Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [ 39.082741] audit: type=1800 audit(1576179850.916:33): pid=7456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 39.107792] audit: type=1800 audit(1576179850.926:34): pid=7456 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 43.836705] audit: type=1400 audit(1576179855.676:35): avc: denied { map } for pid=7633 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.166' (ECDSA) to the list of known hosts. 2019/12/12 19:44:22 fuzzer started [ 50.575112] audit: type=1400 audit(1576179862.416:36): avc: denied { map } for pid=7642 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/12/12 19:44:24 dialing manager at 10.128.0.105:39515 2019/12/12 19:44:24 syscalls: 2684 2019/12/12 19:44:24 code coverage: enabled 2019/12/12 19:44:24 comparison tracing: enabled 2019/12/12 19:44:24 extra coverage: extra coverage is not supported by the kernel 2019/12/12 19:44:24 setuid sandbox: enabled 2019/12/12 19:44:24 namespace sandbox: enabled 2019/12/12 19:44:24 Android sandbox: /sys/fs/selinux/policy does not exist 2019/12/12 19:44:24 fault injection: enabled 2019/12/12 19:44:24 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/12/12 19:44:24 net packet injection: enabled 2019/12/12 19:44:24 net device setup: enabled 2019/12/12 19:44:24 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2019/12/12 19:44:24 devlink PCI setup: PCI device 0000:00:10.0 is not available 19:47:09 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f00000000c0)={0x3, 'veth1\x00', {0xfff}, 0x9}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0xffffffff, 0x2}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cachefiles\x00', 0x2280, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) ioctl$NBD_DO_IT(r1, 0xab03) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000a80)={0x6a}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0xaf) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) sync_file_range(r5, 0x5, 0xfffffffffffffd18, 0x1) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000b00)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) r6 = msgget(0x2, 0xa30) msgrcv(r6, &(0x7f0000000bc0)={0x0, ""/207}, 0xd7, 0x2, 0x6000) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000cc0)={0x2, [0x40, 0x7fff]}, &(0x7f0000000d00)=0x8) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/hwrng\x00', 0x100, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000dc0)={0x0, 0xfaca, 0x1, [0x7fff]}, &(0x7f0000000e00)=0xa) setsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000e40)={r9, 0xffff, 0x4, 0x3f, 0x40, 0x7}, 0x14) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/capi/capi20ncci\x00', 0x400, 0x0) setsockopt$RDS_GET_MR(r10, 0x114, 0x2, &(0x7f0000000f80)={{&(0x7f0000000ec0)=""/75, 0x4b}, &(0x7f0000000f40), 0x10}, 0x20) ioctl$FS_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000fc0)=0x5) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/user\x00', 0x2, 0x0) [ 217.844148] audit: type=1400 audit(1576180029.676:37): avc: denied { map } for pid=7661 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4281 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 217.935960] IPVS: ftp: loaded support on port[0] = 21 19:47:09 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000300)={0xf5, 0xfffffffffffffffd, 0xba, 0x4, @buffer={0x0, 0xa2, &(0x7f0000000040)=""/162}, &(0x7f0000000100)="304d4a85124e47752c61e34ada4d6cb07eb16d74364c0b4aa5a2febf9d23dcf0cf7243d0062ace9daf6ea7c766e4c4d85feef286d0312e540f027c386f8176f9f28520603ea748152d25e7b89107699315f6ad31c3f0a6faac4464f9115a2fff2ea3f71f5f585baf0a950019ee80544be44f13922779abcbb487c637dbdce71e49f94ead028e17a63ca44ea105c4a349881919f7ee0c8e1676f791efa486d520717dfcc6c473e812495844f90433c256847ca80f5b8e840224c5", &(0x7f00000001c0)=""/229, 0x0, 0x4, 0x0, &(0x7f00000002c0)}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000003c0)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000400)=r2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000440), 0x4) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f00000005c0)={'filter\x00', 0x0, 0x3, 0xff, [], 0x3, &(0x7f0000000480)=[{}, {}, {}], &(0x7f00000004c0)=""/255}, &(0x7f0000000640)=0x78) r3 = syz_open_dev$media(&(0x7f0000000680)='/dev/media#\x00', 0x8, 0xc000) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f00000006c0)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x0, 'lc\x00', 0x4, 0x3a67, 0x6}, 0x2c) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000700)) r4 = syz_open_dev$media(&(0x7f0000000780)='/dev/media#\x00', 0x101, 0x4032c0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000007c0)={&(0x7f0000000740)='./file0\x00', r4}, 0x10) ioctl$IOC_PR_CLEAR(r4, 0x401070cd, &(0x7f0000000800)={0x9}) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000840)=@usbdevfs_disconnect={0x3}) getsockopt$netrom_NETROM_IDLE(r3, 0x103, 0x7, &(0x7f0000000880)=0x1, &(0x7f00000008c0)=0x4) openat$md(0xffffffffffffff9c, &(0x7f0000000900)='/dev/md0\x00', 0x400201, 0x0) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000940)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f00000009c0)=@usbdevfs_driver={0x6, 0xffffffff, &(0x7f0000000980)="1434034c411f3d8f9224037d62dd9a5275b95b65931548a1eb207fa429ef2936ec34256f58"}) r6 = accept4$inet(r4, &(0x7f0000000a00)={0x2, 0x0, @multicast1}, &(0x7f0000000a40)=0x10, 0x81800) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x10, r6, 0x3cf14000) r7 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/bsg\x00', 0x200, 0x0) write$P9_RMKDIR(r7, &(0x7f0000000ac0)={0x14, 0x49, 0x2, {0x0, 0x3, 0x2}}, 0x14) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vcsu\x00', 0x2000, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r8, 0xc008551a, &(0x7f0000000b40)={0x8e3, 0x4, [0x840]}) pipe(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) renameat2(r1, &(0x7f0000000b80)='./file0\x00', r9, &(0x7f0000000c00)='./file0\x00', 0x0) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000c40)) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000c80)='/dev/nvme-fabrics\x00', 0x2a4000, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x2002}, 0xc, &(0x7f0000000d40)={&(0x7f0000000d00)={0x1c, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40120}, 0x44000) r10 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$RNDCLEARPOOL(r10, 0x5206, &(0x7f0000000e00)=0x10001) [ 218.035746] chnl_net:caif_netlink_parms(): no params data found [ 218.106953] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.124622] bridge0: port 1(bridge_slave_0) entered disabled state [ 218.144620] device bridge_slave_0 entered promiscuous mode [ 218.156380] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.162951] bridge0: port 2(bridge_slave_1) entered disabled state [ 218.184733] device bridge_slave_1 entered promiscuous mode [ 218.227697] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 218.238336] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 218.257752] IPVS: ftp: loaded support on port[0] = 21 19:47:10 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x2, 0x110) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000040)={0xeab, 0x20323159, 0x40, 0x5, 0x2, @discrete={0x85, 0x8}}) fsetxattr(r0, &(0x7f0000000080)=@known='user.syz\x00', &(0x7f00000000c0)='-eth1#securityvboxnet0mime_type\x00', 0x20, 0x1) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x800, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000140)={'security\x00', 0xa6, "4d19cc0770661c36425ca69c40db5c4e0a054737757502d9399e23538f022ccd9de7265282e1dabd6719cd8d000b4e171ddaf56c2713487553858e13b4a13e9569daa9f34fd00f4056a370ccceb22a14362ddc60c2e4262ae49a883c350d28fa4d60f322474dd53ffd7020a327ceb72169106fd4858485a2c1b4966fa8fbfab74ecab055fd78975d84156bfbf447715b208b24e46bd8333ddf16f7f745366b1da2a781d8ed2a"}, &(0x7f0000000240)=0xca) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcsu\x00', 0x10000, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000002c0)='/dev/vcs#\x00', 0xaf8, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000300)={0xa320, 0xc, 0x4, 0x40000000, {0x77359400}, {0x6c91dc401ed8e8c3, 0x1, 0x1, 0x3, 0x81, 0x9, "ab0227f5"}, 0xb0f2, 0x2, @fd=r3, 0x4}) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vcsu\x00', 0x200801, 0x0) getsockopt$inet_opts(r4, 0x0, 0x9, &(0x7f00000003c0)=""/9, &(0x7f0000000400)=0x9) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ppp\x00', 0x200000, 0x0) fsetxattr(r5, &(0x7f0000000480)=@known='trusted.overlay.upper\x00', &(0x7f00000004c0)='-eth1#securityvboxnet0mime_type\x00', 0x20, 0x3) r6 = accept4(r2, &(0x7f0000000500)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f0000000580)=0x80, 0x81000) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000005c0)={0x0, 0x6}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000640)={r8, 0x9}, 0x8) r9 = geteuid() ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f00000009c0)=0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000a00)=0x0) syz_mount_image$xfs(&(0x7f0000000680)='xfs\x00', &(0x7f00000006c0)='./file0\x00', 0x5, 0x5, &(0x7f0000000940)=[{&(0x7f0000000700)="150e58d519a0d595502fb6df664ddd5780c552907681d068ff7bbbb369bf039dcb4b9bbbce449ea7d4701ce504bc794e482d3e7e51e5767c6ff478bd280954b134d676e59493878d91fc8af583fd2f1242576becff1b90354db29c8908f4d01837bf1ecc1d65fba3f1dcbdee34514ec0e73fcdf57a854bf29122c93b75f1e7bc116c2d", 0x83}, {&(0x7f00000007c0)="4b096e3c92fc444c42507e6c0a75b3ea2959de12c9825765cb585492923cd6a253838d19c426378a4887798f796593e142a87fe2580026078189cc89f81031657f08de38c7add4da19593b865d600e1bf7d33e675fac8d0240b89e7d5fe0daa192ba5c141d5e58c096557eee1a8af23654f47c26854d7c698557f71d306d99f9a29a53e87867aef9a9e1114eaefd909d8faa01ae9bb2967d3673349d50888968", 0xa0, 0x7}, {&(0x7f0000000880)="8dff312a763f995f223acd3a013511accd43a979462ce7d78f7f9ca193e187ef14ed6ddddacaf2aa33a40ccd712770c37533af8f5e0ec94cec1226cec38699", 0x3f, 0x6}, {&(0x7f00000008c0)="be629bedad94d8889505087ebd5bb1bb8b3e8af14dfe98a10afa9c9e971ccbd68adf8f877071d8c4e664", 0x2a, 0x5}, {&(0x7f0000000900)='\f(G', 0x3, 0x100}], 0x210200, &(0x7f0000000a40)={[{@sunit={'sunit', 0x3d, 0x1}}, {@inode32='inode32'}, {@nogrpid='nogrpid'}], [{@euid_eq={'euid', 0x3d, r9}}, {@uid_gt={'uid>', r10}}, {@measure='measure'}, {@func={'func', 0x3d, 'FIRMWARE_CHECK'}}, {@uid_gt={'uid>', r11}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vcsu\x00'}}, {@appraise_type='appraise_type=imasig'}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r3, 0x80045400, &(0x7f0000000b40)) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000b80)) r12 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$FS_IOC_MEASURE_VERITY(r12, 0xc0046686, &(0x7f0000000e80)={0x2, 0xe, "b36f1a2261120b5aaac8a8361505"}) timer_create(0x4, &(0x7f0000000ec0)={0x0, 0x2f, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000f00)=0x0) clock_gettime(0x0, &(0x7f0000000f40)={0x0, 0x0}) timer_settime(r13, 0x0, &(0x7f0000000f80)={{0x0, 0x1c9c380}, {r14, r15+30000000}}, 0x0) r16 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000fc0)='/dev/ubi_ctrl\x00', 0x111000, 0x0) r17 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001000)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r16, 0x400442c8, &(0x7f0000001040)={r17, 0x0, 0x2, "09114346f213291d92f379ab9926e62a1c78d4246d1d9fa6486d3c0fe233277b42bc983278bff6be765d1f1f04e94ef9c00bf557e025039c6226e48aaad85ba390c41c4bb0"}) r18 = syz_genetlink_get_family_id$nbd(&(0x7f0000001100)='nbd\x00') r19 = openat$vsock(0xffffffffffffff9c, &(0x7f0000002880)='/dev/vsock\x00', 0x200000, 0x0) r20 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000028c0)='/dev/hwrng\x00', 0x95cdccbb090206c0, 0x0) r21 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002900)='/dev/sequencer2\x00', 0x383140, 0x0) r22 = syz_open_procfs(0x0, &(0x7f0000002940)='net/ip6_tables_targets\x00') r23 = openat$zero(0xffffffffffffff9c, &(0x7f0000002980)='/dev/zero\x00', 0x22902, 0x0) sendmsg$NBD_CMD_CONNECT(r16, &(0x7f0000002a80)={&(0x7f00000010c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002a40)={&(0x7f00000029c0)={0x70, r18, 0x8657f0264a1deb45, 0x70bd2b, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8}, {0x8, 0x1, r19}, {0x8, 0x1, r20}, {0x8, 0x1, r17}, {0x8, 0x1, r21}, {0x8, 0x1, r22}, {0x8, 0x1, r6}, {0x8, 0x1, r23}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x401}]}, 0x70}, 0x1, 0x0, 0x0, 0x44000}, 0x0) [ 218.280722] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 218.290107] team0: Port device team_slave_0 added [ 218.317191] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 218.329796] team0: Port device team_slave_1 added [ 218.358366] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 218.383796] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready 19:47:10 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000240)=0xe8) r2 = geteuid() setresuid(r0, r1, r2) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000280)='/dev/video37\x00', 0x2, 