] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 304.915540] ? avc_has_extended_perms+0xa78/0x10f0 [ 304.920581] ? input_register_device+0x549/0xc30 [ 304.925349] input_register_device+0x6d2/0xc30 [ 304.929950] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 304.935233] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 304.940609] ? mark_held_locks+0x100/0x100 [ 304.944845] ? proc_cwd_link+0x1d0/0x1d0 [ 304.948914] ? __fget+0x340/0x540 [ 304.952388] uinput_ioctl+0x4a/0x60 [ 304.956014] ? uinput_compat_ioctl+0xb0/0xb0 [ 304.960423] do_vfs_ioctl+0xd5f/0x1380 [ 304.964312] ? selinux_file_ioctl+0x46f/0x5e0 [ 304.968807] ? selinux_file_ioctl+0x125/0x5e0 [ 304.973324] ? ioctl_preallocate+0x210/0x210 [ 304.977748] ? selinux_file_mprotect+0x620/0x620 [ 304.982520] ? iterate_fd+0x360/0x360 [ 304.986327] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 304.991876] ? fput+0x128/0x1a0 [ 304.995174] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.000722] ? security_file_ioctl+0x8d/0xc0 [ 305.005139] ksys_ioctl+0xab/0xd0 [ 305.008601] __x64_sys_ioctl+0x73/0xb0 [ 305.012493] do_syscall_64+0xfd/0x620 [ 305.016305] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.021497] RIP: 0033:0x459a29 [ 305.024692] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.043592] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.051304] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 305.058570] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 305.065841] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.073109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 305.080378] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 305.087669] CPU: 1 PID: 11455 Comm: syz-executor.1 Not tainted 4.19.76 #0 [ 305.094617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.103970] Call Trace: [ 305.103992] dump_stack+0x172/0x1f0 [ 305.104015] should_fail.cold+0xa/0x1b [ 305.104032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.110220] ? lock_downgrade+0x880/0x880 [ 305.110247] __should_failslab+0x121/0x190 [ 305.110264] should_failslab+0x9/0x14 [ 305.110277] kmem_cache_alloc+0x2ae/0x700 [ 305.110290] ? kasan_check_write+0x14/0x20 [ 305.110303] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 305.110325] __kernfs_new_node+0xef/0x680 [ 305.110344] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 305.110358] ? __lock_acquire+0x6ee/0x49c0 [ 305.127683] ? kernfs_activate+0x192/0x1f0 [ 305.127703] ? kernfs_add_one+0x131/0x4d0 [ 305.127728] kernfs_new_node+0x99/0x130 [ 305.127746] __kernfs_create_file+0x51/0x33b [ 305.139905] sysfs_add_file_mode_ns+0x222/0x560 [ 305.139931] sysfs_create_file_ns+0x13a/0x1c0 [ 305.139950] ? sysfs_add_file_mode_ns+0x560/0x560 [ 305.139973] ? up_read+0x1a/0x110 [ 305.139995] device_create_file+0xfa/0x1e0 [ 305.140011] ? acpi_bind_one+0x830/0x830 [ 305.140029] device_add+0x411/0x1760 [ 305.149009] ? get_device_parent.isra.0+0x570/0x570 [ 305.149029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.149046] ? avc_has_extended_perms+0xa78/0x10f0 [ 305.192136] ? input_register_device+0x549/0xc30 [ 305.192154] input_register_device+0x6d2/0xc30 [ 305.192183] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 305.192201] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 305.192222] ? mark_held_locks+0x100/0x100 [ 305.192237] ? proc_cwd_link+0x1d0/0x1d0 [ 305.192258] ? __fget+0x340/0x540 [ 305.192281] uinput_ioctl+0x4a/0x60 [ 305.200553] ? uinput_compat_ioctl+0xb0/0xb0 [ 305.214779] do_vfs_ioctl+0xd5f/0x1380 [ 305.224436] ? selinux_file_ioctl+0x46f/0x5e0 [ 305.224452] ? selinux_file_ioctl+0x125/0x5e0 [ 305.247948] ? ioctl_preallocate+0x210/0x210 [ 305.247966] ? selinux_file_mprotect+0x620/0x620 [ 305.276655] ? iterate_fd+0x360/0x360 [ 305.276674] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.290848] ? fput+0x128/0x1a0 [ 305.294143] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:02:19 executing program 4 (fault-call:5 fault-nth:8): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 305.294159] ? security_file_ioctl+0x8d/0xc0 [ 305.294177] ksys_ioctl+0xab/0xd0 [ 305.308428] __x64_sys_ioctl+0x73/0xb0 [ 305.308448] do_syscall_64+0xfd/0x620 [ 305.316114] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.321405] RIP: 0033:0x459a29 [ 305.324605] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.343513] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:02:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5450, 0x0) 07:02:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 305.351232] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 305.351241] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 305.351249] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.351257] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 305.351264] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 07:02:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 305.433867] FAULT_INJECTION: forcing a failure. [ 305.433867] name failslab, interval 1, probability 0, space 0, times 0 [ 305.453974] CPU: 0 PID: 11466 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 305.460952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.470314] Call Trace: [ 305.472915] dump_stack+0x172/0x1f0 [ 305.476554] should_fail.cold+0xa/0x1b [ 305.480455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 305.485570] ? lock_downgrade+0x880/0x880 [ 305.489738] __should_failslab+0x121/0x190 [ 305.493983] should_failslab+0x9/0x14 [ 305.497797] kmem_cache_alloc+0x2ae/0x700 [ 305.501950] ? memcpy+0x46/0x50 [ 305.505240] ? kstrdup+0x5a/0x70 [ 305.508617] __kernfs_new_node+0xef/0x680 [ 305.512797] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 305.517560] ? wait_for_completion+0x440/0x440 [ 305.517579] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 305.517600] ? find_held_lock+0x35/0x130 [ 305.531686] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 305.537246] kernfs_new_node+0x99/0x130 [ 305.541246] kernfs_create_link+0xdd/0x250 [ 305.545499] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 305.550790] sysfs_create_link+0x65/0xc0 [ 305.554861] device_add+0x7ce/0x1760 [ 305.558588] ? get_device_parent.isra.0+0x570/0x570 [ 305.563618] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.569164] ? avc_has_extended_perms+0xa78/0x10f0 [ 305.574103] ? input_register_device+0x549/0xc30 [ 305.578870] input_register_device+0x6d2/0xc30 [ 305.583492] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 305.588787] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 305.594163] ? mark_held_locks+0x100/0x100 [ 305.594179] ? proc_cwd_link+0x1d0/0x1d0 [ 305.594206] ? __fget+0x340/0x540 [ 305.594231] uinput_ioctl+0x4a/0x60 [ 305.605935] ? uinput_compat_ioctl+0xb0/0xb0 [ 305.605952] do_vfs_ioctl+0xd5f/0x1380 [ 305.605968] ? selinux_file_ioctl+0x46f/0x5e0 [ 305.605981] ? selinux_file_ioctl+0x125/0x5e0 [ 305.605994] ? ioctl_preallocate+0x210/0x210 [ 305.606009] ? selinux_file_mprotect+0x620/0x620 [ 305.622375] ? iterate_fd+0x360/0x360 [ 305.622394] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 305.622409] ? fput+0x128/0x1a0 [ 305.622430] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 305.631301] ? security_file_ioctl+0x8d/0xc0 [ 305.645386] ksys_ioctl+0xab/0xd0 [ 305.658583] __x64_sys_ioctl+0x73/0xb0 [ 305.658603] do_syscall_64+0xfd/0x620 [ 305.658624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 305.658638] RIP: 0033:0x459a29 [ 305.678116] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.697035] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.704780] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 305.712054] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 305.719333] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.726620] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 07:02:19 executing program 1 (fault-call:5 fault-nth:5): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5451, 0x0) 07:02:19 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 305.989319] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 305.989342] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 306.002519] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 306.002528] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.002537] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 07:02:20 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5460, 0x0) 07:02:20 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.568319] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 306.576041] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 306.583323] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 07:02:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5525, 0x0) [ 306.590602] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.597874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 306.605152] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 306.623012] CPU: 0 PID: 11505 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 306.629962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.629968] Call Trace: [ 306.629989] dump_stack+0x172/0x1f0 [ 306.630011] should_fail.cold+0xa/0x1b [ 306.630028] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 306.630043] ? lock_downgrade+0x880/0x880 [ 306.630068] __should_failslab+0x121/0x190 [ 306.654607] should_failslab+0x9/0x14 [ 306.654622] kmem_cache_alloc+0x2ae/0x700 [ 306.654642] ? __lock_is_held+0xb6/0x140 [ 306.663022] __kernfs_new_node+0xef/0x680 [ 306.663036] ? kernfs_activate+0x34/0x1f0 [ 306.663054] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 306.663068] ? kernfs_activate+0x34/0x1f0 [ 306.663084] ? kernfs_activate+0x192/0x1f0 [ 306.671004] ? find_held_lock+0x35/0x130 [ 306.671019] ? kernfs_activate+0x192/0x1f0 [ 306.671046] kernfs_new_node+0x99/0x130 [ 306.671066] __kernfs_create_file+0x51/0x33b [ 306.671084] sysfs_add_file_mode_ns+0x222/0x560 [ 306.679268] internal_create_group+0x383/0xc30 [ 306.679293] ? remove_files.isra.0+0x190/0x190 [ 306.679308] ? kernfs_put+0x3c2/0x5d0 [ 306.688208] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.688225] ? kernfs_create_link+0x1d2/0x250 07:02:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x40045564, 0x0) [ 306.688248] sysfs_create_groups+0x9b/0x141 [ 306.688268] device_add+0x8d8/0x1760 [ 306.696633] ? get_device_parent.isra.0+0x570/0x570 [ 306.696651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.696668] ? input_register_device+0x549/0xc30 [ 306.704933] input_register_device+0x6d2/0xc30 [ 306.704958] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 306.704978] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 306.727160] ? mark_held_locks+0x100/0x100 [ 306.727176] ? proc_cwd_link+0x1d0/0x1d0 [ 306.727200] ? __fget+0x340/0x540 [ 306.727228] uinput_ioctl+0x4a/0x60 [ 306.741032] ? uinput_compat_ioctl+0xb0/0xb0 [ 306.741051] do_vfs_ioctl+0xd5f/0x1380 [ 306.741068] ? selinux_file_ioctl+0x46f/0x5e0 [ 306.741081] ? selinux_file_ioctl+0x125/0x5e0 [ 306.741096] ? ioctl_preallocate+0x210/0x210 [ 306.741107] ? selinux_file_mprotect+0x620/0x620 [ 306.741128] ? iterate_fd+0x360/0x360 [ 306.749146] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 306.749164] ? fput+0x128/0x1a0 [ 306.749186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 306.749199] ? security_file_ioctl+0x8d/0xc0 [ 306.749216] ksys_ioctl+0xab/0xd0 [ 306.749233] __x64_sys_ioctl+0x73/0xb0 [ 306.759782] do_syscall_64+0xfd/0x620 [ 306.759804] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 306.759816] RIP: 0033:0x459a29 [ 306.759831] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 306.759838] RSP: 002b:00007f450652fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:02:21 executing program 1 (fault-call:5 fault-nth:7): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 306.759852] RAX: ffffffffffffffda RBX: 00007f450652fc90 RCX: 0000000000459a29 [ 306.759864] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 306.769162] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.769170] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f45065306d4 [ 306.769178] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 306.915610] input: syz1 as /devices/virtual/input/input425 07:02:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x40045565, 0x0) [ 306.972707] FAULT_INJECTION: forcing a failure. [ 306.972707] name failslab, interval 1, probability 0, space 0, times 0 07:02:21 executing program 4 (fault-call:5 fault-nth:10): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 307.016964] CPU: 1 PID: 11519 Comm: syz-executor.1 Not tainted 4.19.76 #0 [ 307.023973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.033360] Call Trace: [ 307.034267] kauditd_printk_skb: 537 callbacks suppressed [ 307.034279] audit: type=1400 audit(1570086141.436:14660): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.036041] dump_stack+0x172/0x1f0 07:02:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 307.052728] audit: type=1400 audit(1570086141.436:14661): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.063095] should_fail.cold+0xa/0x1b [ 307.063113] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.063129] ? lock_downgrade+0x880/0x880 [ 307.063151] __should_failslab+0x121/0x190 [ 307.063169] should_failslab+0x9/0x14 [ 307.063181] kmem_cache_alloc+0x2ae/0x700 [ 307.063193] ? memcpy+0x46/0x50 [ 307.063211] ? kstrdup+0x5a/0x70 [ 307.112768] audit: type=1400 audit(1570086141.486:14662): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.113748] __kernfs_new_node+0xef/0x680 [ 307.117142] audit: type=1400 audit(1570086141.486:14663): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.120466] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.120482] ? wait_for_completion+0x440/0x440 [ 307.120498] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 307.120515] ? find_held_lock+0x35/0x130 [ 307.120530] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 307.120556] kernfs_new_node+0x99/0x130 [ 307.146299] kernfs_create_link+0xdd/0x250 [ 307.146319] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 307.172686] sysfs_create_link+0x65/0xc0 [ 307.172706] device_add+0x7ce/0x1760 [ 307.196303] ? get_device_parent.isra.0+0x570/0x570 [ 307.205800] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.205817] ? avc_has_extended_perms+0xa78/0x10f0 [ 307.205834] ? input_register_device+0x549/0xc30 [ 307.229084] input_register_device+0x6d2/0xc30 [ 307.229107] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 307.229126] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 307.229173] ? mark_held_locks+0x100/0x100 [ 307.229187] ? proc_cwd_link+0x1d0/0x1d0 [ 307.229210] ? __fget+0x340/0x540 [ 307.253563] FAULT_INJECTION: forcing a failure. [ 307.253563] name failslab, interval 1, probability 0, space 0, times 0 [ 307.257484] uinput_ioctl+0x4a/0x60 [ 307.257499] ? uinput_compat_ioctl+0xb0/0xb0 [ 307.257520] do_vfs_ioctl+0xd5f/0x1380 [ 307.272189] ? selinux_file_ioctl+0x46f/0x5e0 [ 307.272202] ? selinux_file_ioctl+0x125/0x5e0 [ 307.272219] ? ioctl_preallocate+0x210/0x210 [ 307.272232] ? selinux_file_mprotect+0x620/0x620 [ 307.272252] ? iterate_fd+0x360/0x360 [ 307.272269] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.272283] ? fput+0x128/0x1a0 [ 307.272302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.297594] ? security_file_ioctl+0x8d/0xc0 [ 307.297612] ksys_ioctl+0xab/0xd0 [ 307.297629] __x64_sys_ioctl+0x73/0xb0 [ 307.332453] do_syscall_64+0xfd/0x620 [ 307.336272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.341477] RIP: 0033:0x459a29 [ 307.344686] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 307.363610] RSP: 002b:00007fdf5cedbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 307.371363] RAX: ffffffffffffffda RBX: 00007fdf5cedbc90 RCX: 0000000000459a29 [ 307.378649] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000003 [ 307.385934] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.385943] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf5cedc6d4 [ 307.385951] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000004 [ 307.390996] CPU: 1 PID: 11523 Comm: syz-executor.4 Not tainted 4.19.76 #0 [ 307.394913] audit: type=1400 