0x0) syz_mount_image$ntfs(&(0x7f00000002c0)='ntfs\x00', &(0x7f0000000300)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000540)=[{&(0x7f0000000340)="ff79ffa29467193f5d5dca0ff9d7f5884aa640bcb3d2cb477198c14ef4895a7a1ce4575cfaae49ba64ccb9baeb1917bed5cfc043fc94d4b2c563f3ec62f3bd29f1814776c79adf6065b228fdf8d1d4a60e771cb82cbac3d6ad85ed211b9ac4ce0cc1987007445b644fa98d67c21dba5351235ec6a28b400496daa8c1fccad110c7412da0e986f4b2dfecd5541bacc30d73af8da0c597eabf757b27d783271fdd63a55725d8da19f65ce67304e859593790a4dbad29f011bbc810fcd4a9e0b502c0773cb8949fefd4a54a9d597ec6c97c42d3fac45f2da20647bb494c4cb607", 0xdf, 0x1000}, {&(0x7f0000000440)="20f7a79baf9680b32bb49118d6ffe1f18d8ad5e2b16f773770d3f44dd1d274818735d98d5ec3f3b938689d88ae84a1c1925b2d1bb87ef4ad152afe7667bf139a2e93162acc42dc055b735a59e79e34ba138526b86c8ba8b2fa6b572913ce0c0011ea1e5724015c48c34edcbcba7c80a3b6978439a3510ebde89517422b3b880a8a061440f5af96a6e0f3988cdd9180e809651476a76630fb3ff15196bcc758172226416c9a8f28b68cf788812a77ac28fc69f7bd8723d3a47cd929768417f99bc2ce792dd3ec7ac1274d61f905cda3a00a89ee49348c83920e005c32ea25abc20c46546a6f941a3329920743", 0xec, 0xffffffff}], 0x1000008, &(0x7f0000000580)={[{@utf8='utf8'}], [{@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@audit='audit'}, {@subj_type={'subj_type'}}, {@dont_measure='dont_measure'}]}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000600), &(0x7f0000000640)=0xc) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000680)=0x2) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/ubi_ctrl\x00', 0x40000, 0x0) ioctl$EVIOCSREP(r4, 0x40084503, &(0x7f0000000700)=[0x1, 0x50b]) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ttyS3\x00', 0x40600, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000780)) clone(0x1000000, &(0x7f00000007c0)="679e152bee7dc1ca9aabf9ddef4150e05bc2c2f07124d4bcdd0081a67d1099d959632852ca15f783f9a34b5408c94f29b28b374f923b264ce4b4c320ff8fbf2505cbff344d2a91791e7a1612a45f58b91a38d46d501c0ad712db2567f08e5bc9e11c9892553047eda621b0f094c898ba8782bfbd693d6131f34998f1b067efe0d4b66cc7ffbd2b29419cb407513540a5e1755732f0caba1196380fb8814bd056d58f6514d36e084a250c063cb708c61faa3ff5b57ec6936eeda6e54d653bf76ac8265bccc1e897ebf350f7d39cfac68671dc0efad5d5e27864bd5715d7c2101ee60f76f383eacd6548465a02b61bc69369665cab350f3a4413f218b7", &(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)="66a48f448431f937f14ca426ab0f996d3b9362fcc1f14352cf85863bb2340918c35f4b9ff5c5964f392e9c5ffc0547") ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) syz_open_dev$sndseq(&(0x7f0000000980)='/dev/snd/seq\x00', 0x0, 0x246000) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/vcsa\x00', 0x81, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r6, 0x4048ae9b, &(0x7f0000000a00)={0xb0001, 0x0, [0x2, 0x0, 0x5, 0xfffffffffffffffa, 0xfffffffffffff295, 0x81, 0x1, 0x7fff]}) r7 = socket$kcm(0x29, 0xa, 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r7, 0x8983, &(0x7f0000000a80)) r8 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/vcsu\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000b80)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000b40)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r8, &(0x7f0000000bc0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7, @local, 0x8}, {0xa, 0x4e24, 0x3, @mcast1, 0xffffffff}, r9, 0x7}}, 0x48) r10 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_AUDIO(r10, 0x80345621, &(0x7f0000000c80)) tee(0xffffffffffffffff, r10, 0x204380f8, 0xf) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000cc0)) openat$null(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/null\x00', 0x40, 0x0) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f0000000d40)) r11 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/nvram\x00', 0x500, 0x0) ioctl$DRM_IOCTL_CONTROL(r11, 0x40086414, &(0x7f0000000dc0)={0xdbd8580ffd4661e3, 0x10000}) [ 218.497530] device hsr_slave_0 entered promiscuous mode [ 218.556354] device hsr_slave_1 entered promiscuous mode [ 218.596301] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 218.603593] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 218.627189] IPVS: ftp: loaded support on port[0] = 21 19:47:10 executing program 4: ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000000)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) ioctl$VFIO_IOMMU_GET_INFO(r0, 0x3b70, &(0x7f0000000040)={0x10}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x19a93ba980e7421a, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000140)={0xf390000, 0x9, 0x4, [], &(0x7f0000000100)={0x9b090f, 0x80, [], @string=&(0x7f00000000c0)=0x9d}}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$P9_RAUTH(r2, &(0x7f00000001c0)={0x14, 0x67, 0x2, {0x1, 0x0, 0x8}}, 0x14) set_tid_address(&(0x7f0000000200)) rt_sigpending(&(0x7f0000000240), 0x8) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x10000, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x80000) write$P9_RSTAT(r4, &(0x7f0000000300)={0x86, 0x7d, 0x2, {0x0, 0x7f, 0xff, 0x5, {0x4dd92464708bea14, 0x3, 0x4}, 0x80000, 0x973d, 0x1, 0x80000000, 0x23, '/proc/sys/net/ipv4/vs/sync_retries\x00', 0x5, '@em0,', 0x23, '/proc/sys/net/ipv4/vs/sync_retries\x00', 0x1, '('}}, 0x86) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r5, 0x40086414, &(0x7f0000000400)={0x2, 0x20}) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000440)='/dev/nvram\x00', 0x125000, 0x0) ioctl$KVM_SET_CPUID(r6, 0x4008ae8a, &(0x7f0000000480)={0xa, 0x0, [{0x80000008, 0x10000, 0x7f, 0xef0f, 0x8}, {0x0, 0x1, 0x800, 0x21a1, 0xfffffe01}, {0x80000008, 0x800, 0x7, 0x1ff, 0x7}, {0x2000000f, 0x4, 0x7, 0x10001, 0xfffffff8}, {0x40000000, 0xb3, 0x100, 0x401, 0x101}, {0x40000000, 0x4b, 0x800, 0x7fffffff}, {0x80000001, 0x8001, 0x10000, 0x1f, 0x2}, {0xc0000000, 0x2, 0x1ff, 0x1ff, 0x3137}, {0x40000014, 0x81, 0xfffffffe, 0x6, 0xb0}, {0x40000001, 0xffffffff, 0xfffffffd, 0x2}]}) ioctl$KVM_SET_MSRS(r3, 0x4008ae89, &(0x7f0000000580)={0x3, 0x0, [{0x924, 0x0, 0x1}, {0xe23, 0x0, 0x9}, {0xf72, 0x0, 0x6}]}) r7 = openat$autofs(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/autofs\x00', 0x44000, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r7, 0x0, 0x81, &(0x7f0000000680)={'broute\x00', 0x0, 0x0, 0x0, [], 0x4, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}]}, 0xb8) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r8, 0xc008551a, &(0x7f0000000780)={0x3, 0x10, [0x80, 0x142, 0x101, 0x100]}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, &(0x7f00000007c0)) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/net/pfkey\x00', 0x400240, 0x0) ioctl$KVM_DIRTY_TLB(r9, 0x4010aeaa, &(0x7f0000000940)={0x3, 0x800000}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000980)=0x2) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r10 = syz_open_dev$mouse(&(0x7f0000000b80)='/dev/input/mouse#\x00', 0xffffffff, 0x8000) setsockopt$RXRPC_MIN_SECURITY_LEVEL(r10, 0x110, 0x4, &(0x7f0000000bc0)=0x2, 0x4) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000c00)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TUNSETVNETLE(r11, 0x400454dc, &(0x7f0000000c40)=0x1) [ 218.664210] bridge0: port 2(bridge_slave_1) entered blocking state [ 218.670768] bridge0: port 2(bridge_slave_1) entered forwarding state [ 218.677788] bridge0: port 1(bridge_slave_0) entered blocking state [ 218.684163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 218.685982] IPVS: ftp: loaded support on port[0] = 21 [ 218.779438] chnl_net:caif_netlink_parms(): no params data found [ 218.870637] IPv6: ADDRCONF(NETDEV_UP): bond0: link is not ready [ 218.880060] 8021q: adding VLAN 0 to HW filter on device bond0 [ 218.945887] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 218.993329] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 219.001464] IPVS: ftp: loaded support on port[0] = 21 [ 219.002338] 8021q: adding VLAN 0 to HW filter on device team0 [ 219.026602] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 19:47:10 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100400) setsockopt$nfc_llcp_NFC_LLCP_RW(r0, 0x118, 0x0, &(0x7f0000000040)=0x6, 0x4) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$TIOCMBIS(r2, 0x5416, &(0x7f00000000c0)=0x7f) connect$nfc_llcp(0xffffffffffffffff, &(0x7f0000000100)={0x27, 0x1, 0x1, 0x2, 0x8, 0x6, "4a84aa74fb9062c9eeab3da7a48d8aa1f8dbb6112db04fe54720521a749963bebeb8fb7788b846e16cdce924e2ac127279f965e4fa1e4919c41551cf672a7c", 0xe}, 0x60) r3 = fcntl$getown(r2, 0x9) process_vm_readv(r3, &(0x7f0000000480)=[{&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/141, 0x8d}, {&(0x7f0000000300)=""/29, 0x1d}, {&(0x7f0000000340)=""/69, 0x45}, {&(0x7f00000003c0)=""/78, 0x4e}, {&(0x7f0000000440)=""/38, 0x26}], 0x6, &(0x7f00000008c0)=[{&(0x7f0000000500)=""/107, 0x6b}, {&(0x7f0000000580)=""/42, 0x2a}, {&(0x7f00000005c0)=""/188, 0xbc}, {&(0x7f0000000680)=""/88, 0x58}, {&(0x7f0000000700)=""/93, 0x5d}, {&(0x7f0000000780)=""/149, 0x95}, {&(0x7f0000000840)}, {&(0x7f0000000880)=""/14, 0xe}], 0x8, 0x0) prctl$PR_GET_NAME(0x10, &(0x7f0000000940)=""/160) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000a00)) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/vcs\x00', 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000a80)={{{@in=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000b80)=0xe8) ioctl$TUNSETOWNER(r4, 0x400454cc, r5) r6 = syz_open_dev$rtc(&(0x7f0000000bc0)='/dev/rtc#\x00', 0x1, 0x501000) ioctl$RTC_RD_TIME(r6, 0x80247009, &(0x7f0000000c00)) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000c40)={0x0, 0x40000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000cc0)={0x6, &(0x7f0000000c80)=[{}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_LOCK(r7, 0x4008642a, &(0x7f0000000d00)={r8, 0x4}) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$VIDIOC_OVERLAY(r9, 0x4004560e, &(0x7f0000000d80)=0x9) r10 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000dc0)='/dev/btrfs-control\x00', 0x200000, 0x0) r11 = syz_open_dev$media(&(0x7f0000000e00)='/dev/media#\x00', 0x3f, 0x40000) recvfrom$rxrpc(r11, &(0x7f0000000e40)=""/135, 0x87, 0x40000000, 0x0, 0x0) r12 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000f00)='/dev/ubi_ctrl\x00', 0x40000, 0x0) renameat2(r12, &(0x7f0000000f40)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000f80)='./file0\x00', 0x3) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000fc0), 0x4) pipe2(&(0x7f0000001000)={0xffffffffffffffff}, 0x84000) getsockopt$IP_VS_SO_GET_SERVICES(r13, 0x0, 0x482, &(0x7f0000001040)=""/163, &(0x7f0000001100)=0xa3) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r10, 0x111, 0x2, 0x1, 0x4) r14 = syz_open_dev$vcsa(&(0x7f0000001180)='/dev/vcsa#\x00', 0x5, 0x200000) symlinkat(&(0x7f0000001140)='./file0\x00', r14, &(0x7f00000011c0)='./file0\x00') [ 219.038156] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.057260] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.067476] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 219.080696] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.087218] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.097012] device bridge_slave_0 entered promiscuous mode [ 219.106253] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 219.118566] chnl_net:caif_netlink_parms(): no params data found [ 219.148050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 219.158969] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 219.167044] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.173380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 219.180605] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.187549] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.195001] device bridge_slave_1 entered promiscuous mode [ 219.209916] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 219.251230] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 219.259566] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 219.267276] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.273648] bridge0: port 2(bridge_slave_1) entered forwarding state [ 219.297594] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 219.310872] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 219.323743] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.337012] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.345484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 219.353360] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 219.366126] chnl_net:caif_netlink_parms(): no params data found [ 219.378471] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.385673] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.392592] device bridge_slave_0 entered promiscuous mode [ 219.411879] IPVS: ftp: loaded support on port[0] = 21 [ 219.430262] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 219.437504] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.443865] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.451257] device bridge_slave_1 entered promiscuous mode [ 219.457767] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.465541] team0: Port device team_slave_0 added [ 219.472753] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.481113] team0: Port device team_slave_1 added [ 219.488296] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 219.499117] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 219.507936] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 219.516268] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 219.523960] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 219.580959] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 219.617723] device hsr_slave_0 entered promiscuous mode [ 219.654906] device hsr_slave_1 entered promiscuous mode [ 219.726829] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 219.734795] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.742597] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 219.756372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 219.764102] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 219.773753] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 219.789309] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 219.802436] bridge0: port 1(bridge_slave_0) entered blocking state [ 219.810490] bridge0: port 1(bridge_slave_0) entered disabled state [ 219.818538] device bridge_slave_0 entered promiscuous mode [ 219.836309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 219.843841] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 219.861245] bridge0: port 2(bridge_slave_1) entered blocking state [ 219.868155] bridge0: port 2(bridge_slave_1) entered disabled state [ 219.875762] device bridge_slave_1 entered promiscuous mode [ 219.901770] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 219.909290] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 219.918909] team0: Port device team_slave_0 added [ 219.925567] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 219.932853] team0: Port device team_slave_1 added [ 219.958454] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 219.968103] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 219.975851] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 219.985229] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 219.992392] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.013904] chnl_net:caif_netlink_parms(): no params data found [ 220.023570] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.041280] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 220.048169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 220.056184] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.075322] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.082981] team0: Port device team_slave_0 added [ 220.104858] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 220.120029] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.127673] team0: Port device team_slave_1 added [ 220.134675] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 220.187644] device hsr_slave_0 entered promiscuous mode [ 220.224891] device hsr_slave_1 entered promiscuous mode [ 220.285540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.292885] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.315192] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 220.340419] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 220.363870] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 220.370759] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 220.378380] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.385068] bridge0: port 1(bridge_slave_0) entered disabled state [ 220.392037] device bridge_slave_0 entered promiscuous mode [ 220.400037] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.406472] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.413497] device bridge_slave_1 entered promiscuous mode [ 220.423703] chnl_net:caif_netlink_parms(): no params data found [ 220.441791] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 220.497715] device hsr_slave_0 entered promiscuous mode [ 220.544777] device hsr_slave_1 entered promiscuous mode [ 220.585462] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 220.606549] audit: type=1400 audit(1576180032.446:38): avc: denied { associate } for pid=7662 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 220.634981] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 220.644090] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.666494] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 220.685577] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.697368] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 220.738934] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 220.761421] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 220.775521] bridge0: port 1(bridge_slave_0) entered blocking state [ 220.781900] bridge0: port 1(bridge_slave_0) entered disabled state 19:47:12 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x80000000008, &(0x7f0000000200)='}', 0x1) getsockopt$inet_opts(r0, 0x0, 0x9, 0x0, &(0x7f000021affc)) [ 220.790009] device bridge_slave_0 entered promiscuous mode [ 220.805493] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 220.814037] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 220.822485] 8021q: adding VLAN 0 to HW filter on device team0 19:47:12 executing program 0: setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x80000000000c8, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fchmod(r1, 0x0) [ 220.866330] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 220.873996] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 220.882474] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 220.891360] team0: Port device team_slave_0 added [ 220.896605] bridge0: port 2(bridge_slave_1) entered blocking state [ 220.903096] bridge0: port 2(bridge_slave_1) entered disabled state [ 220.911771] device bridge_slave_1 entered promiscuous mode [ 220.922413] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 220.934380] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 220.956490] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 220.964193] team0: Port device team_slave_1 added [ 220.971334] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 220.981698] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 220.994498] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.000948] bridge0: port 1(bridge_slave_0) entered forwarding state 19:47:12 executing program 0: bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f00000000c0)={0x0, 'netdevsim0\x00'}) [ 221.017202] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.042019] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 221.070680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 221.080679] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 221.088653] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.096937] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 221.107470] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.116263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.123904] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.130446] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.139977] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 221.153863] 8021q: adding VLAN 0 to HW filter on device bond0 19:47:13 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYPTR], 0x8) [ 221.167778] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 221.187944] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 221.223677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 221.241260] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 221.249696] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 221.257372] team0: Port device team_slave_0 added [ 221.297579] device hsr_slave_0 entered promiscuous mode [ 221.334834] device hsr_slave_1 entered promiscuous mode [ 221.395576] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.402827] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.411051] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 221.420075] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 221.431060] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 221.443362] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 221.453650] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 221.461197] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 221.473952] team0: Port device team_slave_1 added [ 221.480733] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready 19:47:13 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYPTR], 0x8) [ 221.492832] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 221.504171] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 221.511777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 221.520697] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 221.539380] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 221.552076] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 221.562112] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 221.618002] device hsr_slave_0 entered promiscuous mode [ 221.657138] device hsr_slave_1 entered promiscuous mode 19:47:13 executing program 0: r0 = socket$inet6(0xa, 0x8000000000001, 0x8010000000000084) r1 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x0, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) write$binfmt_script(r0, &(0x7f0000000480)=ANY=[@ANYPTR], 0x8) [ 221.706540] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 221.713750] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 221.720789] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 221.729411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 221.739945] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 221.749510] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 221.756438] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.767105] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 221.793805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 221.801624] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 221.809687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 221.819228] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 221.827080] bridge0: port 1(bridge_slave_0) entered blocking state [ 221.833455] bridge0: port 1(bridge_slave_0) entered forwarding state [ 221.842853] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 221.849307] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 221.862569] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.879603] 8021q: adding VLAN 0 to HW filter on device bond0 [ 221.888774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 221.901290] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 19:47:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/777], 0x14}}, 0x0) [ 221.918441] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 221.931745] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 221.939467] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 221.947774] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 221.963494] bridge0: port 2(bridge_slave_1) entered blocking state [ 221.969952] bridge0: port 2(bridge_slave_1) entered forwarding state [ 221.996736] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.005538] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.012329] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.023044] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 222.033211] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.047522] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 222.055689] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.063241] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.076915] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.090456] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.098400] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.107748] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.120785] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.139147] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.157387] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.174035] QAT: Invalid ioctl [ 222.186251] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.190738] QAT: Invalid ioctl [ 222.196415] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.196426] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.198858] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready 19:47:14 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r0, 0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1}], 0x1, &(0x7f0000000000)=[{&(0x7f00007a9000)=""/1, 0x2034afa5}], 0x1, 0x0) [ 222.226767] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.235410] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.253197] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.281656] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.296772] audit: type=1400 audit(1576180034.136:39): avc: denied { map } for pid=7725 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=17559 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=blk_file permissive=1 [ 