audit(1570086141.806:14664): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.400527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.400533] Call Trace: [ 307.400554] dump_stack+0x172/0x1f0 [ 307.400574] should_fail.cold+0xa/0x1b [ 307.400591] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 307.400603] ? lock_downgrade+0x880/0x880 [ 307.400626] __should_failslab+0x121/0x190 [ 307.430653] audit: type=1400 audit(1570086141.836:14665): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.436584] should_failslab+0x9/0x14 [ 307.491558] kmem_cache_alloc+0x2ae/0x700 [ 307.491574] ? lock_downgrade+0x880/0x880 [ 307.491585] ? kasan_check_read+0x11/0x20 [ 307.491604] __kernfs_new_node+0xef/0x680 [ 307.491620] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 307.491635] ? wait_for_completion+0x440/0x440 [ 307.491656] ? mutex_unlock+0xd/0x10 [ 307.491671] ? kernfs_activate+0x192/0x1f0 [ 307.495552] audit: type=1400 audit(1570086141.836:14666): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.499756] kernfs_new_node+0x99/0x130 [ 307.499772] __kernfs_create_file+0x51/0x33b [ 307.499788] sysfs_add_file_mode_ns+0x222/0x560 [ 307.499811] internal_create_group+0x383/0xc30 [ 307.499835] ? remove_files.isra.0+0x190/0x190 [ 307.499847] ? kernfs_put+0x3c2/0x5d0 [ 307.499866] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.536239] audit: type=1400 audit(1570086141.936:14667): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 307.551442] ? kernfs_create_link+0x1d2/0x250 [ 307.551465] sysfs_create_groups+0x9b/0x141 [ 307.551485] device_add+0x8d8/0x1760 [ 307.551504] ? get_device_parent.isra.0+0x570/0x570 [ 307.551521] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.551537] ? avc_has_extended_perms+0xa78/0x10f0 [ 307.551551] ? input_register_device+0x549/0xc30 [ 307.551568] input_register_device+0x6d2/0xc30 [ 307.551587] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 307.551606] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 307.569333] ? mark_held_locks+0x100/0x100 [ 307.569349] ? proc_cwd_link+0x1d0/0x1d0 [ 307.569369] ? __fget+0x340/0x540 [ 307.569396] uinput_ioctl+0x4a/0x60 [ 307.569407] ? uinput_compat_ioctl+0xb0/0xb0 [ 307.569421] do_vfs_ioctl+0xd5f/0x1380 [ 307.569438] ? selinux_file_ioctl+0x46f/0x5e0 [ 307.605038] ? selinux_file_ioctl+0x125/0x5e0 [ 307.605056] ? ioctl_preallocate+0x210/0x210 [ 307.605068] ? selinux_file_mprotect+0x620/0x620 [ 307.605089] ? iterate_fd+0x360/0x360 [ 307.605104] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 307.605119] ? fput+0x128/0x1a0 [ 307.605141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 307.605154] ? security_file_ioctl+0x8d/0xc0 [ 307.605171] ksys_ioctl+0xab/0xd0 [ 307.605190] __x64_sys_ioctl+0x73/0xb0 [ 307.605208] do_syscall_64+0xfd/0x620 [ 307.605227] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 307.605237] RIP: 0033:0x459a29 [ 307.605252] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x40045566, 0x0) 07:02:22 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} audit_backlog_limit=64 [ 312.485686] audit: audit_backlog=65 > audit_backlog_limit=64 07:02:26 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x553e, 0x0) [ 312.496718] audit: type=1400 audit(1570086146.686:15311): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 312.496769] audit: audit_lost=31 audit_rate_limit=0 audit_backlog_limit=64 07:02:26 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x553e, 0x0) 07:02:26 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0045878, 0x0) [ 312.528914] audit: type=1400 audit(1570086146.686:15312): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 312.552008] audit: audit_lost=32 audit_rate_limit=0 audit_backlog_limit=64 07:02:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xff02, 0x0) 07:02:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:27 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xff02, 0x0) 07:02:27 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0045878, 0x0) [ 312.721204] input: syz1 as /devices/virtual/input/input561 07:02:27 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x40045564, 0x0) [ 312.794579] input: syz1 as /devices/virtual/input/input564 07:02:27 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) [ 315.279380] input: syz1 as /devices/virtual/input/input626 [ 315.307894] input: syz1 as /devices/virtual/input/input624 07:02:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x4004556e, 0x0) 07:02:29 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x4004556e, 0x0) [ 315.340752] input: syz1 as /devices/virtual/input/input630 07:02:29 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x40049409, 0x0) 07:02:29 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$KVM_DEASSIGN_DEV_IRQ(r1, 0x4040ae75, &(0x7f00000000c0)={0x1, 0xa704, 0x69f, 0x100}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) r2 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000840), 0x4) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000000)='trusted.overlay.origin\x00', &(0x7f0000000040)='y\x00', 0x2, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) fcntl$addseals(0xffffffffffffffff, 0x409, 0x1) 07:02:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x80086601, 0x0) 07:02:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:31 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x406855c9, 0x0) 07:02:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 317.382404] kauditd_printk_skb: 1204 callbacks suppressed [ 317.382418] audit: type=1400 audit(1570086151.786:16515): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 317.388042] audit: type=1400 audit(1570086151.786:16516): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 07:02:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x80087601, 0x0) [ 317.397488] audit: type=1400 audit(1570086151.786:16517): avc: denied { map } for pid=12022 comm="syz-executor.2" path="/root/syzkaller-testdir126660974/syzkaller.6w0Rvk/187/mem" dev="sda1" ino=17066 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=0 [ 317.496743] input: syz1 as /devices/virtual/input/input681 [ 317.530509] input: syz1 as /devices/virtual/input/input682 07:02:31 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0045878, 0x0) [ 317.542714] audit: type=1400 audit(1570086151.866:16518): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 317.565241] input: syz1 as /devices/virtual/input/input679 07:02:32 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} audit_backlog_limit=64 [ 317.667064] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.675173] audit: audit_backlog=65 > audit_backlog_limit=64 [ 317.675568] audit: type=1400 audit(1570086151.896:16520): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 07:02:32 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x8004552d, 0x0) [ 317.692504] audit: audit_lost=33 audit_rate_limit=0 audit_backlog_limit=64 07:02:32 executing program 3 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:32 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.054862] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.062597] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 318.069882] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 318.077161] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 318.084476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 318.091743] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:32 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x42000, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{}, "c4903b50592b5f1d", "ccc46199358700a1aa5803a3f51dcced", "8a6972da", "2470894fc97f3691"}, 0x28) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:32 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x80086601, 0x0) 07:02:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc00c55ca, 0x0) 07:02:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:32 executing program 3 (fault-call:7 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0189436, 0x0) 07:02:32 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x80087601, 0x0) [ 318.344442] input: syz1 as /devices/virtual/input/input700 [ 318.352771] FAULT_INJECTION: forcing a failure. [ 318.352771] name failslab, interval 1, probability 0, space 0, times 0 [ 318.390877] CPU: 1 PID: 12070 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 318.397847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.397853] Call Trace: [ 318.397878] dump_stack+0x172/0x1f0 [ 318.397900] should_fail.cold+0xa/0x1b [ 318.397921] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 318.397937] ? lock_downgrade+0x880/0x880 [ 318.397965] __should_failslab+0x121/0x190 [ 318.397986] should_failslab+0x9/0x14 [ 318.398003] kmem_cache_alloc_trace+0x2cc/0x760 [ 318.398024] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 318.398040] ? refcount_inc_checked+0x2b/0x70 [ 318.398065] device_add+0xe5e/0x1760 [ 318.439424] ? get_device_parent.isra.0+0x570/0x570 [ 318.439445] ? retint_kernel+0x2d/0x2d [ 318.439459] ? input_register_device+0x549/0xc30 [ 318.439475] input_register_device+0x6d2/0xc30 [ 318.439498] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 318.439515] ? uinput_request_submit.part.0+0x2d0/0x2d0 07:02:32 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc020660b, 0x0) [ 318.439535] ? mark_held_locks+0x100/0x100 [ 318.439550] ? lock_downgrade+0x880/0x880 [ 318.439565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.439587] ? __fget+0x340/0x540 [ 318.439614] uinput_ioctl+0x4a/0x60 [ 318.439628] ? uinput_compat_ioctl+0xb0/0xb0 [ 318.439645] do_vfs_ioctl+0xd5f/0x1380 [ 318.439660] ? selinux_file_ioctl+0x46f/0x5e0 [ 318.439674] ? selinux_file_ioctl+0x125/0x5e0 [ 318.439691] ? ioctl_preallocate+0x210/0x210 [ 318.439705] ? selinux_file_mprotect+0x620/0x620 [ 318.439733] ? iterate_fd+0x360/0x360 [ 318.439751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 318.439772] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 318.439784] ? security_file_ioctl+0x8d/0xc0 [ 318.439801] ksys_ioctl+0xab/0xd0 [ 318.439819] __x64_sys_ioctl+0x73/0xb0 [ 318.439837] do_syscall_64+0xfd/0x620 [ 318.439856] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 318.439868] RIP: 0033:0x459a29 07:02:33 executing program 3 (fault-call:7 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 318.439882] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.439890] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 318.439906] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 318.439915] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 318.439923] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 318.439932] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 318.439941] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 318.469919] input: syz1 as /devices/virtual/input/input699 07:02:33 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:33 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0045878, 0x0) 07:02:33 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000001c0)=0xe8) r3 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0x3e6) setresgid(r4, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x20a480, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x5000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x5}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x39d}}, {@default_permissions='default_permissions'}], [{@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x80d5}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/uinput\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@appraise='appraise'}, {@smackfstransmute={'smackfstransmute', 0x3d, '/dev/uinput\x00'}}, {@dont_hash='dont_hash'}]}}) [ 319.059324] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.067021] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 319.074279] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 319.081542] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 319.088814] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 319.096087] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 319.107410] kobject_add_internal failed for input707 (error: -12 parent: input) 07:02:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:33 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.600527] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 319.608225] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 319.615480] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 319.622735] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 319.629987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 07:02:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc0189436, 0x0) [ 319.637241] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 319.648009] kobject_add_internal failed for input716 (error: -12 parent: input) 07:02:34 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x5]}, 0x45c) flock(0xffffffffffffffff, 0x9) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc020660b, 0x0) 07:02:34 executing program 3 (fault-call:7 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 319.751891] input: syz1 as /devices/virtual/input/input723 [ 319.791210] input: syz1 as /devices/virtual/input/input724 [ 319.837406] FAULT_INJECTION: forcing a failure. [ 319.837406] name failslab, interval 1, probability 0, space 0, times 0 [ 319.859861] CPU: 1 PID: 12134 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 319.866840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.876213] Call Trace: [ 319.878820] dump_stack+0x172/0x1f0 [ 319.882481] should_fail.cold+0xa/0x1b 07:02:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0xc06855c8, 0x0) 07:02:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) [ 319.886394] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 319.891515] ? lock_downgrade+0x880/0x880 [ 319.895695] __should_failslab+0x121/0x190 [ 319.899951] should_failslab+0x9/0x14 [ 319.903774] kmem_cache_alloc+0x2ae/0x700 [ 319.907948] ? kasan_check_write+0x14/0x20 [ 319.912201] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 319.917075] __kernfs_new_node+0xef/0x680 [ 319.921247] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 319.926009] ? __lock_acquire+0x6ee/0x49c0 [ 319.926028] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.926044] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 319.926059] ? lockdep_hardirqs_on+0x415/0x5d0 [ 319.926075] ? retint_kernel+0x2d/0x2d [ 319.926089] ? trace_hardirqs_on_caller+0x6a/0x220 [ 319.926111] kernfs_new_node+0x99/0x130 [ 319.935086] __kernfs_create_file+0x51/0x33b [ 319.935108] sysfs_add_file_mode_ns+0x222/0x560 [ 319.935134] sysfs_create_file_ns+0x13a/0x1c0 [ 319.935152] ? sysfs_add_file_mode_ns+0x560/0x560 [ 319.935174] ? up_read+0x1a/0x110 [ 319.945023] device_create_file+0xfa/0x1e0 [ 319.945042] ? acpi_bind_one+0x830/0x830 [ 319.945059] device_add+0x411/0x1760 [ 319.945083] ? get_device_parent.isra.0+0x570/0x570 [ 319.945102] ? retint_kernel+0x2d/0x2d [ 320.000567] ? input_register_device+0x549/0xc30 [ 320.005341] input_register_device+0x6d2/0xc30 [ 320.009928] ? uinput_ioctl_handler.isra.0+0x107/0x1c50 [ 320.015307] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 320.015329] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 320.015355] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.015367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.015387] ? __fget+0x340/0x540 [ 320.026014] uinput_ioctl+0x4a/0x60 [ 320.026030] ? uinput_compat_ioctl+0xb0/0xb0 [ 320.026047] do_vfs_ioctl+0xd5f/0x1380 [ 320.026063] ? selinux_file_ioctl+0x46f/0x5e0 [ 320.026078] ? selinux_file_ioctl+0x125/0x5e0 [ 320.035570] ? ioctl_preallocate+0x210/0x210 [ 320.035587] ? selinux_file_mprotect+0x620/0x620 [ 320.035612] ? iterate_fd+0x360/0x360 [ 320.035629] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 320.035645] ? fput+0x128/0x1a0 [ 320.081756] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.087295] ? security_file_ioctl+0x8d/0xc0 [ 320.091726] ksys_ioctl+0xab/0xd0 [ 320.095184] __x64_sys_ioctl+0x73/0xb0 [ 320.099071] do_syscall_64+0xfd/0x620 [ 320.102880] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 320.108110] RIP: 0033:0x459a29 [ 