222.336967] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.348717] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.355163] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.382181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.410895] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.421699] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.429435] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.437552] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 222.454881] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.462981] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.474173] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 222.485541] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.492633] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.506830] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.514991] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.521465] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.531960] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 222.540424] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 222.550659] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.561296] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 222.568537] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 222.577233] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.591150] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.601399] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 222.609229] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 222.616851] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.625687] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.632608] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 222.645594] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.651684] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.662134] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 222.672251] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.682068] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 222.690756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 222.698412] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.706457] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.713999] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.720386] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.729469] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 222.739419] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 222.752337] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 222.759644] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.766661] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.774761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 222.782704] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 222.790894] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 222.800913] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 222.809816] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.818631] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 222.826138] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 222.832899] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 222.841015] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 222.849227] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.855608] bridge0: port 2(bridge_slave_1) entered forwarding state [ 222.865599] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 222.878820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 222.886954] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 222.897540] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 222.905394] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 222.913132] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 222.920995] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 222.930249] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 222.938093] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.944493] bridge0: port 1(bridge_slave_0) entered forwarding state [ 222.951363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 222.962159] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 222.971971] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 222.981257] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 222.990968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 222.998928] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.006717] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 223.014509] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 223.022043] bridge0: port 2(bridge_slave_1) entered blocking state [ 223.028420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 223.038394] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.048297] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.058247] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 223.072927] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.085966] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.093644] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.103722] XFS (loop2): unknown mount option [euid=00000000000000000000]. [ 223.104866] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 223.123202] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.133219] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.139774] audit: type=1400 audit(1576180034.976:40): avc: denied { create } for pid=7731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.139795] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.172510] audit: type=1400 audit(1576180035.006:41): avc: denied { write } for pid=7731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.201325] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.204972] audit: type=1400 audit(1576180035.006:42): avc: denied { read } for pid=7731 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 223.214923] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.244178] XFS (loop2): unknown mount option [euid=00000000000000000000]. [ 223.249054] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.266592] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 223.274939] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 223.289749] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready 19:47:15 executing program 2: [ 223.299524] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.322043] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.335143] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.342903] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.352762] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.363586] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.391597] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.408325] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 223.422609] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.431114] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.445550] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 223.453698] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 223.464241] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.474256] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 223.485200] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 223.492302] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.500150] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.508271] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 223.516483] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 223.532830] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.539038] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.551290] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 223.562215] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 223.569890] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 223.578531] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.591450] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 223.600703] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.610019] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.617485] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.630273] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 223.639193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 223.649834] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 223.660247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.674115] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 223.710165] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 223.738885] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 223.774257] IPv6: ADDRCONF(NETDEV_UP): vxcan0: link is not ready [ 223.805305] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 223.811721] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 223.825868] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 223.834070] ntfs: (device loop3): parse_options(): Unrecognized mount option appraise_type. [ 223.861930] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 223.863357] ntfs: (device loop3): parse_options(): Unrecognized mount option audit. [ 223.877644] ntfs: (device loop3): parse_options(): Unrecognized mount option subj_type. [ 223.886375] ntfs: (device loop3): parse_options(): Unrecognized mount option dont_measure. [ 223.886385] ntfs: (device loop3): parse_options(): Unrecognized mount option . [ 223.940488] ntfs: (device loop3): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 19:47:15 executing program 1: 19:47:15 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 19:47:15 executing program 2: 19:47:15 executing program 5: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)='\f', 0x1d4c, 0x4816, 0x0, 0x17d) 19:47:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x88) recvmmsg(r0, &(0x7f0000003b40)=[{{0x0, 0x0, 0x0}}], 0x300, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x0) 19:47:15 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x255, @time={0x0, 0x1c9c380}}) 19:47:15 executing program 2: 19:47:15 executing program 1: 19:47:16 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x255, @time={0x0, 0x1c9c380}}) 19:47:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x255, @time={0x0, 0x1c9c380}}) [ 224.254447] hrtimer: interrupt took 23448 ns 19:47:16 executing program 1: 19:47:16 executing program 2: 19:47:16 executing program 5: 19:47:16 executing program 5: 19:47:16 executing program 3: 19:47:16 executing program 2: 19:47:16 executing program 1: 19:47:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x255, @time={0x0, 0x1c9c380}}) 19:47:16 executing program 4: 19:47:16 executing program 3: 19:47:16 executing program 5: 19:47:16 executing program 1: 19:47:16 executing program 2: 19:47:16 executing program 4: 19:47:16 executing program 5: 19:47:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x255, @time={0x0, 0x1c9c380}}) 19:47:16 executing program 3: 19:47:16 executing program 1: 19:47:16 executing program 2: 19:47:16 executing program 4: 19:47:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:47:16 executing program 3: 19:47:16 executing program 5: 19:47:16 executing program 1: 19:47:16 executing program 4: 19:47:16 executing program 2: 19:47:16 executing program 3: 19:47:16 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:16 executing program 5: 19:47:16 executing program 4: 19:47:16 executing program 1: 19:47:17 executing program 2: 19:47:17 executing program 3: 19:47:17 executing program 5: 19:47:17 executing program 1: 19:47:17 executing program 4: 19:47:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:17 executing program 2: 19:47:17 executing program 3: 19:47:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0xa}]}]}}, &(0x7f0000000400)=""/140, 0x2e, 0x8c, 0x1}, 0x20) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) 19:47:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:17 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:47:17 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:47:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:17 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000005e0081aee4050c0001000234afbabdd03aa7b9872245d3db00000100000000", 0x23}], 0x1}, 0x0) 19:47:17 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:47:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:17 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$kcm(0x11, 0x3, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:17 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000005e0081aee4050c0001000234afbabdd03aa7b9872245d3db00000100000000", 0x23}], 0x1}, 0x0) 19:47:17 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0x1, &(0x7f0000000480)="340acef1842c8e0f429dc2906c77a0935f54fffb952469c05eb91e1ca08627cb5ab78e36b179fa824164b84d5fec116f909ab2b7f11e394f0d14dc58240e9d8db374fa8a2bb7559b1de0cc2f3fa3eb9b7724f3c75ef616ce73149667ba0cb3a3b6baa82b976893ccba343ac1eff0cdb57d038f8be7d981d804d531ce0e837b90b8a36ab3833a690c8b05a6f7503cc540551a265194204245b8c9b2a2a69459c659c40255e8d5cecfaffc2a176a4b570041dddf7f8615405f37c4c9350ac90f4041d66f2fa3e6353668daebdc7beff1fd6bf0d29fb89e262f5a80fde8de24a6de62ea87b28742b5872acb12945b4d422f244fc7", &(0x7f0000000380)=""/78, 0x8}, 0x20) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x71b000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x149, 0xc1, 0x1, 0xab, 0x82, 0x0, 0xffffffffffffffe1, 0x1000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x0, 0x8}, 0x14028, 0x5, 0x300, 0x3, 0x3f, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r1, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x6d356) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0x6d356) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x1024}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) 19:47:17 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x11) openat$cgroup(0xffffffffffffffff, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$kcm(0x11, 0x0, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:17 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:17 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:17 executing program 2: setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000005e0081aee4050c0001000234afbabdd03aa7b9872245d3db00000100000000", 0x23}], 0x1}, 0x0) 19:47:17 executing program 5: socket$kcm(0x2b, 0x1, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x11) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$kcm(0x11, 0x3, 0x300) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:18 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xc, 0x3, &(0x7f0000000c00)=ANY=[@ANYBLOB="8500000011000000dbffffff00000000950000000000000035c676829ccf2cd479f68d6cd504392d0e084bf1c96c40000000e2a791de63aac46fe9eb4d164908a8dacb5b000cf561a058c0b30cd162e4040e86bb20e4747281b08d7dce41737d2ef21a68d39258e609cb9c129f93e1ec5500da22f501564b025ab9e1c70d3f77d33930079dfa50254a9cb3261ac78e98ec49bcfe23d4df9ff6f69210ee76b669ca78f6d7ce6247e86613ff2844020984021bb805f347efb18aca3621b30000010000000000e802e0097995ce879a26603534a89685caf3d55a3c757964656e5b7370cef148c1c2c53f81a948235df440c438d3aaf075dcb210b0cc461dd173dd12df3d0f8bee818f07007ad988c27139ba9a79c461daedbe69a24d7fcd17dc030076804590bf9a91838d636d702111730c8997404808a69fdc5da8a71d9a2c26363f98cc77ccbfe617d85ccbe39bbbac6a708f16fab95e6176d9b90c989eecffffff7ffefeb60f03659a332df13d49995b332d6f2127fd002ca5a21e5125bd186cded407d233e050ee485090cc1ef8691ae1c89e093e4495b043541bdbe9c6f0de6306"], &(0x7f0000000000)='syzkaller\x00', 0x1, 0xcf, &(0x7f0000000480)=""/207}, 0x48) 19:47:18 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:18 executing program 2: recvmsg$kcm(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)=[{0x0}, {&(0x7f0000000000)=""/46, 0x2e}], 0x2}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8946, &(0x7f00000001c0)='bond0\x00') 19:47:18 executing program 5: socket$kcm(0x2b, 0x1, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x3, 0xe, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='\x00\xf1)\r*\xbbzL\x8e7\x9e\xaa\xb3y\xb9\xfa!\xad!\xb4\xd4\x94\xa0\x86\xcf\x12#\xb4\xd3n$\x85\x06k\xb2\xf9\xd5\"\xfe\x86 \b\x7f\xe8\x8a\xcf\x89\x9b\xbaR]\xf5{J\x84\x15\xf9)\xf3\xc8\xd5`\xe6\xe6\x9eI\x02\xce\x1fI\xa8w\xc3#\xba\xf5\xe9\xea>\xc7\xab2,\xa0\x84t\xce\x04Tf\xc5\xfe`\'\x9b\xe2MH%\x93\x028\xcb\x0f\xdb\x16\xe2l\x80\xe6\xcd\xceW\x01SS-o`X\xf6\xa4\xc1|\xbe\xc4\xf0\xac1zp\xc9\x89\xef.\xa4\x91\xb4\xf3('}, 0x48) 19:47:18 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={0x1, &(0x7f0000000480)="340acef1842c8e0f429dc2906c77a0935f54fffb952469c05eb91e1ca08627cb5ab78e36b179fa824164b84d5fec116f909ab2b7f11e394f0d14dc58240e9d8db374fa8a2bb7559b1de0cc2f3fa3eb9b7724f3c75ef616ce73149667ba0cb3a3b6baa82b976893ccba343ac1eff0cdb57d038f8be7d981d804d531ce0e837b90b8a36ab3833a690c8b05a6f7503cc540551a265194204245b8c9b2a2a69459c659c40255e8d5cecfaffc2a176a4b570041dddf7f8615405f37c4c9350ac90f4041d66f2fa3e6353668daebdc7beff1fd6bf0d29fb89e262f5a80fde8de24a6de62ea87b28742b5872acb12945b4d422f244fc7", &(0x7f0000000380)=""/78, 0x8}, 0x20) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x5411, 0x71b000) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x20000001) perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x149, 0xc1, 0x1, 0xab, 0x82, 0x0, 0xffffffffffffffe1, 0x1000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_config_ext={0x0, 0x8}, 0x14028, 0x5, 0x300, 0x3, 0x3f, 0x0, 0x6}, 0xffffffffffffffff, 0x0, r1, 0x0) write$cgroup_type(r3, &(0x7f0000000080)='threaded\x00', 0x6d356) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r4, &(0x7f0000000080)='threaded\x00', 0x6d356) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x47, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x34, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x1024}, 0x0, 0xffffffffffffffff, r0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r6 = socket$kcm(0x2, 0x3, 0x2) setsockopt$sock_attach_bpf(r6, 0x1, 0x3e, &(0x7f00000002c0)=r5, 0x4) 19:47:18 executing program 0: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000000340)="f3", 0x1}], 0x1}, 0x0) 19:47:18 executing program 5: socket$kcm(0x2b, 0x1, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 2: r0 = perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='memory.events\x00') r1 = socket$kcm(0x11, 0x0, 0x300) setsockopt$sock_attach_bpf(r1, 0x1, 0x28, &(0x7f0000000680), 0x2c1) 19:47:18 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:18 executing program 3: r0 = socket$kcm(0x2b, 0x4000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff01c}, {0x6}]}) 19:47:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 1: socketpair(0x0, 0x0, 0x0, 0xfffffffffffffffd) 19:47:18 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) sendmsg(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:47:18 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000002a00)={0x0, 0x0, &(0x7f0000002f40)=[{&(0x7f00000009c0)="53ff35", 0x3}], 0x1}, 0x0) r2 = socket$kcm(0xa, 0x802, 0x88) sendmsg$kcm(r2, &(0x7f0000000240)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0}, 0x8000) sendmsg$kcm(r2, &(0x7f0000000000)={&(0x7f0000000100)=@nl=@unspec={0x871f000000000000, 0x2a77, 0xfc90000}, 0x300, &(0x7f0000000040)=[{&(0x7f0000000280), 0xff8f}], 0x1, &(0x7f0000001280)}, 0x0) 19:47:18 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 1: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) 19:47:18 executing program 0: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:18 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000005e0081aee4050c0001000234afbabdd03aa7b9872245d3db00000100000000", 0x23}], 0x1}, 0x0) 19:47:18 executing program 3: sendmsg(0xffffffffffffffff, &(0x7f0000002e40)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, 0x0}, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='wls\x00\x00\x00\x00\x00\x00'}, 0x10) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x3, 0x0, 0x1ff, 0x8000}, 0x10}, 0x70) ioctl$TUNSETIFINDEX(0xffffffffffffffff, 0x400454da, &(0x7f0000007680)) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x6100, 0x0) 19:47:18 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x6, 0x4, &(0x7f0000000200), 0x4) 19:47:19 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:19 executing program 1: perf_event_open(&(0x7f0000000780)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc0c0583b, 0x20000001) r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, 0x0, 0x40) 19:47:19 executing program 4: ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000380)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="230000005e0081aee4050c0001000234afbabdd03aa7b9872245d3db00000100000000", 0x23}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x19, 0x1, 0x1, 0x994d, 0x18, 0xffffffffffffffff, 0x2, [], 0x0, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) 19:47:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) socket$kcm(0xa, 0x2, 0x11) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, 0x0, 0x0) 19:47:19 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) 19:47:19 executing program 5: r0 = socket$kcm(0x2b, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:19 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[{0x10, 0x1, 0x1}], 0x10}, 0x0) 19:47:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:19 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:47:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 19:47:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x6a}, 0x0) 19:47:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:19 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:19 executing program 0: syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000000), 0x12) 19:47:19 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) socket$kcm(0x10, 0x0, 0x10) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000100)) recvmsg(0xffffffffffffffff, 0x0, 0x40000003) 19:47:19 executing program 3: pipe2$9p(0x0, 0x0) r0 = dup(0xffffffffffffffff) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000240), 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000004c0)={0xa0, 0x19, 0x0, {0x3000, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3cd, 0x0, 0x3f, 0x0, 0x1f, 0x5, 0x0, 0x0, 0x7aa}}, 0xa0) creat(0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40246608, &(0x7f0000000000)={0xff, 0x2, 0x6, 0x0, 0x0, 0xf16d}) write$FUSE_LSEEK(r1, &(0x7f0000000040)={0x18, 0x0, 0x6, {0x8}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) getpid() r2 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newlink={0x120, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0xf8, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0xe8, 0x2, [@gre_common_policy=[@IFLA_GRE_IFLAGS={0x8, 0x2, 0x1}, @IFLA_GRE_TTL={0x8, 0x8, 0x9}, @IFLA_GRE_PMTUDISC={0x8}, @IFLA_GRE_IGNORE_DF={0x8, 0x13, 0x1}, @IFLA_GRE_IFLAGS={0x8, 0x2, 0x7}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0xfd4}, @IFLA_GRE_ENCAP_TYPE={0x8}], @IFLA_GRE_LOCAL={0x14, 0x6, @empty}, @IFLA_GRE_REMOTE={0x14, 0x7, @ipv4={[], [], @loopback}}, @IFLA_GRE_REMOTE={0x14, 0x7, @mcast2}, @gre_common_policy=[@IFLA_GRE_LINK={0x8}, @IFLA_GRE_OKEY={0x8}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0xb63fd}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x1}, @IFLA_GRE_ERSPAN_HWID={0x8, 0x18, 0x5}, @IFLA_GRE_IGNORE_DF={0x8}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0xfad9f}], @gre_common_policy, @gre_common_policy=[@IFLA_GRE_ENCAP_SPORT={0x8, 0x10, 0x4e22}, @IFLA_GRE_OKEY={0x8, 0x5, 0x1f}, @IFLA_GRE_IKEY={0x8, 0x4, 0x7ff}, @IFLA_GRE_ENCAP_DPORT={0x8}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x6}, @IFLA_GRE_ENCAP_FLAGS={0x8, 0xf, 0x81}, @IFLA_GRE_OFLAGS={0x8, 0x3, 0x9}]]}}}]}, 0x120}}, 0x0) 19:47:19 executing program 5: socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:19 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 227.980278] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:47:19 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 228.028629] netlink: 'syz-executor.3': attribute type 8 has an invalid length. [ 228.058929] netlink: 'syz-executor.3': attribute type 2 has an invalid length. 19:47:19 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') [ 228.095082] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 228.119170] netlink: 'syz-executor.3': attribute type 14 has an invalid length. [ 228.148836] netlink: 'syz-executor.3': attribute type 24 has an invalid length. [ 228.175094] netlink: 'syz-executor.3': attribute type 16 has an invalid length. 19:47:20 executing program 4: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r1, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e900)=[{&(0x7f000000e840)=""/135, 0x87}], 0x1}, 0x0) sendmsg$tipc(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000680)=']', 0x1}], 0x1}, 0x0) [ 228.202462] netlink: 'syz-executor.3': attribute type 17 has an invalid length. [ 228.222873] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 228.233600] netlink: 'syz-executor.3': attribute type 15 has an invalid length. 