320.111302] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.130194] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.137896] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 320.145164] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 320.152436] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 320.159699] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 320.166962] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:34 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}, 0x45c) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1a9142, 0x0) sendto$inet6(r1, &(0x7f00000000c0)="4479ff6c84a36c295b55a5aae7ff8595935eb992d655a5dd8dac04f78677552f0eb196e1bd692a0acdc0f88b76f968b038f40375ded1b85461a5d5a065ef0184d9c0e013f7077e252c12a4099d01f6b61836e5a65085f07a7924f3313000fda76462c9610a41f979b4f9c2555109f35b9a1df3c6d59d83970877969baef62c9778aac432ebecbd39b320e78be97837e3578e63d619cffcdae9d1", 0x9a, 0x20000855, 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) 07:02:34 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x100400, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000180)={&(0x7f0000000140)=[0x8, 0x4f, 0x100, 0x8000, 0xfff, 0x7f, 0x5], 0x7, 0x2f, 0x89, 0x5, 0x52be, 0x1, {0x0, 0x0, 0xe42, 0xf9, 0x800, 0x7, 0x2, 0x81, 0x20, 0x401, 0x2, 0x2, 0x1, 0x6b, "cf461470c54430a7f4027c5b34394dc29cc40faa076212e599f30ace2201c6a3"}}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) getsockopt$inet_mreq(r2, 0x0, 0x24, &(0x7f0000000040)={@broadcast, @multicast1}, &(0x7f00000000c0)=0x8) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:34 executing program 3 (fault-call:7 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 320.369390] input: syz1 as /devices/virtual/input/input730 [ 320.391989] FAULT_INJECTION: forcing a failure. [ 320.391989] name failslab, interval 1, probability 0, space 0, times 0 [ 320.417270] input: syz1 as /devices/virtual/input/input733 [ 320.424870] CPU: 0 PID: 12147 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 320.431821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.441183] Call Trace: [ 320.443787] dump_stack+0x172/0x1f0 [ 320.447426] should_fail.cold+0xa/0x1b [ 320.451311] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.456406] ? lock_downgrade+0x880/0x880 [ 320.460606] __should_failslab+0x121/0x190 [ 320.464842] should_failslab+0x9/0x14 [ 320.468651] kmem_cache_alloc+0x2ae/0x700 [ 320.472803] __kernfs_new_node+0xef/0x680 [ 320.476992] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 320.481781] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 320.487318] ? __kernfs_create_file+0x2a3/0x33b [ 320.492005] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 320.497459] ? find_held_lock+0x35/0x130 [ 320.501519] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 320.506973] kernfs_new_node+0x99/0x130 [ 320.510941] kernfs_create_link+0xdd/0x250 [ 320.515181] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 320.520556] sysfs_create_link+0x65/0xc0 [ 320.524609] device_add+0x4a7/0x1760 [ 320.528330] ? get_device_parent.isra.0+0x570/0x570 [ 320.533348] ? retint_kernel+0x2d/0x2d [ 320.537235] ? input_register_device+0x549/0xc30 [ 320.541998] input_register_device+0x6d2/0xc30 [ 320.546572] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 320.551849] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 320.557218] ? mark_held_locks+0x100/0x100 [ 320.561489] ? proc_cwd_link+0x1d0/0x1d0 [ 320.565545] ? __fget+0x340/0x540 07:02:35 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.651274] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 320.658973] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 07:02:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) [ 320.666231] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 320.673487] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 320.680742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 320.688033] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:35 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:35 executing program 3 (fault-call:7 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:35 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0xffffffff000, 0xffffffff000}) [ 320.809433] input: syz1 as /devices/virtual/input/input736 07:02:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0xfffffffe, 0x80000001], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000040)=ANY=[@ANYBLOB="100000001702e62274ea002e2f000000"], 0x10) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 320.896836] FAULT_INJECTION: forcing a failure. [ 320.896836] name failslab, interval 1, probability 0, space 0, times 0 [ 320.912715] CPU: 0 PID: 12163 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 320.919672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.929032] Call Trace: [ 320.929054] dump_stack+0x172/0x1f0 [ 320.929077] should_fail.cold+0xa/0x1b [ 320.929103] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 320.929116] ? lock_downgrade+0x880/0x880 [ 320.929143] __should_failslab+0x121/0x190 [ 320.929160] should_failslab+0x9/0x14 [ 320.939240] __kmalloc_track_caller+0x2de/0x750 [ 320.939259] ? __lock_acquire+0x6ee/0x49c0 [ 320.939277] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 320.939292] ? kstrdup_const+0x66/0x80 [ 320.939308] kstrdup+0x3a/0x70 [ 320.939322] kstrdup_const+0x66/0x80 [ 320.939338] __kernfs_new_node+0xb0/0x680 [ 320.948573] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 320.948595] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 320.948613] ? find_held_lock+0x35/0x130 [ 320.948631] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 320.948655] kernfs_new_node+0x99/0x130 [ 320.985199] kernfs_create_link+0xdd/0x250 [ 320.985220] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 320.985239] sysfs_create_link+0x65/0xc0 [ 320.985257] device_add+0x7ce/0x1760 [ 320.985278] ? get_device_parent.isra.0+0x570/0x570 [ 320.995475] input_register_device+0x6d2/0xc30 [ 320.995501] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 320.995520] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 320.995543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.005025] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.005042] ? lockdep_hardirqs_on+0x415/0x5d0 [ 321.005064] ? __fget+0x340/0x540 [ 321.005101] uinput_ioctl+0x4a/0x60 [ 321.013277] ? uinput_compat_ioctl+0xb0/0xb0 [ 321.013295] do_vfs_ioctl+0xd5f/0x1380 [ 321.013310] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.013324] ? lockdep_hardirqs_on+0x415/0x5d0 [ 321.013340] ? ioctl_preallocate+0x210/0x210 [ 321.013359] ? trace_hardirqs_on_thunk+0x1a/0x1c 07:02:35 executing program 5: clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000800)='./file0\x00', 0xa400295c) chdir(&(0x7f0000000000)='./file0\x00') symlink(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000140)='./file0\x00') 07:02:35 executing program 5: io_setup(0xa, &(0x7f0000000000)=0x0) r1 = socket$kcm(0x29, 0x2, 0x0) io_submit(r0, 0x1, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r1, &(0x7f00000002c0)="ad3b40ab7bbcfccc94d39ea1ccd9a6bd8a06e534421a538ba60b6fcee8d041399610645c8687eb005e913d949c551593b8b7d96675e622b653dc29fd3e657272a11e7d5a23048808dbdc660c04e1f0de6c4995b218dd2c529796acd6d2ea9d", 0xfffffd5e}]) [ 321.022676] ? retint_kernel+0x2d/0x2d [ 321.022708] ksys_ioctl+0xab/0xd0 [ 321.022725] __x64_sys_ioctl+0x73/0xb0 [ 321.031430] ? do_syscall_64+0x5b/0x620 [ 321.031448] do_syscall_64+0xfd/0x620 [ 321.031469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.031481] RIP: 0033:0x459a29 [ 321.031495] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.031502] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.031522] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 321.041345] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 321.041353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 321.041362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 321.041371] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:35 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:35 executing program 1: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x10000000001c) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) waitid(0x0, r0, &(0x7f0000000000), 0x1, &(0x7f00000000c0)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x5) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r1, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) 07:02:35 executing program 3 (fault-call:7 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 321.258813] input: syz1 as /devices/virtual/input/input742 [ 321.309485] input: syz1 as /devices/virtual/input/input743 [ 321.327741] input: syz1 as /devices/virtual/input/input744 [ 321.360600] FAULT_INJECTION: forcing a failure. [ 321.360600] name failslab, interval 1, probability 0, space 0, times 0 [ 321.372562] CPU: 1 PID: 12185 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 321.379507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.388879] Call Trace: [ 321.391486] dump_stack+0x172/0x1f0 [ 321.395136] should_fail.cold+0xa/0x1b [ 321.399032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.404129] ? lock_downgrade+0x880/0x880 [ 321.408349] __should_failslab+0x121/0x190 [ 321.412589] should_failslab+0x9/0x14 [ 321.416389] __kmalloc_track_caller+0x2de/0x750 [ 321.421060] ? retint_kernel+0x2d/0x2d [ 321.424957] ? kstrdup_const+0x66/0x80 [ 321.428843] kstrdup+0x3a/0x70 [ 321.432034] kstrdup_const+0x66/0x80 [ 321.435746] __kernfs_new_node+0xb0/0x680 [ 321.439895] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 321.444651] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 321.450108] ? find_held_lock+0x35/0x130 [ 321.454169] ? sysfs_do_create_link_sd.isra.0+0x82/0x130 [ 321.459625] kernfs_new_node+0x99/0x130 [ 321.463597] kernfs_create_link+0xdd/0x250 [ 321.467837] sysfs_do_create_link_sd.isra.0+0x90/0x130 [ 321.473113] sysfs_create_link+0x65/0xc0 [ 321.477174] device_add+0x7ce/0x1760 [ 321.480900] ? get_device_parent.isra.0+0x570/0x570 [ 321.485916] ? input_register_device+0x6c3/0xc30 [ 321.490673] input_register_device+0x6d2/0xc30 [ 321.495259] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 321.500540] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 321.505908] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.510828] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.515595] ? lockdep_hardirqs_on+0x415/0x5d0 [ 321.520181] ? retint_kernel+0x2d/0x2d [ 321.524078] ? trace_hardirqs_on_caller+0x6a/0x220 [ 321.529021] uinput_ioctl+0x4a/0x60 [ 321.532656] ? uinput_compat_ioctl+0xb0/0xb0 [ 321.537074] do_vfs_ioctl+0xd5f/0x1380 [ 321.540959] ? selinux_file_ioctl+0x46f/0x5e0 [ 321.545452] ? selinux_file_ioctl+0x125/0x5e0 [ 321.549956] ? ioctl_preallocate+0x210/0x210 [ 321.554404] ? selinux_file_mprotect+0x620/0x620 [ 321.559253] ? iterate_fd+0x360/0x360 [ 321.563059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 321.568584] ? security_file_ioctl+0x8d/0xc0 [ 321.572983] ksys_ioctl+0xab/0xd0 [ 321.576427] __x64_sys_ioctl+0x73/0xb0 [ 321.580314] ? do_syscall_64+0xe2/0x620 [ 321.584286] do_syscall_64+0xfd/0x620 [ 321.588077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 321.593270] RIP: 0033:0x459a29 07:02:36 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.615342] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 321.623043] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 321.630308] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 321.637575] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 321.644832] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 321.652101] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:36 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10000000001c) ptrace$setregs(0xffffffffffffffff, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) ptrace$setregs(0xf, r1, 0x9, &(0x7f00000000c0)="20b143521b3e1eeccc8b179d325ad67fc258051af8fada8ec7f8829dd226319a4620bbca8782ba98e991d40490709fc911b7dde4b85d6bed8e17d6878211b5245dd3b61f371b9394832c90ebbaa54012bd6bc9d13863097ac29f98b61c8a358b66f5e7ca8d96a928103e54bef449db7f387e0f9130327b74414515be955cfec67587617c0389a97f0c3058786398ff434b095ffa5353c1b3192332c5ce321cd1681898c3") 07:02:36 executing program 3 (fault-call:7 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:36 executing program 5: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) stat(0x0, &(0x7f0000000600)) socket$inet6(0xa, 0x0, 0x10000) r0 = getpid() syz_open_procfs(r0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYRES32=0x0], 0x3}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) getgid() setregid(0x0, 0x0) stat(&(0x7f0000000780)='./file0\x00', 0x0) setregid(0x0, 0x0) r4 = getgid() setregid(0x0, r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00005befdc)) r6 = syz_open_pts(r5, 0x1) fcntl$setstatus(r6, 0x4, 0x102800) write(r6, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000080)=0x3) r7 = socket$key(0xf, 0x3, 0x2) dup3(r7, r6, 0x0) dup3(r6, r5, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r8 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(r8, 0x4, 0x0) write(r8, &(0x7f0000000000)="d5", 0xfffffedf) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)) r9 = socket$key(0xf, 0x3, 0x2) dup3(r9, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x0) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r11, 0x40045431, &(0x7f00005befdc)) write(0xffffffffffffffff, 0x0, 0x0) r12 = socket$key(0xf, 0x3, 0x2) dup3(r12, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, r11, 0x0) r13 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r14 = syz_open_pts(r13, 0x1) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write(r14, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000080)=0x3) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r15 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r16 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x41000) ioctl$TIOCSETD(r16, 0x5423, 0x0) dup3(r16, r15, 0x0) [ 321.730277] input: syz1 as /devices/virtual/input/input747 [ 321.744869] input: syz1 as /devices/virtual/input/input746 07:02:36 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$int_out(r0, 0x4, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) prctl$PR_SET_FP_MODE(0x2d, 0x1) 07:02:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) accept4$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e, 0x800) [ 321.884801] FAULT_INJECTION: forcing a failure. [ 321.884801] name failslab, interval 1, probability 0, space 0, times 0 [ 321.898845] input: syz1 as /devices/virtual/input/input749 [ 321.943311] CPU: 0 PID: 12200 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 321.950285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.959651] Call Trace: [ 321.962263] dump_stack+0x172/0x1f0 [ 321.965910] should_fail.cold+0xa/0x1b [ 321.965931] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 321.965961] __should_failslab+0x121/0x190 [ 321.965979] should_failslab+0x9/0x14 [ 321.974954] kmem_cache_alloc+0x2ae/0x700 [ 321.974972] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.974988] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 321.975004] ? lockdep_hardirqs_on+0x415/0x5d0 [ 321.975021] __kernfs_new_node+0xef/0x680 [ 321.975038] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 321.983067] ? retint_kernel+0x2d/0x2d [ 321.983097] ? __kernfs_new_node+0x6/0x680 [ 321.983116] kernfs_new_node+0x99/0x130 [ 321.983135] __kernfs_create_file+0x51/0x33b [ 321.996770] sysfs_add_file_mode_ns+0x222/0x560 [ 321.996797] internal_create_group+0x383/0xc30 [ 321.996824] ? remove_files.isra.0+0x190/0x190 [ 321.996850] sysfs_create_groups+0x9b/0x141 [ 322.008625] input: syz1 as /devices/virtual/input/input751 [ 322.010303] device_add+0x8d8/0x1760 [ 322.010324] ? get_device_parent.isra.0+0x570/0x570 [ 322.010344] ? input_register_device+0x549/0xc30 [ 322.010361] input_register_device+0x6d2/0xc30 [ 322.010386] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 322.010402] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.010419] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 322.083985] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.088758] ? lockdep_hardirqs_on+0x415/0x5d0 [ 322.093409] ? retint_kernel+0x2d/0x2d [ 322.097297] ? trace_hardirqs_on_caller+0x6a/0x220 [ 322.102259] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.107007] ? retint_kernel+0x2d/0x2d [ 322.110902] ? uinput_compat_ioctl+0xb0/0xb0 [ 322.115317] uinput_ioctl+0x4a/0x60 [ 322.118940] ? uinput_compat_ioctl+0xb0/0xb0 [ 322.123387] do_vfs_ioctl+0xd5f/0x1380 [ 322.127264] ? lockdep_hardirqs_on+0x415/0x5d0 [ 322.131850] ? retint_kernel+0x2d/0x2d [ 322.135748] ? ioctl_preallocate+0x210/0x210 [ 322.140173] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 322.144946] ? retint_kernel+0x2d/0x2d [ 322.148858] ksys_ioctl+0xab/0xd0 [ 322.152321] __x64_sys_ioctl+0x73/0xb0 [ 322.156362] do_syscall_64+0xfd/0x620 [ 322.160178] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.165371] RIP: 0033:0x459a29 [ 322.168570] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:36 executing program 3 (fault-call:7 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 322.187487] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.195210] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 322.202492] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 322.209869] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 322.217136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 322.224456] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 322.288110] FAULT_INJECTION: forcing a failure. [ 322.288110] name failslab, interval 1, probability 0, space 0, times 0 [ 322.299685] CPU: 0 PID: 12215 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 322.306639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.316016] Call Trace: [ 322.316043] dump_stack+0x172/0x1f0 [ 322.316067] should_fail.cold+0xa/0x1b [ 322.316087] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.316103] ? lock_downgrade+0x880/0x880 [ 322.316131] __should_failslab+0x121/0x190 [ 322.322343] should_failslab+0x9/0x14 [ 322.322360] kmem_cache_alloc+0x2ae/0x700 [ 322.322382] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 322.322401] __kernfs_new_node+0xef/0x680 [ 322.322419] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 322.331407] ? wait_for_completion+0x440/0x440 [ 322.331433] ? mutex_unlock+0xd/0x10 [ 322.331448] ? kernfs_activate+0x192/0x1f0 [ 322.331469] kernfs_new_node+0x99/0x130 [ 322.331491] __kernfs_create_file+0x51/0x33b [ 322.339855] sysfs_add_file_mode_ns+0x222/0x560 [ 322.339881] internal_create_group+0x383/0xc30 [ 322.339905] ? remove_files.isra.0+0x190/0x190 [ 322.339918] ? kernfs_put+0x3c2/0x5d0 [ 322.339936] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.339950] ? kernfs_create_link+0x1d2/0x250 [ 322.339979] sysfs_create_groups+0x9b/0x141 [ 322.347914] device_add+0x8d8/0x1760 [ 322.347939] ? get_device_parent.isra.0+0x570/0x570 [ 322.347960] ? input_register_device+0x549/0xc30 [ 322.347978] input_register_device+0x6d2/0xc30 [ 322.356961] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 322.356982] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 322.357004] ? mark_held_locks+0x100/0x100 [ 322.357020] ? proc_cwd_link+0x1d0/0x1d0 [ 322.366342] ? __fget+0x340/0x540 [ 322.366373] uinput_ioctl+0x4a/0x60 [ 322.366388] ? uinput_compat_ioctl+0xb0/0xb0 [ 322.366404] do_vfs_ioctl+0xd5f/0x1380 [ 322.366423] ? selinux_file_ioctl+0x46f/0x5e0 [ 322.374365] ? selinux_file_ioctl+0x125/0x5e0 [ 322.374384] ? ioctl_preallocate+0x210/0x210 [ 322.374399] ? selinux_file_mprotect+0x620/0x620 [ 322.374422] ? iterate_fd+0x360/0x360 [ 322.374441] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 322.382798] ? fput+0x128/0x1a0 [ 322.382819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 322.382833] ? security_file_ioctl+0x8d/0xc0 [ 322.382853] ksys_ioctl+0xab/0xd0 [ 322.382872] __x64_sys_ioctl+0x73/0xb0 [ 322.382890] do_syscall_64+0xfd/0x620 [ 322.382910] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 322.392123] RIP: 0033:0x459a29 [ 322.392140] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.392148] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 322.392165] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 322.392174] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 322.392182] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 322.392192] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 322.392200] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 322.401075] kauditd_printk_skb: 964 callbacks suppressed [ 322.401087] audit: type=1400 audit(1570086156.806:17450): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 07:02:37 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} audit_backlog_limit=64 [ 322.779368] audit: audit_backlog=65 > audit_backlog_limit=64 07:02:37 executing program 3 (fault-call:7 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:37 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) read$usbfs(0xffffffffffffffff, &(0x7f0000000880)=""/4096, 0x1000) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @remote}, 0x10) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000000)=0x1) [ 322.785532] audit: audit_lost=46 audit_rate_limit=0 audit_backlog_limit=64 [ 322.789780] audit: type=1400 audit(1570086156.806:17456): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 07:02:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0xffffffbd}, [@ldst={0x7}]}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195}, 0x2b7) [ 322.893073] input: syz1 as /devices/virtual/input/input756 [ 322.903303] input: syz1 as /devices/virtual/input/input757 [ 322.931247] input: syz1 as /devices/virtual/input/input758 [ 322.932035] FAULT_INJECTION: forcing a failure. [ 322.932035] name failslab, interval 1, probability 0, space 0, times 0 [ 322.963846] CPU: 0 PID: 12224 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 322.970810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.970816] Call Trace: [ 322.970835] dump_stack+0x172/0x1f0 [ 322.970857] should_fail.cold+0xa/0x1b [ 322.970875] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 322.970891] ? lock_downgrade+0x880/0x880 [ 322.970917] __should_failslab+0x121/0x190 [ 322.990336] should_failslab+0x9/0x14 [ 322.990353] kmem_cache_alloc+0x2ae/0x700 [ 322.990375] ? __mutex_unlock_slowpath+0x9b/0x6b0 [ 322.990394] __kernfs_new_node+0xef/0x680 [ 322.990414] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 322.999653] ? wait_for_completion+0x440/0x440 [ 322.999679] ? mutex_unlock+0xd/0x10 [ 322.999693] ? kernfs_activate+0x192/0x1f0 [ 322.999711] kernfs_new_node+0x99/0x130 [ 322.999728] __kernfs_create_file+0x51/0x33b [ 322.999747] sysfs_add_file_mode_ns+0x222/0x560 [ 323.007765] internal_create_group+0x383/0xc30 [ 323.007793] ? remove_files.isra.0+0x190/0x190 [ 323.007823] sysfs_create_groups+0x9b/0x141 [ 323.020926] device_add+0x8d8/0x1760 [ 323.020951] ? get_device_parent.isra.0+0x570/0x570 [ 323.020966] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.020986] ? avc_has_extended_perms+0xa78/0x10f0 [ 323.030317] ? input_register_device+0x549/0xc30 [ 323.030337] input_register_device+0x6d2/0xc30 [ 323.030359] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 323.030376] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 323.030398] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.038318] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.038335] ? lockdep_hardirqs_on+0x415/0x5d0 [ 323.038357] ? __fget+0x340/0x540 [ 323.038384] uinput_ioctl+0x4a/0x60 [ 323.125084] ? uinput_compat_ioctl+0xb0/0xb0 [ 323.129517] do_vfs_ioctl+0xd5f/0x1380 [ 323.133422] ? selinux_file_ioctl+0x46f/0x5e0 [ 323.137937] ? selinux_file_ioctl+0x125/0x5e0 [ 323.142450] ? ioctl_preallocate+0x210/0x210 [ 323.146872] ? selinux_file_mprotect+0x620/0x620 [ 323.151650] ? iterate_fd+0x360/0x360 [ 323.155471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.160252] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.165798] ? security_file_ioctl+0x8d/0xc0 [ 323.170219] ksys_ioctl+0xab/0xd0 [ 323.173689] __x64_sys_ioctl+0x73/0xb0 [ 323.177584] ? do_syscall_64+0xed/0x620 [ 323.181564] do_syscall_64+0xfd/0x620 [ 323.185377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.190568] RIP: 0033:0x459a29 [ 323.193767] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) fstat(r1, &(0x7f0000000340)) 07:02:37 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r3, 0x0, 0x0, 0x2000002) fallocate(r2, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)={0x0, r3, 0x0, 0x8, 0x20}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) 07:02:37 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f6500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{0x1ffffffc}}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000005740)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001780)=""/124, 0x7c}, {&(0x7f0000000000)=""/15, 0xf}], 0x3, &(0x7f0000000280)=""/22, 0x16}, 0xecf4}, {{&(0x7f0000001f00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001f80)=""/220, 0xdc}, {&(0x7f0000002080)=""/212, 0xd4}], 0x2, &(0x7f0000002180)=""/4096, 0x1000}}, {{&(0x7f0000003180)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/85, 0x55}], 0x2, &(0x7f00000043c0)=""/102, 0x66}, 0x8}, {{&(0x7f0000004440)=@alg, 0x80, &(0x7f0000005700)=[{&(0x7f00000044c0)=""/137, 0x89}, {&(0x7f0000004580)=""/209, 0xd1}, {&(0x7f0000004680)=""/108, 0x6c}, {&(0x7f0000004700)=""/4096, 0x1000}], 0x4}}], 0x4, 0x2023, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000480)={{0x0, 0x0, @reserved="7e38fbcdea13a5677fc6cf46443a13d250ac7a0e2874a02460a7e483869ced2a"}}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r4, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/11, 0xb}, 0x120) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) dup2(r5, r4) [ 323.212676] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.220401] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 323.227700] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 323.234977] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 323.242254] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 323.249532] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 323.342069] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 323.348799] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 323.375185] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 323.382824] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 07:02:37 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x0, 0x40}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:37 executing program 3 (fault-call:7 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 323.390235] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 323.396941] hid-generic 0000:0000:0000.0008: unknown main item tag 0x0 [ 323.405510] hid-generic 0000:0000:0000.0008: hidraw0: HID v0.00 Device [syz0] on syz1 [ 323.458100] hid-generic 0000:0000:0000.0009: unknown main item tag 0x7 [ 323.475006] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 323.487641] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 323.495091] hid-generic 0000:0000:0000.0009: unknown main item tag 0x0 [ 323.505159] hid-generic 0000:0000:0000.0009: hidraw0: HID v0.00 Device [syz0] on syz1 [ 323.510524] FAULT_INJECTION: forcing a failure. [ 323.510524] name failslab, interval 1, probability 0, space 0, times 0 [ 323.526503] input: syz1 as /devices/virtual/input/input761 [ 323.558408] CPU: 0 PID: 12255 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 323.565384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.574749] Call Trace: [ 323.577359] dump_stack+0x172/0x1f0 [ 323.581009] should_fail.cold+0xa/0x1b [ 323.584918] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 323.590035] ? lock_downgrade+0x880/0x880 [ 323.594208] __should_failslab+0x121/0x190 [ 323.598458] should_failslab+0x9/0x14 [ 323.602272] kmem_cache_alloc+0x2ae/0x700 [ 323.606430] ? lock_downgrade+0x880/0x880 [ 323.606455] __kernfs_new_node+0xef/0x680 [ 323.606473] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 323.606490] ? wait_for_completion+0x440/0x440 [ 323.614776] ? mutex_unlock+0xd/0x10 [ 323.614792] ? kernfs_activate+0x192/0x1f0 [ 323.614811] kernfs_new_node+0x99/0x130 [ 323.614829] __kernfs_create_file+0x51/0x33b [ 323.624146] sysfs_add_file_mode_ns+0x222/0x560 [ 323.624173] internal_create_group+0x383/0xc30 [ 323.624202] ? remove_files.isra.0+0x190/0x190 [ 323.632117] ? kernfs_put+0x3c2/0x5d0 07:02:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f00000002c0), 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x1d, r2}, 0x10, &(0x7f00000000c0)={&(0x7f0000000180)=@can={{0x1ffffffc}}, 0x10}}, 0x0) recvmmsg(r0, &(0x7f0000005740)=[{{&(0x7f0000000300)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000001780)=""/124, 0x7c}, {&(0x7f0000000000)=""/15, 0xf}], 0x3, &(0x7f0000000280)=""/22, 0x16}, 0xecf4}, {{&(0x7f0000001f00)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000440)=[{&(0x7f0000001f80)=""/220, 0xdc}, {&(0x7f0000002080)=""/212, 0xd4}], 0x2, &(0x7f0000002180)=""/4096, 0x1000}}, {{&(0x7f0000003180)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000004380)=[{&(0x7f0000003300)=""/4096, 0x1000}, {&(0x7f0000004300)=""/85, 0x55}], 0x2, &(0x7f00000043c0)=""/102, 0x66}, 0x8}, {{&(0x7f0000004440)=@alg, 0x80, &(0x7f0000005700)=[{&(0x7f00000044c0)=""/137, 0x89}, {&(0x7f0000004580)=""/209, 0xd1}, {&(0x7f0000004680)=""/108, 0x6c}, {&(0x7f0000004700)=""/4096, 0x1000}], 0x4}}], 0x4, 0x2023, 0x0) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r3, 0xc0406618, &(0x7f0000000480)={{0x0, 0x0, @reserved="7e38fbcdea13a5677fc6cf46443a13d250ac7a0e2874a02460a7e483869ced2a"}}) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r4, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/11, 0xb}, 0x120) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgpoup.events\x00>\xa5^\x10\xa8)\x9ds\xeemr\xda\x86\xf4\xdb\xed/\x19\xb5*H\xa9\x0ea\x87)\x89L\x91\x8aI\x85\xeb\x8fo,1h\x1f\x98\x87 \xc1u<\x87\xf1=\x03a\xb8%\xfe/J\xc4\xad\x9e\xdb\xd5^\xeb\xfe\f\xee$\x0f\xf8\x94\xa1J\xe0\xeb\xe6\xc8A\xb4\x9b\xed\xc1D\x02\xa1R\x88\x15\xb5\xafr5\xf0\xef\xce\xe6\xb1\xcb\xa8r\x81a\xd6\x1a\x1a\xb8\xa9\x17\xc2\xb5', 0x275a, 0x0) dup2(r5, r4) 07:02:37 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 323.632136] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.632152] ? kernfs_create_link+0x1d2/0x250 [ 323.632175] sysfs_create_groups+0x9b/0x141 [ 323.632196] device_add+0x8d8/0x1760 [ 323.632217] ? get_device_parent.isra.0+0x570/0x570 [ 323.637474] input: syz1 as /devices/virtual/input/input762 [ 323.641180] ? input_register_device+0x425/0xc30 [ 323.641194] ? input_register_device+0x549/0xc30 [ 323.641213] input_register_device+0x6d2/0xc30 [ 323.641229] ? uinput_ioctl_handler.isra.0+0x13e5/0x1c50 [ 323.641250] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 323.641268] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 323.717692] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.722471] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 323.722493] ? __fget+0x340/0x540 [ 323.722519] uinput_ioctl+0x4a/0x60 [ 323.734571] ? uinput_compat_ioctl+0xb0/0xb0 [ 323.738994] do_vfs_ioctl+0xd5f/0x1380 [ 323.742898] ? selinux_file_ioctl+0x46f/0x5e0 [ 323.745196] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.747404] ? selinux_file_ioctl+0x125/0x5e0 [ 323.747425] ? ioctl_preallocate+0x210/0x210 [ 323.747440] ? selinux_file_mprotect+0x620/0x620 [ 323.747463] ? iterate_fd+0x360/0x360 [ 323.759415] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.763038] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 323.763056] ? fput+0x128/0x1a0 [ 323.763080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 323.763093] ? security_file_ioctl+0x8d/0xc0 [ 323.763110] ksys_ioctl+0xab/0xd0 [ 323.768032] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.771642] __x64_sys_ioctl+0x73/0xb0 [ 323.771661] do_syscall_64+0xfd/0x620 [ 323.771683] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 323.771695] RIP: 0033:0x459a29 [ 323.771709] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.771717] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 323.771731] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 323.771738] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 323.771749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 