19:47:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:20 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:20 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x80000000, 0x1, 0x1, 0x4000}, 0x3c) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB='+'], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc020662a, 0x20000000) 19:47:20 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:20 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 19:47:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:20 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socket$kcm(0xa, 0x6, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x615, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 19:47:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:20 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 19:47:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:20 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x2, 0x2, &(0x7f0000000040)) 19:47:20 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) socket$kcm(0x2, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETFILTER(r1, 0x801054db, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x40000003) 19:47:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:20 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 19:47:20 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0x0, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x2, 0x2, &(0x7f0000000040)) 19:47:21 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:21 executing program 4: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0xfffffffffffffda4, 0x0, 0x0, 0x0, 0xffffffffffffffe1}, 0x0) 19:47:21 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:21 executing program 3: r0 = socket$kcm(0xa, 0x522000000003, 0x11) sendmsg$kcm(r0, &(0x7f0000000240)={&(0x7f0000000040)=@nl=@unspec={0x0, 0xffffff7f00000000, 0x7e4c, 0x80fe}, 0xfd3d, &(0x7f00000001c0), 0x6a}, 0x0) 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x0, 0x2, 0x2, &(0x7f0000000040)) 19:47:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0x0, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:21 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:21 executing program 4: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d800a0000005e510befccd7", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 19:47:21 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x0, 0x2, &(0x7f0000000040)) 19:47:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0x0, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:21 executing program 1: r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:21 executing program 3: r0 = socket$kcm(0x2, 0x1000000000000006, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, 0x0) 19:47:21 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='posix_acl_access@securityposix_acl_accessself\x00') 19:47:21 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x0, 0x2, &(0x7f0000000040)) 19:47:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:21 executing program 3: sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r0 = socket$kcm(0x10, 0x800000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4520cecff0e00fa078b5bdb4cb904e473730e55cff26d1b0e001d800a0000005e510befccd7", 0x2e}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89f1, 0x0) 19:47:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x0, 0x2, &(0x7f0000000040)) 19:47:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:21 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:21 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x4) ioctl$IMGETCOUNT(r2, 0x8903, &(0x7f00000001c0)) 19:47:21 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000440)="9f81d861a8ab7dbfe5df07821ecd66299667b705363426", 0x17}], 0x1) 19:47:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:21 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x0, &(0x7f0000000040)) 19:47:21 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:22 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESHEX=0x0], 0x29) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) [ 230.145332] can: request_module (can-proto-0) failed. 19:47:22 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(r0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth1\x00'}) r3 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="1a0000001f02000000000000020000000000000000000000070000090005"]}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth1\x00'}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RRENAMEAT(r8, &(0x7f0000000400)={0x7, 0x4b, 0x2}, 0x7) r9 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(r9, &(0x7f0000000400)={0x7}, 0x7) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x100) r10 = dup3(r6, r7, 0x0) r11 = dup2(r10, 0xffffffffffffffff) mmap$xdp(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x0, 0x40010, 0xffffffffffffffff, 0x180000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r11, 0x0, 0x0}, 0x10) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) r14 = dup3(r12, r13, 0x0) dup2(r14, 0xffffffffffffffff) r15 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r15, 0xae60) r16 = ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) r17 = dup3(0xffffffffffffffff, r15, 0x0) dup2(r17, r16) r18 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r18, 0xae01, 0x0) 19:47:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x0, &(0x7f0000000040)) 19:47:22 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2000000084003, 0x0) [ 230.370308] can: request_module (can-proto-0) failed. 19:47:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x0, &(0x7f0000000040)) 19:47:22 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESHEX=0x0], 0x29) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2000000084003, 0x0) 19:47:22 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r0 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000040), 0x12) 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2000000084003, 0x0) [ 230.655722] can: request_module (can-proto-0) failed. 19:47:22 executing program 3: r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) write(r0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000040)={'veth0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@empty, @in6=@local}}, {{@in=@broadcast}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth1\x00'}) r3 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) write(r3, &(0x7f0000000000), 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000040)={'veth0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="1a0000001f02000000000000020000000000000000000000070000090005"]}) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'veth1\x00'}) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r7, 0xae60) r8 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) write$P9_RRENAMEAT(r8, &(0x7f0000000400)={0x7, 0x4b, 0x2}, 0x7) r9 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RRENAMEAT(r9, &(0x7f0000000400)={0x7}, 0x7) ioctl$KVM_CREATE_VCPU(r9, 0xae41, 0x100) r10 = dup3(r6, r7, 0x0) r11 = dup2(r10, 0xffffffffffffffff) mmap$xdp(&(0x7f0000013000/0x1000)=nil, 0x1000, 0x0, 0x40010, 0xffffffffffffffff, 0x180000000) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r11, 0x0, 0x0}, 0x10) r12 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r13 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r13, 0xae41, 0x0) r14 = dup3(r12, r13, 0x0) dup2(r14, 0xffffffffffffffff) r15 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r15, 0xae60) r16 = ioctl$KVM_CREATE_VCPU(r15, 0xae41, 0x0) r17 = dup3(0xffffffffffffffff, r15, 0x0) dup2(r17, r16) r18 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r18, 0xae01, 0x0) 19:47:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, 0x0) 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) 19:47:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:22 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESHEX=0x0], 0x29) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) [ 230.913367] kauditd_printk_skb: 23 callbacks suppressed [ 230.913380] audit: type=1804 audit(1576180042.746:61): pid=8327 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir587373689/syzkaller.ykaZoz/25/bus" dev="sda1" ino=16583 res=1 19:47:22 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) 19:47:22 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, 0x0) 19:47:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:23 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x0, 0x0) 19:47:23 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYRESOCT, @ANYRESHEX=0x0], 0x29) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) 19:47:23 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) kexec_load(0x0, 0x0, 0x0, 0x0) 19:47:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, 0x0) 19:47:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, 0x0, 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) sendmsg$inet6(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)="78a800cff916b89cc7e9f0a0938f", 0xe}], 0x1}, 0x8000000) 19:47:23 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x5, 0x3b, 0x70, 0x2, 0x0, 0x0}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000000c0)=r0, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r0, 0x0, 0x0}, 0x20) [ 231.531380] audit: type=1400 audit(1576180043.366:62): avc: denied { map_read map_write } for pid=8414 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 19:47:23 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xe) 19:47:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 19:47:23 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0x10) 19:47:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x14, &(0x7f0000000000)={@mcast2}, 0x20) 19:47:23 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000080)=""/79) 19:47:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) 19:47:23 executing program 3: r0 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x81}, 0x1c) 19:47:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x20, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) fgetxattr(r0, &(0x7f0000000100)=@known='trusted.overlay.impure\x00', 0x0, 0x0) 19:47:23 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x20, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) 19:47:23 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x483, 0x400000000000) 19:47:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000040), 0x12) [ 231.941553] audit: type=1400 audit(1576180043.776:63): avc: denied { name_connect } for pid=8448 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 19:47:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) dup2(0xffffffffffffffff, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) 19:47:23 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 19:47:23 executing program 0: r0 = socket$inet6(0xa, 0x40000080806, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@mcast2, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @mcast2, 0x0, 0xbf35, 0x0, 0x0, 0x0, 0x1000000}) 19:47:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = dup2(0xffffffffffffffff, r3) getsockname$packet(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 19:47:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r7, &(0x7f0000000700)=[{&(0x7f0000000000)=""/35, 0x23}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 19:47:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) dup2(0xffffffffffffffff, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) 19:47:24 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x483, 0x400000000000) 19:47:24 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 19:47:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) dup2(0xffffffffffffffff, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) 19:47:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x3c) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x33c) socketpair(0x1e, 0x80005, 0x0, 0x0) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(0xffffffffffffffff, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = dup2(0xffffffffffffffff, r3) getsockname$packet(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1}, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 19:47:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) dup2(0xffffffffffffffff, r1) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) getresuid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)) 19:47:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}, {0x0}, {0x0}], 0x3) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 5: connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xa122, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r0, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x483, 0x400000000000) 19:47:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000840)=[{&(0x7f0000000040)=""/111, 0x6f}], 0x1) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000a40)=[{0x0}, {0x0}, {&(0x7f0000000900)=""/169, 0xa9}], 0x3}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r4, 0x0) shutdown(0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {&(0x7f0000000280)}], 0x3, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@loopback, 0x135}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xa1}, {0x0}, {&(0x7f0000000140)=""/62, 0x3b}], 0x3, 0x0, 0x0, 0x0) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000280)={0x0, 0x1, 0x6, @local}, 0x10) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 4: poll(&(0x7f0000000040), 0x2000000000000024, 0x4b) r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r0, 0x0, 0x896, 0x0, 0x0, 0x800e00871) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r1, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) shutdown(r0, 0x0) 19:47:25 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, 0x0) 19:47:25 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) connect$rose(r0, &(0x7f0000003300)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x600, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) 19:47:25 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) fcntl$setflags(0xffffffffffffffff, 0x2, 0x1) 19:47:25 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) faccessat(0xffffffffffffffff, 0x0, 0x100, 0x7b6773f4d4163740) 19:47:25 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xd, &(0x7f00000001c0), 0x0) 19:47:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:25 executing program 3: write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0x2b6) r0 = socket(0x0, 0x0, 0x0) sendmmsg$alg(r0, &(0x7f0000000140)=[{0x6, 0x0, &(0x7f0000000100), 0x6, &(0x7f0000000100)}], 0x492492492492805, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000002c0)) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x200000008002) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x18}, [@ldst={0x6, 0x3, 0x3f9, 0x5}]}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) ioctl$TIOCEXCL(0xffffffffffffffff, 0x540c) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000680)=[@in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}}, @in={0x2, 0x4e24, @rand_addr=0x4}, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0xb}, 0x81}], 0x3c) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r3 = openat$null(0xffffffffffffff9c, 0x0, 0x23a862ae90b858fb, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, 0x0, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x23a862ae90b858fb, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r6, 0x4400ae8f, &(0x7f0000000140)) ioctl$KVM_RUN(r6, 0xae80, 0x0) 19:47:25 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="02", 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r2, r2}, 0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000700)={'crc32c-generic\x00\x000\x16\xc7\xec\x91\x05\x0e\xbb\x7f\x11\x97\xa9\x1a\xb4\x00'}}) 19:47:25 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') 19:47:28 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x8000000000d, &(0x7f0000000000)='\x00', 0x1) 19:47:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:28 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x541d, 0x0) 19:47:28 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETKEYCODE(r0, 0x5437, 0x0) 19:47:28 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000440)='./file0\x00') symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000200)='./file0\x00') lchown(&(0x7f0000000140)='./file0/../file0/file0\x00', 0xee01, 0x0) 19:47:28 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000003c0)=0x1) 19:47:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x3, 0x0, [0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) socket$kcm(0x2b, 0x1, 0x0) 19:47:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) 19:47:28 executing program 0: write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$P9_RATTACH(0xffffffffffffffff, 0x0, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:47:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:28 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = socket$packet(0x11, 0x80000000000002, 0x300) r2 = socket$packet(0x11, 0x80000000000002, 0x300) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) writev(r0, &(0x7f0000000380)=[{&(0x7f0000000280)="7472139f7fa8522b8a9b0a5483f1c2481c9fb02148fa78c79ee54a385affb7097d9308f67995ff96aaa7", 0x2a}, {&(0x7f0000000500)="41c0f449a273ed8171aa0ef5738982e2baff9760e4c75ce973482ff50b9b027f214749452658c5f8cc89ae224b1b84c8e1ca409a8ee396f480591bb0da6738", 0x3f}], 0x2) 19:47:29 executing program 3: 19:47:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000300)={0x3, 0x0, [0x0, 0x0, 0x0]}) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) socket$kcm(0x2b, 0x1, 0x0) 19:47:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:29 executing program 3: 19:47:29 executing program 0: 19:47:29 executing program 1: 19:47:29 executing program 4: 19:47:29 executing program 3: 19:47:29 executing program 0: 19:47:29 executing program 5: 19:47:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:29 executing program 1: 19:47:29 executing program 0: 19:47:29 executing program 4: 19:47:29 executing program 5: 19:47:29 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = syz_open_procfs(0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) 19:47:29 executing program 1: 19:47:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 19:47:29 executing program 4: 19:47:29 executing program 0: 19:47:29 executing program 1: 19:47:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 19:47:29 executing program 5: 19:47:29 executing program 1: 19:47:29 executing program 4: 19:47:29 executing program 0: 19:47:30 executing program 3: 19:47:30 executing program 5: 19:47:30 executing program 0: 19:47:30 executing program 4: 19:47:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 19:47:30 executing program 1: 19:47:30 executing program 5: 19:47:30 executing program 3: 19:47:30 executing program 0: 19:47:30 executing program 4: 19:47:30 executing program 3: 19:47:30 executing program 1: 19:47:30 executing program 5: 19:47:30 executing program 2: 19:47:30 executing program 3: 19:47:30 executing program 5: 19:47:30 executing program 4: 19:47:30 executing program 1: 19:47:30 executing program 0: 19:47:30 executing program 2: 19:47:30 executing program 3: 19:47:30 executing program 4: 19:47:30 executing program 5: 19:47:30 executing program 0: 19:47:30 executing program 1: 19:47:30 executing program 5: 19:47:30 executing program 2: 19:47:30 executing program 0: 19:47:30 executing program 3: 19:47:30 executing program 4: 19:47:30 executing program 1: 19:47:30 executing program 2: 19:47:30 executing program 4: 19:47:30 executing program 5: 19:47:30 executing program 0: 19:47:30 executing program 3: 19:47:31 executing program 1: 19:47:31 executing program 4: 19:47:31 executing program 2: 19:47:31 executing program 3: 19:47:31 executing program 0: 19:47:31 executing program 5: 19:47:31 executing program 2: 19:47:31 executing program 0: 19:47:31 executing program 1: 19:47:31 executing program 4: 19:47:31 executing program 3: 19:47:31 executing program 5: 19:47:31 executing program 2: 19:47:31 executing program 0: 19:47:31 executing program 1: 19:47:31 executing program 4: 19:47:31 executing program 3: 19:47:31 executing program 5: 19:47:31 executing program 0: 19:47:31 executing program 2: 19:47:31 executing program 4: 19:47:31 executing program 1: 19:47:31 executing program 3: 19:47:31 executing program 2: 19:47:31 executing program 3: 19:47:31 executing program 5: 19:47:31 executing program 4: 19:47:31 executing program 0: 19:47:31 executing program 1: 19:47:31 executing program 3: 19:47:31 executing program 5: 19:47:31 executing program 2: 19:47:31 executing program 1: 19:47:31 executing program 4: 19:47:31 executing program 0: socketpair(0x0, 0x1, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)) 19:47:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r0, &(0x7f00000076c0)={0x0, 0x0, 0x0}, 0x0) 19:47:31 executing program 3: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/gro<#\xfbW\xe6\xc6\x0f\x1fKE\xb7M\x99\x9a\x9a\x8c,\xe1[&\xe5\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ}\xb7\xf3\xfe\xf6\xe0.+\xe3\x89\xde\x139E\xa3\x85\xbd\x81\xe9\xbd\xee\xee\x03\x00\x00\x00\x00\x00\x00\x00[T\aE\xdfK\x1d\xeeH;\x15v$\xc5\xbcq\x9a\t\x9ej5\t\x00\x00\x009\x8c4', 0x2761, 0xfffffff5) write$cgroup_pid(r1, &(0x7f0000000100)=0xffffffffffffffff, 0xaf53f07a) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x660c, 0x0) 19:47:32 executing program 2: socketpair(0x10, 0x3, 0x3, &(0x7f0000000740)) 19:47:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x27, &(0x7f0000000540)=ANY=[@ANYBLOB="850000000f00000025000000000000009500000000000000c7905faaaca74ae5bd71f5b27df7b091c97554bb677c101e460080f83f0000075900001943449fc1dcf86e0008d70000000000b1b5af027400cb3d22e8f98b2b4077445b2fef3efdd4547d08d3f4215a73e8d9ffccbe0ca1305ecd60ac4807eafef8a0e0a79ec8a07ce46fb7c53db16b29aa6d36fc1107b9cf2a89a797f8125e3ea3cd5c578f0000000000000000000000000000009b28a7bbd93c5d476eccbfa7f761657eb5945c049d3490f62392c0efdd62a65f75cc8704ece6686a9f77e3950e17868405c1980de93ac341f44a0436900c6c3bce7f6d0d20ffe994f5ddb56b9fbf24de6967fc1c9ab6d884a965346b1eb306ebb9f44e1cee8b69c9ebdc4dbf7c6447f2458f769d5b2577aa5a89f4c0af61872c7c1ab888231656a92b01a9032c0000"], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000700)={0x1, 0x0, [0x0]}) 19:47:32 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000380)="0f20e06635000002000f22e00f35ba610066b80000000066efbaf80c66b8e8ee668466efbafc0cec26e0480f019a91d10f23630f01dff33eff45000f20e06635000004000f22e0"}], 0x0, 0x0, 0x0, 0xffffffffffffffc4) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6(0xa, 0x0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:47:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x300}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x42, 0xe000000, &(0x7f00000000c0)="b9ff030000ffffff7f9e14f005051fffffff00004000630677fbac141414e934a0a662079f4b4d2f87e5feca6aab845013f2325f1a390101050a0100010000000000df74e30d7eabe773afef6f6e4798ab117e9f84fa406b913de8ad827a022e1faee50887dc302819a8a3d0cde36b67f337ce8eee124e061f8fea8ab95f1e8f99c7edea980697449b78569ea293c3eed3b28fc3205db63b2c65e77f19ab28c632cc80d9f2f37f9ba67174fffcb5244b0c909eb8e12116bebc47cf97d2ea8acadfb34ca580b64df7c800113e53bae401cd22f50072deabf93dd4d3e626", 0x0, 0x100, 0x0, 0x296, 0x0, &(0x7f0000000000), &(0x7f0000000040)}, 0x28) ioctl$TUNGETFILTER(0xffffffffffffffff, 0x801054db, &(0x7f00000000c0)=""/6) 19:47:32 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$kcm(r0, &(0x7f0000000880)={&(0x7f0000000080)=@nl, 0x80, 0x0, 0x0, &(0x7f0000000740)=[{0x10}, {0x10}], 0x20}, 0x0) 19:47:32 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 19:47:32 executing program 4: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000840)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x92\xee2\xc2$Wx\x15^\xdaM\xeaB\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WZ;\xce\x05\xfc\x95\xd9\x88\x1f|\x8b\xf1\xbf\xf2u\xdd\xd8AV\xd87\x96M\xea\xd2\xa2iM\xe9\xa1\xbc\xba}\xbe\xa1\x05J\"\f\xf9\b\xcf\xb8J\x13#\xecT\xdf\xe0\x9dOA>\xe9\x99\xf8\xaf@{dw\b\xe7{\xaf\x9a\x1e3\xc1\x83&\x89\xc2\xa5\xb1\xe2NN\xdf\xd3\x0f{\x8c\xc1\xc8y\x01\x04\x00\xc7\x94\xe3\x89|\xd7\x9f\xd3\x06\x17\xe6]\xd7\x81q\x1d\x1dN\x9e\xf4c\x83\x86_\xfc\xbc\xdd\xd4{\xde\xc4\xe5\xb6\b;L\x1cN\xa2\xc9k\xd7 \xc3\xe4\x19\x96\x8c\x04\xea\x9c9\xfa\xe3\xc1\x8dDuTHL\n\xe8\xb7oSx\'\xfd=\xfc\xa4\xa51\b\x02j\xb7\x98{`\x89\x8c\xd3\xc6\xe8\xe2\x9b\xd7\xab\xd1s\xfb\xaa\xcd\x9d\xf1\x9e\xee\xe3e\xf1\x91\xf7\xee%\xf8\xc7G', 0x2761, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000040)=r1, 0xab) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000002100000000000000000000009500000000000000"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000100)={r0, r2}) 19:47:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) recvmsg(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23}, 0x80, 0x0}, 0x0) 19:47:32 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d356) 19:47:32 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\xff', 0x241, 0x0) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x6d356) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, 0x0) 19:47:32 executing program 4: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 19:47:32 executing program 5: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000012000)={0xffffffffffffffff, 0x0, 0x0}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0x0, 0xffffffffffffffff, 0x0, 0xd1, &(0x7f0000000080)='memory.high\x00\x90\x80\xa4\x96\xbb\xe4\xb2\xa2\x01\xc0\xb8*Z\xef\xf8\x0e\x1f]\xf7\x10\xdb\xfe\xe4\x1d\xc6\x92\x7f\xeeK_p\t\x8c\x9f5\xd0\xef)\xd8\x04\xbf\xc2N\x1c\xf0R\xdc\r\xb1Gf\xba\xd11#<\xaf^,s\x85\x10R\x99\xc2D\xee\n\"\xf9c\x15{\xc1[\xef\x06\x8a\xcd\x9d\xc8\x90#\xd0\xe7\xe3\xe0\xa9\xf3\xc0n\x1f\xd1\x11P\xe20\xcd\x1c\xfa\xfd\xa3\xcf\x9c\xc6\xb7]\x16\xc7\xd7\xb4/\x82\xd1\xae\xd9TM\x05a\xe5\xc5U\x91\xbe\x81\xac4\x9d\x02`\xe7\xa6q\x1f@\x1f\x1f?tm\x9c\xd1\x8c\xa1\xb5\xe0`H)\x97r\xc0?y\x9cc=c`A^\x9f\xcd\xbc\xf4m>I\xae\xdf\x946\xe7M`\xeb\x9fm\xbe+n\x00\x18k\x98\xab\xd5\xeet\"d\x81\x94\x04\xf5\xeb'}, 0xffffffffffffff59) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getpid() perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r1 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0xc, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) recvmsg$kcm(r1, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r2, 0x10e, 0xc, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10e, 0xc, &(0x7f00000000c0), 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) 19:47:32 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x894c, 0x0) 19:47:32 executing program 1: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r1, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e900)=[{&(0x7f000000e840)=""/135, 0x87}], 0x1}, 0x0) sendmsg$tipc(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000680)="5d89551f7cb5700f74e08b5afacba3008492c14369620f4780a52d811935", 0x1e}, {&(0x7f00000006c0)="5a6869ef33b4e6b2ed2d1f9862c2cb8a52726a7962b01acb0a76ff8aeab64e49f8240dcf7651c818cb7d4b5fe9f373eece8210d52441b6e62a55586050d6fab1b2b8ef939ef57ac08931d2b01f31c9fa524df47bd843e3c3a81cac6c403369f72861a74688f9752c66c8", 0x6a}], 0x2}, 0x0) 19:47:32 executing program 3: socketpair(0x10, 0x3, 0x0, &(0x7f0000000740)) 19:47:32 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x1a, 