323.779446] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.783928] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 323.783937] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 323.821306] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.887850] hid-generic 0000:0000:0000.000A: unknown main item tag 0x0 [ 323.911151] hid-generic 0000:0000:0000.000A: hidraw0: HID v0.00 Device [syz0] on syz1 07:02:38 executing program 3 (fault-call:7 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:38 executing program 5: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x87f1a7) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x0, 0x10000005f70b710, 0x0, 0x0, 0x2, [{}, {}]}) [ 323.952460] input: syz1 as /devices/virtual/input/input763 07:02:38 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, &(0x7f00000000c0)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x8) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) r4 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x5080200}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="21004fc73913df9d59459b587ade8d71d989df375ab7c76fd015f06fe47f60b074ba91a5c6010e153a0cccc64c701c0b25f157f6b0569968c3787d6774d42b762453707c3a3b62708e90ebca38035fb82a578491882bb5026e222c9005fdff20046bd713b77517eb5508a638ea06c16002de6aa2518c5de72e906196552b19582bbcd36ce6078e42f174e927761c2b3b831f7cf9f0846af0be2758907298e2590f50757329e996be238f511fd9ef562ffab5dbbdee71b885", @ANYRES16=r4, @ANYBLOB="040029bd7000ffdbdf2504000000080002007f00000008000509000000000000000006000000080005000100080008000500040000000800050004000000"], 0x44}, 0x1, 0x0, 0x0, 0x40c5}, 0xc27487c904984a8c) [ 324.054369] FAULT_INJECTION: forcing a failure. [ 324.054369] name failslab, interval 1, probability 0, space 0, times 0 [ 324.072721] CPU: 1 PID: 12268 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 324.079699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.089066] Call Trace: [ 324.091668] dump_stack+0x172/0x1f0 [ 324.095321] should_fail.cold+0xa/0x1b [ 324.099231] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 324.104434] ? lock_downgrade+0x880/0x880 [ 324.108613] __should_failslab+0x121/0x190 [ 324.112863] should_failslab+0x9/0x14 [ 324.116676] kmem_cache_alloc+0x2ae/0x700 [ 324.120842] ? lock_downgrade+0x880/0x880 [ 324.125005] __kernfs_new_node+0xef/0x680 [ 324.129165] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 324.133963] ? mark_held_locks+0xb1/0x100 [ 324.138121] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.142887] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.147659] ? lockdep_hardirqs_on+0x415/0x5d0 [ 324.152253] ? retint_kernel+0x2d/0x2d [ 324.156154] ? trace_hardirqs_on_caller+0x6a/0x220 [ 324.161099] kernfs_new_node+0x99/0x130 [ 324.165088] __kernfs_create_file+0x51/0x33b [ 324.169516] sysfs_add_file_mode_ns+0x222/0x560 [ 324.174203] internal_create_group+0x383/0xc30 [ 324.178806] ? remove_files.isra.0+0x190/0x190 [ 324.183393] ? kernfs_put+0x3c2/0x5d0 [ 324.187207] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 324.192751] ? kernfs_create_link+0x1d2/0x250 [ 324.197257] sysfs_create_groups+0x9b/0x141 [ 324.201609] device_add+0x8d8/0x1760 [ 324.205342] ? get_device_parent.isra.0+0x570/0x570 [ 324.210367] ? input_register_device+0x659/0xc30 [ 324.210386] input_register_device+0x6d2/0xc30 [ 324.210407] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 324.210426] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 324.210440] ? lockdep_hardirqs_on+0x415/0x5d0 [ 324.210454] ? retint_kernel+0x2d/0x2d [ 324.210470] ? trace_hardirqs_on_caller+0x6a/0x220 [ 324.210491] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 324.222996] input: syz1 as /devices/virtual/input/input765 [ 324.225088] ? retint_kernel+0x2d/0x2d [ 324.225109] ? uinput_compat_ioctl+0xb0/0xb0 [ 324.225128] uinput_ioctl+0x4a/0x60 [ 324.266090] ? uinput_compat_ioctl+0xb0/0xb0 [ 324.270511] do_vfs_ioctl+0xd5f/0x1380 [ 324.274407] ? selinux_file_ioctl+0x46f/0x5e0 [ 324.278917] ? selinux_file_ioctl+0x125/0x5e0 [ 324.283428] ? ioctl_preallocate+0x210/0x210 [ 324.287844] ? selinux_file_mprotect+0x620/0x620 [ 324.292621] ? retint_kernel+0x2d/0x2d [ 324.296540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 07:02:38 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f6500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.344990] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:02:38 executing program 5: openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self//exe\x00', 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00\x02\x17\x87:\xf4\x03\xdfc\x88,5I\xd7^\xb5D\xf7\xd7\xdb,(\xd5\x00\xc2\x06MG\xcd\xe9w\xe5s\x02\xf2\xea\xb6\xabsp\x12xT8\x01\x00\xd4S\xd8F\xab.x|\x8b\x87\xb0\xa2\xf5Y>\xb1 p\x998(\xe63\xcf\x7f\xac\x89F\x03n\x96\x15zsw\x98\xca\xcb3\xb6M=h\x01i.\xa3\xda}\x190~\xe7d6\xa5\x17\xb3\xe9\xd9QV\x0f\xf3\x02\xd6\xc1\xc3n\xcd*R\x9a\x95\x12\x05K\xa0<\xc9\xe3\xed\xab\xc9\x8bK\xb3\x86\xe2\x93f\x92iKA|e\x97k :,J36\x11\xf0\x99\x96\xb7]\xfd\xe3\v\xd8\x98\xc5o\xc6\xde\x80\xf7_\xc9\x8f\xaf\xf9\xd5\xb7ui\xea\xde\xd0\xeb\xd9\xf5_\v\xe2*\xa3\xf4\xab?n\xcb\x19i\x80\x91\xd2\xf6\x14\xfe!!0\x84L\x86\x81\x95,B\x11\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xab*[\xa5\xb217\x93\xf3\x88\x92\xa6\xde\x11\xa2-J\x9d\xc9\xb2\x97\xa3\x88v\x9eR\x155\xc7N!\xdb\"8\xc8I\xb9c\xed\xa7!\t\x85s\xb1\xa5\xa7R2Yf\x1c\xf8\xc2z>\xb1\x9c\x02a\x87\xe9\xb8\xf8\xdcv\xb6\xe4\xa6\n\x0e\x83lM7\xcc?\xea\x19\x99\xce\x1c\x10\xd2lQ(\xc7\xe9\xef\xd2Q\vY\xf58\x10|8}uE\xaf\xb4w;\xbc\xe4\x01\xd8\xf2\xf9u\xc1Dt\'\x84\xb5\xa4\x83\xeft\xfc\xf3\xdd\x87 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:39 executing program 5: readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0xfe51) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x40000000000002f, 0x0) [ 324.856220] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 324.863930] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 324.871205] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 324.878470] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 324.885726] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 324.892987] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:39 executing program 3 (fault-call:7 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 324.964397] input: syz1 as /devices/virtual/input/input772 [ 325.000524] FAULT_INJECTION: forcing a failure. [ 325.000524] name failslab, interval 1, probability 0, space 0, times 0 [ 325.024191] CPU: 0 PID: 12295 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 325.031158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.031165] Call Trace: [ 325.031189] dump_stack+0x172/0x1f0 [ 325.031212] should_fail.cold+0xa/0x1b [ 325.050671] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 325.050701] __should_failslab+0x121/0x190 [ 325.050719] should_failslab+0x9/0x14 [ 325.050730] kmem_cache_alloc+0x2ae/0x700 [ 325.050747] ? kasan_check_write+0x14/0x20 [ 325.063863] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 325.063886] __kernfs_new_node+0xef/0x680 [ 325.072247] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 325.072263] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.072278] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.072294] ? retint_kernel+0x2d/0x2d [ 325.072309] ? trace_hardirqs_on_caller+0x6a/0x220 [ 325.072329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.086043] kernfs_new_node+0x99/0x130 [ 325.086064] kernfs_create_dir_ns+0x52/0x160 [ 325.086082] internal_create_group+0x1cb/0xc30 [ 325.086102] ? remove_files.isra.0+0x190/0x190 [ 325.086119] ? sysfs_create_groups+0x26/0x141 [ 325.086133] sysfs_create_groups+0x9b/0x141 [ 325.095773] device_add+0x8d8/0x1760 [ 325.095802] ? get_device_parent.isra.0+0x570/0x570 [ 325.095819] ? lockdep_hardirqs_on+0x415/0x5d0 [ 325.107949] gfs2: not a GFS2 filesystem [ 325.109368] ? trace_hardirqs_on+0x67/0x220 [ 325.109385] ? input_register_device+0x549/0xc30 [ 325.109401] input_register_device+0x6d2/0xc30 [ 325.109423] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 325.109443] ? __schedule+0x86e/0x1dc0 [ 325.117821] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 325.117838] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.117856] ? lockdep_hardirqs_on+0x415/0x5d0 [ 325.126997] ? retint_kernel+0x2d/0x2d [ 325.127015] ? trace_hardirqs_on_caller+0x6a/0x220 [ 325.127035] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 325.127054] ? retint_kernel+0x2d/0x2d [ 325.135882] uinput_ioctl+0x4a/0x60 [ 325.135897] ? uinput_compat_ioctl+0xb0/0xb0 [ 325.135912] do_vfs_ioctl+0xd5f/0x1380 [ 325.135932] ? selinux_file_ioctl+0x46f/0x5e0 [ 325.144631] ? selinux_file_ioctl+0x125/0x5e0 [ 325.144650] ? ioctl_preallocate+0x210/0x210 [ 325.144664] ? selinux_file_mprotect+0x620/0x620 [ 325.144686] ? iterate_fd+0x360/0x360 [ 325.149496] input: syz1 as /devices/virtual/input/input773 [ 325.153217] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 325.153231] ? security_file_ioctl+0x8d/0xc0 [ 325.153252] ksys_ioctl+0xab/0xd0 [ 325.260654] __x64_sys_ioctl+0x73/0xb0 [ 325.264532] do_syscall_64+0xfd/0x620 [ 325.268340] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 325.273515] RIP: 0033:0x459a29 [ 325.276695] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.295580] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.303274] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 325.310530] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 325.317791] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 07:02:39 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x7fff, 0x7, &(0x7f0000002940)=[{&(0x7f00000000c0)="b53019e6d11b47cd51fb52833ba66aa76a8da6d335b3b11c1c896ebb89d343ed9850894cc5cceaf65d878c0abad57070a7575914dd279fe7f73ec2dbac1d1a9f1f88026012e52e5db1fd2d3d5a425ed5421d2ee8ddb216923e00aacc33d1a0967bf79a77b1f09db3e0be71faf63d2c1c3ed8c48046a34ee7c6e6106796e4a4e97ddaade013fbb09cdd3a5d9ebca1db87d778fe659c6e91f933be5a487a78c3073cce308986ebac8e62f29e4df53bc6135ec5dc6a990f12cb4276869ad68dec5d5d252c5d59", 0xc5, 0x101}, {&(0x7f00000001c0)="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", 0xfe, 0x3}, {&(0x7f0000000880)="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", 0x1000, 0x2}, {&(0x7f0000001880)="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", 0x1000, 0xffffffffffffff83}, {&(0x7f00000002c0)="9e5730e4783642f7c6bc4e5f7d8b3fc6892aff8cebe42aff2906afa4457f4ef88958f49d90262df1ba46468a9425", 0x2e, 0xa2}, {&(0x7f0000000300)="9aaf5118479574eaa423ddacde5cb21985e59d19e6b6139ac167bb75cb84821711197d901607240a454e8307159f80418dc6a924a6aff923bb79d34c87682e5525ad1b600b5f63695ca8eef02634035e50c01c3ae33b33351602979183703a1b4e1f5bb4680c6e7312ed73769f8ff6dff7bc93be0e52d58dce41896f452842524642546d8d9dca5984bac0f470df07fb2cf44e96eb012deb3c126e1ffd74388e31965aa72f0474e822d7047823a0186cfb56e9a7514c00d2365f477d66eb72449f7dc5b33e2814bd7dc9fd169dce84f8d2dbe41788447eaa118849b5ce1e65d23d685e56815d75fc5560", 0xea, 0x3}, {&(0x7f0000002880)="09780d32b3a63a5157939347f5575327c9dbd858136a02dcf125464e734809c5fbb3a9cadaa9a62b36e307a255e1a8f62e34fbd03f9c19ce96e4ed6e9689d21b0b4140700acac9fcb5f73e7b02207a17fee7934e0afa897eae6b7b2a9f7a6066449c2784a3e5c5efe818d42c8da8ac023a2d31440728f9edd4b8c42b936ff561d6e8d8ab1fba9335ff5c0b7c2ca45c2ba966baeefe4148feca7d63567f373ca0", 0xa0, 0x8001}], 0x10000, &(0x7f0000002a00)={[{@ignore_local_fs='ignore_local_fs'}, {@acl='acl'}, {@nosuiddir='nosuiddir'}, {@upgrade='upgrade'}, {@suiddir='suiddir'}, {@hostdata={'hostdata', 0x3d, 'syz1\x00'}}, {@data_ordered='data=ordered'}, {@spectator='spectator'}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'syz1\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/uinput\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@dont_measure='dont_measure'}]}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000003200)='/proc/self/attr/current\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x13, &(0x7f0000002ac0), &(0x7f0000002b00)=0x4) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c19, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000002bc0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5e0, 0x0, 0x0, 0x318, 0x440, 0x440, 0x548, 0x548, 0x548, 0x548, 0x548, 0x6, &(0x7f0000002b40), {[{{@ip={@broadcast, @rand_addr=0x1, 0x28e821d958428ddb, 0xff000000, 'team0\x00', 'veth0_to_hsr\x00', {0xff}, {0xff}, 0x62, 0x2, 0x40}, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xf, 0x6e, 0x1, 0x1}}, @common=@socket0={0x20, 'socket\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@loopback, @broadcast, 0x0, 0xffffffff, 'hwsim0\x00', 'ipddp0\x00', {}, {0x9d61f9aa2a84fad8}, 0x5e, 0x1, 0x20}, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0xfffffff7, 0x81}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="9a1ed9869cfd", 0x2, 0x8, [0x23, 0x16, 0x2d, 0x27, 0x38, 0x3a, 0x25, 0x8, 0x26, 0x31, 0x33, 0x25, 0xfff8, 0x2f, 0x39, 0xe], 0x3, 0x4, 0x5}}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @remote, 0xff, 0x0, '\x00', 'bridge0\x00', {}, {}, 0xc, 0x0, 0x4}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x7}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xe8, 0x128, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x6}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x4}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0xacc, 0x3, @ipv6=@ipv4={[], [], @local}, 0x4e22}}}, {{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x3, 0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x640) [ 325.325099] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 325.332441] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:39 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f6500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:40 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x4, 0x0, [], [{0x3, 0x3, 0x3ff, 0x8, 0xfffffffffffffffc, 0xff}, {0xb83, 0x8, 0x8000, 0x200000000000, 0x1}], [[], [], [], []]}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) prctl$PR_SET_FP_MODE(0x2d, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x242602, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000140)='syz1\x00', 0x5, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x3) 07:02:40 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f0000000000)="b9800000c00f3235001000000f30660fc77300650f0666ba4100ec0f30c4c17c513a3e660f3a0c55c500b9470a0000b82a360000ba000000000f303e0f01d10f09", 0x41}], 0x1, 0x10, &(0x7f0000000100), 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 325.809685] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 325.817409] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 325.824685] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 325.831958] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 325.839229] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 325.846498] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:40 executing program 5: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$caif_stream(0x25, 0x1, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000001c0)={'raw\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) creat(0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, 0x0) [ 325.904014] input: syz1 as /devices/virtual/input/input778 [ 325.925500] input: syz1 as /devices/virtual/input/input779 07:02:40 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x12, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad430100"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) statx(r1, &(0x7f0000000000)='./file0\x00', 0x200, 0x1, &(0x7f00000000c0)) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:40 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f00000000c0)={0xdbc0034f2b70eaf8, @capture={0x1000, 0x0, {0xad, 0x9}, 0x10000, 0x1}}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 326.135017] FAULT_INJECTION: forcing a failure. [ 326.135017] name failslab, interval 1, probability 0, space 0, times 0 [ 326.187424] input: syz1 as /devices/virtual/input/input783 [ 326.200591] CPU: 0 PID: 12351 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 326.207560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.216925] Call Trace: [ 326.219534] dump_stack+0x172/0x1f0 [ 326.223176] should_fail.cold+0xa/0x1b [ 326.227076] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 326.232203] __should_failslab+0x121/0x190 [ 326.236464] should_failslab+0x9/0x14 [ 326.240275] kmem_cache_alloc+0x2ae/0x700 [ 326.244436] ? lock_downgrade+0x880/0x880 [ 326.248594] ? kasan_check_read+0x11/0x20 [ 326.252744] __kernfs_new_node+0xef/0x680 [ 326.252763] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 326.252779] ? wait_for_completion+0x440/0x440 [ 326.252800] ? mutex_unlock+0xd/0x10 [ 326.269955] ? kernfs_activate+0x192/0x1f0 [ 326.274208] kernfs_new_node+0x99/0x130 [ 326.278192] __kernfs_create_file+0x51/0x33b [ 326.282620] sysfs_add_file_mode_ns+0x222/0x560 [ 326.287307] internal_create_group+0x383/0xc30 [ 326.291913] ? remove_files.isra.0+0x190/0x190 [ 326.296277] IPVS: ftp: loaded support on port[0] = 21 [ 326.296511] sysfs_create_groups+0x9b/0x141 [ 326.306009] device_add+0x8d8/0x1760 [ 326.309739] ? get_device_parent.isra.0+0x570/0x570 [ 326.314765] ? input_register_device+0x6c3/0xc30 [ 326.319532] input_register_device+0x6d2/0xc30 [ 326.324129] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 326.329414] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 326.334785] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.339562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 326.344342] ? lockdep_hardirqs_on+0x415/0x5d0 [ 326.348938] ? retint_kernel+0x2d/0x2d [ 326.352830] ? trace_hardirqs_on_caller+0x6a/0x220 [ 326.352854] ? __fget+0x340/0x540 [ 326.361238] uinput_ioctl+0x4a/0x60 [ 326.364867] ? uinput_compat_ioctl+0xb0/0xb0 [ 326.369284] do_vfs_ioctl+0xd5f/0x1380 [ 326.373173] ? selinux_file_ioctl+0x46f/0x5e0 [ 326.373185] ? selinux_file_ioctl+0x125/0x5e0 [ 326.373200] ? ioctl_preallocate+0x210/0x210 07:02:40 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.400841] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.408694] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 326.408702] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 326.408716] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 326.416365] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 326.416375] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 326.499190] input: syz1 as /devices/virtual/input/input785 [ 326.531042] input: syz1 as /devices/virtual/input/input786 07:02:40 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.829752] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 326.829768] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 326.829776] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 326.829784] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 326.829793] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 326.829802] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 327.031188] input: syz1 as /devices/virtual/input/input789 [ 327.045237] input: syz1 as /devices/virtual/input/input790 [ 327.148076] input: syz1 as /devices/virtual/input/input791 [ 327.267750] input: syz1 as /devices/virtual/input/input792 [ 327.419731] kauditd_printk_skb: 1263 callbacks suppressed [ 327.419743] audit: type=1400 audit(1570086161.826:18630): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.487546] audit: type=1400 audit(1570086161.826:18631): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.503223] IPVS: ftp: loaded support on port[0] = 21 [ 327.537533] audit: type=1400 audit(1570086161.826:18632): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.584130] audit: type=1400 audit(1570086161.826:18633): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.619076] audit: type=1400 audit(1570086161.826:18634): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.641263] audit: type=1400 audit(1570086161.826:18635): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 07:02:42 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x4004, 0x84003ff) mkdir(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x6, @perf_config_ext, 0x2, 0x1, 0xfffffffe, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)='em0trustedem0vmnet1posix_acl_access)n+-#(-user+\x00', 0xffffffffffffffff) unlink(&(0x7f0000000040)='./file0\x00') 07:02:42 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:42 executing program 3 (fault-call:7 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)={0x2, 0x9, [{0x7, 0x0, 0x57d}, {0x2}]}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x0, 0x0, 0x9}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 327.663587] audit: type=1400 audit(1570086161.826:18636): avc: denied { search } for pid=7510 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.685451] audit: type=1400 audit(1570086161.856:18637): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.707197] audit: type=1400 audit(1570086161.856:18638): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.759774] input: syz1 as /devices/virtual/input/input793 [ 327.782321] audit: type=1400 audit(1570086162.136:18639): avc: denied { search } for pid=3604 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:cpu_device_t:s0 tclass=dir permissive=0 [ 327.813054] input: syz1 as /devices/virtual/input/input795 [ 327.843711] FAULT_INJECTION: forcing a failure. [ 327.843711] name failslab, interval 1, probability 0, space 0, times 0 [ 327.855409] input: syz1 as /devices/virtual/input/input796 [ 327.864125] CPU: 0 PID: 12391 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 327.871075] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.880534] Call Trace: [ 327.883117] dump_stack+0x172/0x1f0 [ 327.886769] should_fail.cold+0xa/0x1b [ 327.890678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 327.895782] ? lock_downgrade+0x880/0x880 [ 327.899939] __should_failslab+0x121/0x190 [ 327.904181] should_failslab+0x9/0x14 [ 327.907988] kmem_cache_alloc+0x2ae/0x700 [ 327.912140] ? kasan_check_write+0x14/0x20 [ 327.916368] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 327.921203] __kernfs_new_node+0xef/0x680 [ 327.925341] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 327.930093] ? mutex_unlock+0xd/0x10 [ 327.933803] ? kernfs_activate+0x192/0x1f0 [ 327.938055] ? kernfs_add_one+0x131/0x4d0 [ 327.942229] kernfs_new_node+0x99/0x130 [ 327.946205] kernfs_create_dir_ns+0x52/0x160 [ 327.950608] internal_create_group+0x1cb/0xc30 [ 327.955191] ? remove_files.isra.0+0x190/0x190 [ 327.959768] sysfs_create_groups+0x9b/0x141 [ 327.964082] device_add+0x8d8/0x1760 [ 327.967801] ? get_device_parent.isra.0+0x570/0x570 [ 327.972814] ? input_register_device+0x6c3/0xc30 [ 327.977576] input_register_device+0x6d2/0xc30 [ 327.982159] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 327.987434] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 327.992791] ? lockdep_hardirqs_on+0x415/0x5d0 [ 327.997367] ? retint_kernel+0x2d/0x2d [ 328.001277] ? trace_hardirqs_on_caller+0x6a/0x220 [ 328.006205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.010955] ? retint_kernel+0x2d/0x2d [ 328.014836] ? uinput_compat_ioctl+0xb0/0xb0 [ 328.019235] uinput_ioctl+0x4a/0x60 [ 328.022849] ? uinput_compat_ioctl+0xb0/0xb0 [ 328.027246] do_vfs_ioctl+0xd5f/0x1380 [ 328.031143] ? selinux_file_ioctl+0x46f/0x5e0 [ 328.035652] ? selinux_file_ioctl+0x125/0x5e0 [ 328.040158] ? ioctl_preallocate+0x210/0x210 [ 328.044576] ? selinux_file_mprotect+0x620/0x620 [ 328.049334] ? retint_kernel+0x2d/0x2d [ 328.053231] ? security_file_ioctl+0x20/0xc0 [ 328.057650] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.063190] ? security_file_ioctl+0x8d/0xc0 [ 328.067616] ksys_ioctl+0xab/0xd0 [ 328.071081] __x64_sys_ioctl+0x73/0xb0 [ 328.074973] ? do_syscall_64+0x5b/0x620 [ 328.078949] do_syscall_64+0xfd/0x620 [ 328.082755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.087932] RIP: 0033:0x459a29 [ 328.091124] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 07:02:42 executing program 3 (fault-call:7 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 328.110032] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.117750] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 328.125020] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 328.132286] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 328.139555] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 328.146827] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x200000, 0x0) [ 328.266820] FAULT_INJECTION: forcing a failure. [ 328.266820] name failslab, interval 1, probability 0, space 0, times 0 [ 328.282653] CPU: 0 PID: 12409 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 328.289620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.298986] Call Trace: [ 328.301597] dump_stack+0x172/0x1f0 [ 328.305244] should_fail.cold+0xa/0x1b [ 328.309148] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 328.314261] ? lock_downgrade+0x880/0x880 [ 328.318436] __should_failslab+0x121/0x190 [ 328.322681] should_failslab+0x9/0x14 [ 328.326489] kmem_cache_alloc+0x2ae/0x700 [ 328.330649] ? __sanitizer_cov_trace_cmp4+0x20/0x20 [ 328.335678] __kernfs_new_node+0xef/0x680 [ 328.339840] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 328.344610] ? retint_kernel+0x2d/0x2d [ 328.348606] kernfs_new_node+0x99/0x130 [ 328.352595] kernfs_create_dir_ns+0x52/0x160 [ 328.357022] internal_create_group+0x1cb/0xc30 [ 328.361630] ? remove_files.isra.0+0x190/0x190 [ 328.366225] ? sysfs_create_groups+0x18/0x141 [ 328.370731] sysfs_create_groups+0x9b/0x141 [ 328.375067] device_add+0x8d8/0x1760 [ 328.378806] ? get_device_parent.isra.0+0x570/0x570 [ 328.383841] input_register_device+0x6d2/0xc30 [ 328.388446] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 328.393740] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 328.399111] ? lockdep_hardirqs_on+0x415/0x5d0 [ 328.403701] ? retint_kernel+0x2d/0x2d [ 328.407602] ? trace_hardirqs_on_caller+0x6a/0x220 [ 328.412543] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.417314] ? retint_kernel+0x2d/0x2d [ 328.421218] ? uinput_compat_ioctl+0xb0/0xb0 [ 328.425639] uinput_ioctl+0x4a/0x60 [ 328.429276] ? uinput_compat_ioctl+0xb0/0xb0 [ 328.433697] do_vfs_ioctl+0xd5f/0x1380 [ 328.437592] ? selinux_file_ioctl+0x46f/0x5e0 [ 328.442092] ? selinux_file_ioctl+0x125/0x5e0 [ 328.446595] ? ioctl_preallocate+0x210/0x210 [ 328.451006] ? selinux_file_mprotect+0x620/0x620 [ 328.455771] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 328.460549] ? retint_kernel+0x2d/0x2d [ 328.464453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 328.469998] ? security_file_ioctl+0x8d/0xc0 [ 328.474418] ksys_ioctl+0xab/0xd0 [ 328.477884] __x64_sys_ioctl+0x73/0xb0 [ 328.481785] do_syscall_64+0xfd/0x620 [ 328.485602] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 328.490798] RIP: 0033:0x459a29 [ 328.493993] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.512906] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 328.520630] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 328.527904] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 328.535180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 328.542458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 328.549740] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 07:02:42 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.994081] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.001776] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 329.009033] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 329.016287] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 329.023541] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 329.030797] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 329.073999] input: syz1 as /devices/virtual/input/input803 [ 329.100363] input: syz1 as /devices/virtual/input/input804 07:02:43 executing program 3 (fault-call:7 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 329.119256] input: syz1 as /devices/virtual/input/input805 07:02:43 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) r2 = syz_open_pts(r1, 0x40182) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000000)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 329.314894] FAULT_INJECTION: forcing a failure. [ 329.314894] name failslab, interval 1, probability 0, space 0, times 0 [ 329.336669] CPU: 1 PID: 12439 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 329.343636] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.352981] Call Trace: [ 329.355560] dump_stack+0x172/0x1f0 [ 329.359182] should_fail.cold+0xa/0x1b [ 329.363060] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.368153] ? lock_downgrade+0x880/0x880 [ 329.372301] __should_failslab+0x121/0x190 [ 329.376527] should_failslab+0x9/0x14 [ 329.380321] kmem_cache_alloc+0x2ae/0x700 [ 329.384455] ? lock_downgrade+0x880/0x880 [ 329.388600] __kernfs_new_node+0xef/0x680 [ 329.392740] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 329.397498] ? wait_for_completion+0x440/0x440 [ 329.402084] ? mutex_unlock+0xd/0x10 [ 329.405786] ? kernfs_activate+0x192/0x1f0 [ 329.410011] kernfs_new_node+0x99/0x130 [ 329.413985] __kernfs_create_file+0x51/0x33b [ 329.418403] sysfs_add_file_mode_ns+0x222/0x560 [ 329.423069] internal_create_group+0x383/0xc30 [ 329.427649] ? remove_files.isra.0+0x190/0x190 [ 329.432217] ? kernfs_put+0x3c2/0x5d0 [ 329.436010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.441548] ? kernfs_create_link+0x1d2/0x250 [ 329.446049] sysfs_create_groups+0x9b/0x141 [ 329.450364] device_add+0x8d8/0x1760 [ 329.454066] ? retint_kernel+0x2d/0x2d [ 329.457947] ? get_device_parent.isra.0+0x570/0x570 [ 329.462965] ? input_register_device+0x6c3/0xc30 [ 329.467721] ? device_add+0xf/0x1760 [ 329.471425] input_register_device+0x6d2/0xc30 [ 329.476001] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 329.481273] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 329.486624] ? lockdep_hardirqs_on+0x415/0x5d0 [ 329.491193] ? retint_kernel+0x2d/0x2d [ 329.495077] ? trace_hardirqs_on_caller+0x6a/0x220 [ 329.499995] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.504745] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.509493] ? retint_kernel+0x2d/0x2d [ 329.513381] uinput_ioctl+0x4a/0x60 [ 329.516996] ? uinput_compat_ioctl+0xb0/0xb0 [ 329.521393] do_vfs_ioctl+0xd5f/0x1380 [ 329.525357] ? selinux_file_ioctl+0x46f/0x5e0 [ 329.529851] ? selinux_file_ioctl+0x125/0x5e0 [ 329.534360] ? ioctl_preallocate+0x210/0x210 [ 329.538755] ? selinux_file_mprotect+0x620/0x620 [ 329.543504] ? iterate_fd+0x360/0x360 [ 329.547324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 329.552072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 329.557595] ? security_file_ioctl+0x8d/0xc0 [ 329.561991] ksys_ioctl+0xab/0xd0 [ 329.565435] __x64_sys_ioctl+0x73/0xb0 [ 329.569312] do_syscall_64+0xfd/0x620 [ 329.573105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 329.578294] RIP: 0033:0x459a29 [ 329.581474] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.600362] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.608061] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 07:02:44 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) r3 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r3, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) sendfile(r3, r0, 0x0, 0x8010) [ 329.615318] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 329.622582] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 329.629840] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 329.637097] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 329.650343] input: syz1 as /devices/virtual/input/input807 07:02:44 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$IOC_PR_REGISTER(r5, 0x401870c8, &(0x7f0000000200)={0x5, 0x4}) 07:02:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, 0x45c) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000380)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) io_setup(0x8, &(0x7f0000000200)=0x0) io_submit(r2, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000, 0x3f00}]) [ 329.892466] FAULT_INJECTION: forcing a failure. [ 329.892466] name failslab, interval 1, probability 0, space 0, times 0 [ 329.951878] CPU: 0 PID: 12458 Comm: syz-executor.3 Not tainted 4.19.76 #0 [ 329.958850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.968215] Call Trace: [ 329.970818] dump_stack+0x172/0x1f0 [ 329.974463] should_fail.cold+0xa/0x1b [ 329.978369] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 329.983498] __should_failslab+0x121/0x190 [ 329.987744] should_failslab+0x9/0x14 [ 329.991556] kmem_cache_alloc+0x2ae/0x700 [ 329.995712] ? lock_downgrade+0x880/0x880 [ 329.999870] __kernfs_new_node+0xef/0x680 [ 330.004030] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 330.008799] ? wait_for_completion+0x440/0x440 [ 330.013397] ? mutex_unlock+0xd/0x10 [ 330.017119] ? kernfs_activate+0x192/0x1f0 [ 330.021362] kernfs_new_node+0x99/0x130 [ 330.021385] __kernfs_create_file+0x51/0x33b [ 330.021407] sysfs_add_file_mode_ns+0x222/0x560 [ 330.034438] internal_create_group+0x383/0xc30 [ 330.034468] ? remove_files.isra.0+0x190/0x190 [ 330.043627] sysfs_create_groups+0x9b/0x141 [ 330.047967] device_add+0x8d8/0x1760 [ 330.051692] ? get_device_parent.isra.0+0x570/0x570 [ 330.056716] ? input_register_device+0x549/0xc30 [ 330.056735] input_register_device+0x6d2/0xc30 [ 330.056759] uinput_ioctl_handler.isra.0+0x1035/0x1c50 [ 330.056778] ? uinput_request_submit.part.0+0x2d0/0x2d0 [ 330.071366] ? retint_kernel+0x2d/0x2d [ 330.071398] ? __fget+0x340/0x540 [ 330.071427] uinput_ioctl+0x4a/0x60 [ 330.071445] ? uinput_compat_ioctl+0xb0/0xb0 [ 330.080684] do_vfs_ioctl+0xd5f/0x1380 [ 330.096020] ? selinux_file_ioctl+0x46f/0x5e0 [ 330.096403] input: syz1 as /devices/virtual/input/input814 [ 330.100516] ? selinux_file_ioctl+0x125/0x5e0 [ 330.100535] ? ioctl_preallocate+0x210/0x210 [ 330.100549] ? selinux_file_mprotect+0x620/0x620 [ 330.100571] ? iterate_fd+0x360/0x360 [ 330.100586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 330.100603] ? fput+0x128/0x1a0 [ 330.119869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 330.119885] ? security_file_ioctl+0x8d/0xc0 [ 330.119905] ksys_ioctl+0xab/0xd0 [ 330.119923] __x64_sys_ioctl+0x73/0xb0 [ 330.119943] do_syscall_64+0xfd/0x620 [ 330.132553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 330.132566] RIP: 0033:0x459a29 [ 330.132580] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.132591] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 [ 330.145957] ORIG_RAX: 0000000000000010 [ 330.190205] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 07:02:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$selinux_context(0xffffffffffffffff, &(0x7f0000000000)='system_u:object_r:modules_dep_t:s0\x00', 0x23) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 330.197494] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 330.204782] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 330.212067] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 330.219349] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 330.237143] input: syz1 as /devices/virtual/input/input815 07:02:44 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$inet6(0xa, 0x7, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x4000000000000002, &(0x7f00000000c0)=0x102, 0x4) listen(r1, 0x0) 07:02:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r1, 0x800443d3, &(0x7f0000000000)={{0x4, 0x3, 0x20, 0x5, 0x1, 0x69}, 0x1, 0x6a, 0xad3}) [ 330.364998] input: syz1 as /devices/virtual/input/input816 [ 330.391779] input: syz1 as /devices/virtual/input/input817 07:02:44 executing program 3 (fault-call:7 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 330.494971] input: syz1 as /devices/virtual/input/input818 07:02:44 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 330.545476] input: syz1 as /devices/virtual/input/input819 07:02:45 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f00000033c0)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x18}]}, &(0x7f00000003c0)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffe9f, 0x10, &(0x7f0000000000), 0xfffffddf}, 0x48) [ 330.630406] input: syz1 as /devices/virtual/input/input820 [ 330.651420] input: syz1 as /devices/virtual/input/input822 07:02:45 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x17, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.969444] RSP: 002b:00007f4c2f047c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 07:02:45 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000dc0)='./file0\x00', &(0x7f0000000180)='cgroup2\x00\x05\x8b\\\x01\x8fP\xbd\xf1d\\h\xe2l\xad\x8f\x1e\xb7`\xda\xf2#\xb4\xd6#\xae\x1e\t\tB/\x04+a\x14\xe8\x82\aDKY\xbb\x0e\x0e\xe1=\xe7\x838V\xba\xb9\xe4\x05\x81\x8aO\x14P\x87\xf3\x01\x1c\xf3Z\x8cY\xc5m\x8e0\xa4U\xa5\x029\xc6\x8cb\xef\xe9z(\x19D\xa8\xc0\xc0j&\xfc\xd2W\xear\x8e\'\xe2\xc9e\xcdq\x89\x18U5\x0f\x84Q\xb4\xc5\x90Z\xcd\xb38\xbd\x9f\rag\x04\x04!GT\xd7\x0f\xfd\xe6\x9c\xac\x88X\x17U\xebE\x83\x04\xd7', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) [ 331.025181] RAX: ffffffffffffffda RBX: 00007f4c2f047c90 RCX: 0000000000459a29 [ 331.032466] RDX: 0000000000000000 RSI: 0000000000005501 RDI: 0000000000000004 [ 331.039748] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 331.047027] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c2f0486d4 [ 331.054309] R13: 00000000004c47b7 R14: 00000000004d8f80 R15: 0000000000000005 [ 331.114122] input: syz1 as /devices/virtual/input/input824 07:02:45 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$VHOST_SET_VRING_ERR(r2, 0x4008af22, &(0x7f00000000c0)={0x0, r3}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:45 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000000)) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) socket$isdn(0x22, 0x3, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) write$uinput_user_dev(r1, &(0x7f0000000880)={'syz0\x00', {0x3, 0x200, 0x9, 0xb38e}, 0x1c, [0x64, 0xca, 0x1, 0x1, 0x80000001, 0x401, 0xfffffffb, 0x8, 0x8001, 0xff, 0xf, 0x40, 0x9, 0x0, 0x3, 0x5, 0x5, 0x9, 0x1, 0x77, 0x79b, 0x4, 0x1f, 0x6b, 0x8001, 0xcd2, 0x0, 0x1000, 0x7, 0x18d0, 0x80000001, 0x1, 0xbd, 0x5, 0x101, 0x2, 0x4, 0x3, 0x400, 0xa, 0x61, 0x9, 0x8, 0x2, 0x81, 0xe18, 0x1f, 0x5, 0x81, 0x5, 0x0, 0x5, 0xd2d9, 0x1, 0x8, 0x1ff, 0x861, 0x3, 0x5, 0x8, 0x2, 0x2, 0x12, 0x4], [0x5, 0x7fffffff, 0x0, 0x0, 0x6, 0x2, 0xfffffffa, 0x80000000, 0x8c, 0x4, 0x7, 0x7, 0x3fd5, 0x4eb, 0x8001, 0x8, 0x2, 0x2, 0x7fff, 0x2, 0xad, 0x6, 0x2, 0x7, 0x200, 0x9, 0x5, 0x0, 0x1, 0x904, 0x200, 0x0, 0x4, 0xfffffff7, 0x0, 0xc, 0x4, 0x5, 0x0, 0x97ca, 0x0, 0x7, 0x1, 0x7f, 0x9, 0x101, 0xc2f2, 0x101, 0x5b57ea4c, 0x0, 0x5a, 0x400, 0x5, 0x7fffffff, 0x0, 0xfff, 0x9, 0x9, 0x3, 0x2c0f, 0xffff966b, 0xa94c, 0x7fffffff, 0x2], [0x9, 0x4, 0x0, 0x7fffffff, 0x80000001, 0x8, 0x6, 0x3ff, 0xffff, 0xfffff641, 0x1f, 0xa3d2, 0x200, 0x0, 0x8, 0x8c00, 0x20, 0x5, 0x9943, 0xb4a, 0x9650, 0x6, 0x7, 0x0, 0x6, 0x8001, 0xfffffff9, 0x3, 0x8, 0x2, 0x6, 0xff, 0x6, 0x3ff, 0x80000000, 0x107, 0x9, 0x8001, 0x0, 0x7fff, 0x4, 0x7, 0x4, 0x4, 0x9bfadaa7, 0x7, 0x10000, 0x7f, 0x6, 0xffff, 0xd57b, 0x800, 0x2, 0x3, 0x1, 0x401, 0x9, 0x6, 0x0, 0x3, 0x0, 0x1, 0x3, 0x9], [0xa5, 0x8c, 0x100, 0x0, 0x5, 0x3, 0x4, 0x2, 0x64, 0x2, 0x0, 0x2, 0x1f, 0x0, 0x2, 0x80, 0xa8e7, 0x200, 0xe2, 0x1, 0x8ab, 0x1, 0xa1, 0x724, 0x401, 0xd896, 0x3, 0x7fffffff, 0x7fffffff, 0x7, 0x4, 0x9, 0xfffff000, 0x2, 0x1ff, 0xbf, 0x9, 0x7, 0x9c4b, 0x10001, 0x74e, 0xfff, 0x4, 0x401, 0xc62f, 0x7, 0xffffff00, 0xda29, 0x3, 0x8d3, 0x7, 0x3, 0x4, 0xffffffe0, 0x3, 0x2, 0x3fd, 0x9, 0x672, 0x0, 0x1000, 0x9, 0x81, 0x16]}, 0x45c) r2 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700a400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000280012000c00010076657468000000ee170002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000002400070507cc1810b5b9b2e3a2c12b00", @ANYRES32=r7, @ANYBLOB="00000000f1ffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002e00070500"/20, @ANYRES32=r7, @ANYBLOB="0000ffff0000ffff00000085e6000100677265640000000004000200"], 0x34}}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$nl_route(r10, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700a400"/20, @ANYRES32=r12, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x48}}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="480000002400070507cc1810b5b9b2e3a2c12b00", @ANYRES32=r12, @ANYBLOB="00000000f1ffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="340000002e00070500"/20, @ANYRES32=r12, @ANYBLOB="0000ffff0000ffff00000085e6000100677265640000000004000200"], 0x34}}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000e80)=0x14) r14 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r14, 0x0) epoll_ctl$EPOLL_CTL_ADD(r14, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) getsockname$packet(r14, &(0x7f0000002100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002140)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000002440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002400)={&(0x7f0000002180)={0x250, r2, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [{{0x8, 0x1, r7}, {0x1b4, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r12}}}, {0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x2, 0x3, 0x0, 0x1}, {0x0, 0x1, 0x0, 0xf82}, {0x3, 0x0, 0x3f, 0x6}, {0x0, 0x40, 0x81, 0x8}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x80000001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @mcast_rejoin_count={{0xffffffffffffff49, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x80000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r13}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}]}}]}, 0x250}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) fdatasync(r0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r16 = socket$inet_tcp(0x2, 0x1, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) setsockopt$inet_mreqn(r16, 0x0, 0x23, &(0x7f00000001c0)={@rand_addr=0x96, @loopback, r17}, 0xc) [ 331.384087] input: syz1 as /devices/virtual/input/input828 [ 331.443230] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.478282] input: syz1 as /devices/virtual/input/input830 07:02:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) utime(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0xc7, 0x401}) [ 331.546102] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.626922] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.645450] input: syz1 as /devices/virtual/input/input831 [ 331.664510] input: syz1 as /devices/virtual/input/input829 07:02:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) getsockopt$bt_sco_SCO_CONNINFO(r1, 0x11, 0x2, &(0x7f0000000880)=""/239, &(0x7f0000000380)=0xef) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000000)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r3, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000300)={&(0x7f00000001c0)=@expire={0x10c, 0x18, 0x20, 0x70bd25, 0x25dfdbfc, {{{@in6=@dev={0xfe, 0x80, [], 0x16}, @in6=@dev={0xfe, 0x80, [], 0x10}, 0x4e21, 0x0, 0x4e24, 0x1000, 0xa, 0x20, 0x80, 0x67, 0x0, r4}, {@in6=@ipv4={[], [], @rand_addr=0x1000}, 0x4d6}, @in6=@rand_addr="b2f6beb32ec77ca1ae80807b8cf0688a", {0x5, 0x4, 0xd0, 0x401, 0x2, 0xfffffffffffffffb, 0x80000000, 0x1}, {0x4, 0x7fff, 0x2, 0x4}, {0x401, 0x1, 0x2}, 0x70bd2c, 0x3503, 0x2, 0x3, 0x8, 0x2}, 0x4}, [@coaddr={0x14, 0xe, @in=@broadcast}]}, 0x10c}, 0x1, 0x0, 0x0, 0x10000}, 0x800) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x3], [0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 331.734869] netlink: 19 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.766938] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.807161] input: syz1 as /devices/virtual/input/input833 [ 331.828085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=12553 comm=syz-executor.4 [ 331.846485] input: syz1 as /devices/virtual/input/input835 [ 331.852974] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 331.864220] input: syz1 as /devices/virtual/input/input836 [ 331.885659] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 07:02:46 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x400003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, 0x45c) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x1f, 0x555480) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4102, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, &(0x7f0000000040), &(0x7f00000000c0)=0x8) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_END_FF_ERASE(0xffffffffffffffff, 0x400c55cb, &(0x7f0000000100)={0xa, 0x10001, 0x3ff}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:46 executing program 5: symlink(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x80000000b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}, 0x0, 0xffffffffb5a6d2c4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(0xffffffffffffffff, 0xae44, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000400)={0x0, 0x3}) wait4(0x0, 0x0, 0x80000000, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) move_pages(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) r0 = getpid() tkill(r0, 0x9) socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000006c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') r2 = open(0x0, 0x8040, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000000)={0x3, 0x3, 0xf997, 0xceec244afac69e49}) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000200000000002e00"], &(0x7f0000000280)=""/237, 0x37, 0xed, 0x1}, 0x20) socket(0x10, 0x0, 0x0) [ 331.942674] input: syz1 as /devices/virtual/input/input834 07:02:46 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 332.033529] input: syz1 as /devices/virtual/input/input837 [ 332.060302] input: syz1 as /devices/virtual/input/input838 07:02:46 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) r1 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xffffffff, 0x121180) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000100)={0x1, 0x0, 0x102, 0x2, {0x7fffffff, 0x2a07, 0xfffffffe, 0xffff}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x405c5503, &(0x7f0000000000)={{0x2, 0x400, 0x1, 0x7}, 'syz0\x00', 0x3d}) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:46 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) inotify_init1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) socket$inet6(0xa, 0x3, 0x84) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xe042}, 0x44600, 0x0, 0x0, 0x3a5dfc35110c8002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) socket$inet6(0xa, 0x0, 0x0) socket$inet6(0xa, 0x400000000001, 0x0) socket$bt_rfcomm(0x1f, 0x0, 0x3) syz_genetlink_get_family_id$team(0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(0xffffffffffffffff, &(0x7f0000000500)=@generic={0x1f, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040), &(0x7f00000001c0)=0x14) accept$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000002c0)=0x202, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@mcast2, 0x50}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @multicast2}, 0x0) r2 = socket$inet(0x2, 0x0, 0x0) getsockopt$inet_opts(r2, 0x0, 0x200000000000004, 0x0, &(0x7f0000000000)) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001800)={{{@in6=@dev, @in6=@loopback}}, {{}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) socket$inet6(0xa, 0x3, 0x3a) getsockname$packet(0xffffffffffffffff, &(0x7f0000001940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000019c0)={'team0\x00'}) [ 332.102982] input: syz1 as /devices/virtual/input/input839 07:02:46 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x16) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f00000000c0)={0x2, 0x8, 0x9, 0x3, 0x82}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r2, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GET_UNIQUE(r3, 0xc0106401, &(0x7f0000000280)={0xc5, &(0x7f0000000180)=""/197}) perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x5, 0x1, 0x4, 0x3, 0x0, 0x3, 0x20000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x572faef2ad56ee5, @perf_config_ext={0x46, 0x81}, 0x800, 0x6, 0x0, 0x2, 0x400, 0x6, 0x6cf}, r1, 0x10, r1, 0x4) 07:02:46 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b51735"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} audit_backlog_limit=64 [ 332.588055] audit: audit_backlog=65 > audit_backlog_limit=64 [ 332.595870] audit: audit_lost=77 audit_rate_limit=0 audit_backlog_limit=64 [ 332.609700] audit: audit_backlog=65 > audit_backlog_limit=64 [ 332.626970] audit: backlog limit exceeded [ 332.627699] audit: audit_backlog=65 > audit_backlog_limit=64 [ 332.633499] audit: audit_lost=78 audit_rate_limit=0 audit_backlog_limit=64 [ 332.648754] audit: audit_lost=79 audit_rate_limit=0 audit_backlog_limit=64 [ 332.677026] input: syz1 as /devices/virtual/input/input850 07:02:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x541b, 0x0) 07:02:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0xc07, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:47 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b51735"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} HID v0.00 Device [syz0] on syz1 07:02:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5450, 0x0) [ 333.125909] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.151279] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 07:02:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 333.171834] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.186884] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 07:02:47 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='mem\x00\x00\x00\x00\x00\x00\a\x13', 0x275a, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, &(0x7f0000000100)={0xc0000002}) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000000)={0xc, 0x8, 0xfa00, {&(0x7f00000000c0)}}, 0x10) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 333.221576] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.236299] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.252229] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 07:02:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5451, 0x0) [ 333.276226] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.288126] input: syz1 as /devices/virtual/input/input865 [ 333.310842] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 07:02:47 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {0x8}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x593]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$VT_RELDISP(r1, 0x5605) getrusage(0x1, &(0x7f00000000c0)) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 333.343074] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.362378] hid-generic 0000:0000:0000.000C: unknown main item tag 0x0 [ 333.386048] input: syz1 as /devices/virtual/input/input866 [ 333.414780] hid-generic 0000:0000:0000.000C: hidraw0: HID v0.00 Device [syz0] on syz1 07:02:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5452, 0x0) 07:02:47 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$can_raw(0xffffffffffffffff, 0x0, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x400000002, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000080)=""/11, 0xb}, 0x120) dup2(0xffffffffffffffff, 0xffffffffffffffff) 07:02:47 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x4, 0xf436fb9504f35dcb) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x0, 0x5, [@broadcast, @broadcast, @remote, @random="1c54cb1f4e14", @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}]}) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 333.480904] QAT: Invalid ioctl [ 333.493361] input: syz1 as /devices/virtual/input/input871 [ 333.557541] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.584743] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 07:02:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) [ 333.617741] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.630275] input: syz1 as /devices/virtual/input/input875 [ 333.642143] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.662646] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.678937] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.688682] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.703516] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.713780] input: syz1 as /devices/virtual/input/input876 [ 333.714933] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.735267] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.735366] QAT: Invalid ioctl [ 333.746963] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 333.762976] input: syz1 as /devices/virtual/input/input877 [ 333.778274] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz0] on syz1 07:02:48 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000002fc0)=0xe8) setsockopt$packet_drop_memb(r2, 0x107, 0x2, &(0x7f0000003000)={r3, 0x1, 0x6, @dev={[], 0xff}}, 0x10) openat$misdntimer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/mISDNtimer\x00', 0x300, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r1, &(0x7f0000000640)="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", 0x10b, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0x1da9, 0x4) sendto$inet(r1, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, 0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0x7, &(0x7f0000000340)={0x2, 0x2, 0x725c, 0xa40}, 0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000000)={r4, @in={{0x2, 0x0, @remote}}}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r4, @in6={{0xa, 0x4e22, 0x99, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x7}}, 0x1, 0x20, 0x1804, 0x7, 0x80}, &(0x7f0000000000)=0x98) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) 07:02:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5460, 0x0) 07:02:48 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r2, 0xc100565c, &(0x7f0000000000)={0x0, 0xfffffffffffffffa, 0x4, {0x2, @raw_data="f79dd9524c61a7945790ca039664a46fa42cebdb98d059820d5a05496951095404dc369b487724b2cff745d5d908c9f0ea97b24954fbbd2f2ec1168573f130109611459c0df2733e93be33680e0e1fa26ffc8b668ecb501a181f33f5f0ee6b24d43cac905e9d1d35204a1084bd03ee2a4976b814f77784ab1a762ea8ed910b2b9dd87991ab05725ba663e0e4e37f7583203f4e144fdce1d512a0a3a0c2f611c52f4a9f9fc5f87d3258c77dd06c829e577151783ee64c56779e260d180578c6980e0d09c002f75222"}}) ioctl$VIDIOC_S_FMT(r2, 0x40045612, &(0x7f00000001c0)={0x2}) close(r2) 07:02:48 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20]}, 0x45c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000100)=0x9a2, 0x4) fsync(r1) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) timer_gettime(0x0, &(0x7f00000000c0)) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r3 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r3, 0x116, 0x7f, &(0x7f0000000840), 0x4) r4 = fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) ioctl$VIDIOC_S_CROP(r4, 0x4014563c, &(0x7f0000000140)={0x12, {0x4, 0x1, 0x1, 0x3}}) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000000)=0x2) 07:02:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5502, 0x0) [ 333.941376] ================================================================== [ 333.949128] BUG: KASAN: use-after-free in v4l2_ctrl_grab+0x159/0x160 [ 333.955644] Read of size 8 at addr ffff8880822b8860 by task syz-executor.5/12702 [ 333.963185] [ 333.964830] CPU: 1 PID: 12702 Comm: syz-executor.5 Not tainted 4.19.76 #0 [ 333.971761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.981122] Call Trace: [ 333.983723] dump_stack+0x172/0x1f0 [ 333.987367] ? v4l2_ctrl_grab+0x159/0x160 [ 333.991533] print_address_description.cold+0x7c/0x20d [ 333.996828] ? v4l2_ctrl_grab+0x159/0x160 [ 334.000995] kasan_report.cold+0x8c/0x2ba [ 334.001078] ? vidioc_querycap+0x110/0x110 [ 334.001095] __asan_report_load8_noabort+0x14/0x20 [ 334.001112] v4l2_ctrl_grab+0x159/0x160 [ 334.014433] ? vidioc_querycap+0x110/0x110 [ 334.022614] vicodec_stop_streaming+0x158/0x1a0 [ 334.022625] ? vicodec_return_bufs+0x220/0x220 [ 334.022705] __vb2_queue_cancel+0xb1/0x790 [ 334.022727] ? vidioc_querycap+0x110/0x110 07:02:48 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc} 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.111693] RSP: 002b:00007f2bf67dbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 334.111707] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459a29 [ 334.111715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 334.111721] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 334.111729] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bf67dc6d4 [ 334.111737] R13: 00000000004f9972 R14: 00000000004d20e0 R15: 00000000ffffffff [ 334.111758] [ 334.111766] Allocated by task 12702: [ 334.111785] save_stack+0x45/0xd0 [ 334.111797] kasan_kmalloc+0xce/0xf0 [ 334.111807] __kmalloc_node+0x51/0x80 [ 334.111819] kvmalloc_node+0x68/0x100 [ 334.111833] v4l2_ctrl_new.part.0+0x214/0x1450 [ 334.111844] v4l2_ctrl_new_std+0x22d/0x360 [ 334.111855] vicodec_open+0x1a8/0xb30 [ 334.111867] v4l2_open+0x1b2/0x360 [ 334.111878] chrdev_open+0x245/0x6b0 [ 334.111889] do_dentry_open+0x4c3/0x1210 [ 334.111899] vfs_open+0xa0/0xd0 [ 334.111913] path_openat+0x10d7/0x45e0 [ 334.111923] do_filp_open+0x1a1/0x280 [ 334.111934] do_sys_open+0x3fe/0x550 [ 334.111945] __x64_sys_openat+0x9d/0x100 [ 334.111960] do_syscall_64+0xfd/0x620 [ 334.111974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.111978] [ 334.111983] Freed by task 12702: [ 334.111998] save_stack+0x45/0xd0 [ 334.123320] input: syz1 as /devices/virtual/input/input879 [ 334.126976] __kasan_slab_free+0x102/0x150 [ 334.126988] kasan_slab_free+0xe/0x10 [ 334.127002] kfree+0xcf/0x220 [ 334.192178] kvfree+0x61/0x70 [ 334.192194] v4l2_ctrl_handler_free+0x4a8/0x7e0 [ 334.192212] vicodec_release+0x6b/0x120 [ 334.192225] v4l2_release+0xf9/0x1a0 [ 334.192245] __fput+0x2dd/0x8b0 [ 334.199996] ____fput+0x16/0x20 [ 334.200010] task_work_run+0x145/0x1c0 [ 334.200025] exit_to_usermode_loop+0x273/0x2c0 [ 334.200039] do_syscall_64+0x53d/0x620 [ 334.200055] entry_SYSCALL_64_after_hwframe+0x49/0xbe 07:02:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x805, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xf7) ioctl$UI_DEV_SETUP(r0, 0x5525, 0x0) 07:02:48 executing program 0: sendmsg(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet(0x10, 0x0, 0x6) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, 0x0, 0x4000000) keyctl$read(0xb, 0x0, &(0x7f00000002c0)=""/112, 0xd7) r3 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x18, &(0x7f00000004c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07023506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffad43010000000000950000000000000005000000000000009500000000000000d05bd98c13cc1709ab91e0b9e1e603f862b5173514"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) add_key$user(0x0, &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)="2f5ec03da5f505352711bef6f94ca2bce56b", 0x12, 0xfffffffffffffff9) exit(0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000050c0), 0x0, 0x0, &(0x7f0000005240)={0x0, 0x989680}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x10, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0), &(0x7f0000000300)=0xc) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr$security_selinux(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f00000006c0)='security.selinux\x00', &(0x7f0000000700)='system_u:object_r:cpu_device_t:s0\x00', 0x22, 0x0) mount(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000380)='sysfs\x00*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9bN\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\xad\"\xe8U0%\xa2\xe8\xbe\v\xc5QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5BB5CZ=\xbbv\xbc}ffff8880822b8800: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 334.200192] ^ [ 334.200203] ffff8880822b8880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 334.200218] ffff8880822b8900: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 334.200226] ================================================================== [ 334.234692] kobject: 'input883' (000000007bf4d439): kobject_cleanup, parent (null) [ 334.236268] Disabling lock debugging due to kernel taint [ 334.253512] kobject: 'input884' (00000000a7f4af50): kobject_add_internal: parent: 'input', set: 'devices' [ 334.272120] kobject: 'input883' (000000007bf4d439): calling ktype release [ 334.275276] kobject: 'event4' (0000000019993f1a): kobject_cleanup, parent (null) [ 334.275287] kobject: 'event4' (0000000019993f1a): calling ktype release [ 334.281834] kobject: 'input883': free name [ 334.284284] kobject: 'event4': free name [ 334.345105] kobject: 'input885' (000000004da84517): kobject_cleanup, parent (null) [ 334.354004] kobject: 'input884' (00000000a7f4af50): kobject_uevent_env [ 334.358569] kobject: 'input885' (000000004da84517): calling ktype release [ 334.360115] kobject: 'input884' (00000000a7f4af50): fill_kobj_path: path = '/devices/virtual/input/input884' [ 334.367758] kobject: 'input885': free name [ 334.372592] kobject: 'input876' (0000000061572614): kobject_uevent_env [ 334.379745] kobject: 'event4' (00000000387d88d2): kobject_add_internal: parent: 'input879', set: 'devices' [ 334.390932] kobject: 'input884' (00000000a7f4af50): fill_kobj_path: path = '/devices/virtual/input/input884' [ 334.396870] Kernel panic - not syncing: panic_on_warn set ... [ 334.396870] [ 334.404937] kobject: 'input876' (0000000061572614): fill_kobj_path: path = '/devices/virtual/input/input876' [ 334.408226] CPU: 0 PID: 12702 Comm: syz-executor.5 Tainted: G B 4.19.76 #0 [ 334.408234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.408243] Call Trace: [ 334.419832] kobject: 'input876' (0000000061572614): kobject_cleanup, parent (null) [ 334.424159] dump_stack+0x172/0x1f0 [ 334.424179] ? v4l2_ctrl_grab+0x159/0x160 [ 334.429675] kobject: 'input876' (0000000061572614): calling ktype release [ 334.439354] panic+0x263/0x507 [ 334.439369] ? __warn_printk+0xf3/0xf3 [ 334.446644] input: syz1 as /devices/virtual/input/input884 [ 334.454665] ? v4l2_ctrl_grab+0x159/0x160 [ 334.454681] ? preempt_schedule+0x4b/0x60 [ 334.454703] ? ___preempt_schedule+0x16/0x18 [ 334.461708] kobject: 'input876': free name [ 334.465665] ? trace_hardirqs_on+0x5e/0x220 [ 334.465682] ? v4l2_ctrl_grab+0x159/0x160 [ 334.470348] kobject: 'input886' (00000000bdebb925): kobject_add_internal: parent: 'input', set: 'devices' [ 334.478294] kasan_end_report+0x47/0x4f [ 334.478307] kasan_report.cold+0xa9/0x2ba [ 334.478324] ? vidioc_querycap+0x110/0x110 [ 334.485899] kobject: 'input886' (00000000bdebb925): kobject_uevent_env [ 334.491899] __asan_report_load8_noabort+0x14/0x20 [ 334.491913] v4l2_ctrl_grab+0x159/0x160 [ 334.491925] ? vidioc_querycap+0x110/0x110 [ 334.491935] vicodec_stop_streaming+0x158/0x1a0 [ 334.491951] ? vicodec_return_bufs+0x220/0x220 [ 334.502384] kobject: 'input886' (00000000bdebb925): fill_kobj_path: path = '/devices/virtual/input/input886' [ 334.506137] __vb2_queue_cancel+0xb1/0x790 [ 334.506155] ? vidioc_querycap+0x110/0x110 [ 334.516739] kobject: 'input886' (00000000bdebb925): fill_kobj_path: path = '/devices/virtual/input/input886' [ 334.522582] ? dev_debug_store+0x110/0x110 [ 334.522599] vb2_core_queue_release+0x28/0x80 [ 334.522612] vb2_queue_release+0x16/0x20 [ 334.522630] v4l2_m2m_ctx_release+0x2d/0x40 [ 334.536985] input: syz1 as /devices/virtual/input/input886 [ 334.539936] vicodec_release+0xc0/0x120 [ 334.539951] v4l2_release+0xf9/0x1a0 [ 334.539966] __fput+0x2dd/0x8b0 [ 334.539982] ____fput+0x16/0x20 [ 334.550482] kobject: 'input886' (00000000bdebb925): kobject_uevent_env [ 334.558237] task_work_run+0x145/0x1c0 [ 334.558259] exit_to_usermode_loop+0x273/0x2c0 [ 334.567884] kobject: 'input886' (00000000bdebb925): fill_kobj_path: path = '/devices/virtual/input/input886' [ 334.570164] do_syscall_64+0x53d/0x620 [ 334.570182] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 334.570195] RIP: 0033:0x459a29 [ 334.581159] kobject: 'input886' (00000000bdebb925): kobject_cleanup, parent (null) [ 334.582365] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.582377] RSP: 002b:00007f2bf67dbc78 EFLAGS: 00000246 [ 334.586533] kobject: 'input886' (00000000bdebb925): calling ktype release [ 334.593418] ORIG_RAX: 0000000000000003 [ 334.593426] RAX: 0000000000000000 RBX: 0000000000000001 RCX: 0000000000459a29 [ 334.593432] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 334.593439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 334.593445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2bf67dc6d4 [ 334.593453] R13: 00000000004f9972 R14: 00000000004d20e0 R15: 00000000ffffffff [ 334.598012] Kernel Offset: disabled [ 334.869340] Rebooting in 86400 seconds..