0x1, &(0x7f0000000380)=@raw=[@call], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 19:47:32 executing program 4: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r0, &(0x7f000000c280)={&(0x7f0000000000)={0x2, 0x0, @empty}, 0x10, 0x0, 0x0, &(0x7f0000006c00)=ANY=[@ANYBLOB="1400009801800000000000001d003600"], 0x10}, 0x0) 19:47:32 executing program 3: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000180)="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", 0xcfa}], 0x1}, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmsg$kcm(r2, &(0x7f0000001300)={&(0x7f0000000e80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000f00)}, {&(0x7f0000000f40)=""/45, 0x2d}, {&(0x7f0000000f80)=""/201, 0xc9}, {&(0x7f0000001080)=""/163, 0xa3}, {&(0x7f0000001140)=""/141, 0x8d}], 0x5, &(0x7f0000001280)=""/124, 0x7c}, 0x20000280) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180), 0x4) r3 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000f00)='syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r3, &(0x7f0000001340)='cpu.stat\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x1a2f20}], 0x1, &(0x7f00000001c0)=""/17, 0x10036, 0x7301}, 0x3f00) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100), 0x10000000000001e0, &(0x7f0000000000), 0xfffffffffffffe92}, 0x40010e0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001380)='./cgroup.cpu/syz1\x00', 0x1ff) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='/\x02roup.stap\x00', 0x2761, 0x0) write$cgroup_subtree(r5, &(0x7f0000001700)=ANY=[@ANYBLOB="2b06322d46d777f7c6bf2da68ef2e50e907f19cac97473183f229967d8ebd8e8225c4ed06f70299c56a5455e084a01293f322d09411c4ce5b7a48400d12f322af0a0e7e81cfea4b498763b000000005755d7a8c850eb090e773c2ccece87e357f013340f92cef96f03bd45192d9144617a1800901273"], 0x1) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r5, 0xc020662a, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000001600)={0x6, 0x2, &(0x7f0000001400)=@raw=[@map_val={0x18, 0x4, 0x2, 0x0, r5, 0x0, 0x0, 0x0, 0x8}], &(0x7f0000001440)='syzkaller\x00', 0x1000, 0xbe, &(0x7f0000001480)=""/190, 0x0, 0x3, [], 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000001540)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000001580)={0x5, 0x1, 0x6, 0x3f}, 0x10, 0xffffffffffffffff}, 0x78) 19:47:32 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 241.179033] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.3'. 19:47:33 executing program 2: perf_event_open(&(0x7f000025c000)={0x2, 0x0, 0xe4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:33 executing program 0: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r0, &(0x7f0000000340), &(0x7f0000000400)="1c"}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000bc0)={r0, &(0x7f0000000ac0)="d8"}, 0x20) 19:47:33 executing program 5: socket$kcm(0xa, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_pid(r0, 0x0, 0xfffffd21) 19:47:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = dup2(0xffffffffffffffff, r3) getsockname$packet(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) socket(0xa, 0x3, 0x80) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:33 executing program 1: keyctl$read(0xf00, 0x0, 0x0, 0x0) 19:47:33 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10928, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1024}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:33 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 19:47:33 executing program 5: openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x4, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0x1) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2b, 0x5, 0x0) 19:47:33 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0), 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x11c, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/75) r2 = semget$private(0x0, 0x0, 0x0) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000100)=""/40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) creat(&(0x7f0000000400)='./bus/file0\x00', 0xd1) ftruncate(r4, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xe4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) lremovexattr(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="75736572616427640056d79ca154445abe7fef41f7ab3cd9586319eb43ad86584d43271f"]) close(r6) splice(r5, 0x0, r6, 0x0, 0x10000, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r7, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="1100000042000506000000366ab1001000ed623c087dcbffa241ee19776b1d9ada6676c7517f97b2d3add33b040000004c651514f99a98a2863c7c3935f1a55500000000000000000000010000000000009aa5db6becbf9abd5c2e059ff376546bea0ca054fb97b05be546de561172208235fcfd2dce9c50454c7012ba98d96188e7243469f14ec61078bff4fa2ae9d6b50b93e02cba5f9a319cddbe699cf8cd8fc982cd5a38cd6ae35453769cbb9113e1158ccc2bffa68a79b7fb95273ede90fae974d6917a88583f592797e0879b2a8377be70aaaf965217410e67ce6ca85b42511710e49c31277e7ed445c1eaa4ea6d13d65c2d47e34f9c8f36cb47ae408ffffca7d318993003dd57e4cb8d5e126217303d4568390a547fa79e6ef016696a196d39f18903238af9e17868cd9bb7299fa8300d561f1f8706c9106d8fbbd6000000000000000000000009836c39c41d63cac09ac76b36808bdb774cf50e2bfca9830000000000000000000000000000002422e9c16798953eceddee32072a580fa7bb4b375543971407421ef268971c737e39ab37d931c9509ebc056bbfe1553a57e70ab547b513093b2675f8dfaa9dec85440a682853643c97d1abc2be473818f1b9fa3ae5cddd50f86dea64c3ecd1cf42f8b26e0e9207676102b8c0478c1e29338144a12cd3d3ca2a4606ecf248abcf2a5297b878174959c3371e24295342ab935eee990ef35dc0811f0902be002cc6493cddc70733ca04a08a205331306f2cbb47292d5894419f2fc3010caf20844271109916c4d00e26988f2e04fea3dd8affb97a82b968f8d7510a8b82e77ef6c759204799e1d904c5c2d93ee8163db30766921680332ff385c902ba30b25168cb6a48a27a859fde8abe1a575c313866cf3c760568b604dd269427d237cdd592c01b703f791f3451864ca762fe291c9da7d5043f72a66f31884e63751cc399b1ae0100010000000000197552938738f85df52e3c0499b13856e34c5c3a7fc8843cfacfaf83f8fe3e0326c23c3af59be50e03f76321866dd5ba1c6441c64200"/777], 0x14}}, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:47:33 executing program 2: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x10, 0x0, 0x774) [ 241.962034] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.3'. 19:47:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1c) 19:47:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = dup2(0xffffffffffffffff, r3) getsockname$packet(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) socket(0xa, 0x3, 0x80) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:33 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x22, 0x2, 0x4) ioctl$IMGETCOUNT(r2, 0x80044943, &(0x7f00000001c0)) 19:47:33 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) preadv(r2, &(0x7f00000017c0), 0x11c, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000340)=""/75) r3 = semget$private(0x0, 0x3, 0x0) semctl$GETPID(r3, 0x0, 0xb, &(0x7f0000000100)=""/40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) ftruncate(0xffffffffffffffff, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) pipe(&(0x7f0000000080)) lremovexattr(&(0x7f0000000140)='./bus/file0\x00', 0x0) close(0xffffffffffffffff) r5 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r5, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/777], 0x14}}, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:47:33 executing program 5: shmget(0x3, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) 19:47:33 executing program 1: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f00000000c0), 0x0, 0x1) close(r1) splice(r0, 0x0, r1, 0x0, 0x10000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f00000000c0), 0x4) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x11c, 0x0) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f0000000340)=""/75) r2 = semget$private(0x0, 0x0, 0x0) semctl$GETPID(r2, 0x0, 0xb, &(0x7f0000000100)=""/40) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r3, 0x0) r4 = creat(&(0x7f00000002c0)='./bus\x00', 0x10) syz_open_dev$ttys(0xc, 0x2, 0x0) fcntl$setstatus(r4, 0x4, 0x6100) creat(&(0x7f0000000400)='./bus/file0\x00', 0xd1) ftruncate(r4, 0x8200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xe4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r6, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) lremovexattr(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="75736572616427640056d79ca154445abe7fef41f7ab3cd9586319eb43ad86584d43271f"]) close(r6) splice(r5, 0x0, r6, 0x0, 0x10000, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) recvmmsg(r7, &(0x7f0000002d80), 0x4000000000006b9, 0x1a002, &(0x7f0000000180)={0x77359400}) sendmsg$nl_generic(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="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"/777], 0x14}}, 0x0) write$cgroup_type(r4, &(0x7f0000000200)='threaded\x00', 0x175d900f) 19:47:33 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$security_capability(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000000c0), 0xc, 0x0) 19:47:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$security_capability(0x0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x1) 19:47:34 executing program 3: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) faccessat(0xffffffffffffffff, &(0x7f00000010c0)='./file0\x00', 0x100, 0x7b6773f4d4163740) 19:47:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x127) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r3 = socket$kcm(0xa, 0x2, 0x73) r4 = dup2(0xffffffffffffffff, r3) getsockname$packet(r4, 0x0, 0x0) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) socket(0xa, 0x3, 0x80) socket$inet6_sctp(0xa, 0x10000000005, 0x84) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x2003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x8880}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:47:34 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) getpeername(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x0) fstat(r0, 0x0) 19:47:34 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$security_capability(0x0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) 19:47:34 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = accept$unix(0xffffffffffffffff, 0x0, 0x0) signalfd(r0, 0x0, 0x0) 19:47:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}, {0x0}, {0x0}], 0x3) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/254, 0xfe}, {0x0}, {0x0}, {0x0}], 0x4}, 0x6) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00516) shutdown(r0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r2, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) r3 = dup(r1) shutdown(r3, 0x0) 19:47:34 executing program 2: ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) add_key$user(0x0, &(0x7f0000000380)={'syz'}, &(0x7f00000001c0)="bc", 0x1, 0xffffffffffffffff) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f0000000300)={0x0, 0x57f, 0x0, 0x8d}, 0x10) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000140)) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 19:47:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)=""/80, 0x50}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r2) ppoll(&(0x7f0000000180)=[{r3}], 0x1, &(0x7f00000001c0)={0x2}, 0x0, 0x0) shutdown(r1, 0x0) 19:47:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r7, &(0x7f0000000700)=[{&(0x7f0000000000)=""/35, 0x23}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 19:47:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f00000015c0)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000080)=""/80, 0x50}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xbf9d, 0x0, 0x0, 0x800e0053e) shutdown(r0, 0x0) ppoll(&(0x7f0000000180)=[{}], 0x1, &(0x7f00000001c0)={0x2}, 0x0, 0x0) shutdown(r1, 0x0) 19:47:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:47:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000180)=""/217, 0xd9}, {0x0}, {0x0}], 0x3) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00527) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000780)=[{&(0x7f0000000000)=""/14, 0xe}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x8) shutdown(r1, 0x0) 19:47:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:47:35 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, &(0x7f0000000040)) 19:47:35 executing program 3: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/loop-control\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) close(r0) openat$fuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/fuse\x00', 0x2, 0x0) syz_kvm_setup_cpu$x86(r0, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) 19:47:35 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r1, 0x10d, 0xa00000000f, &(0x7f0000000040)="03", 0x1) 19:47:35 executing program 3: 19:47:35 executing program 2: 19:47:35 executing program 3: 19:47:35 executing program 0: 19:47:35 executing program 2: 19:47:35 executing program 3: 19:47:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r7, &(0x7f0000000700)=[{&(0x7f0000000000)=""/35, 0x23}, {0x0}, {0x0}, {0x0}], 0x4) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 19:47:35 executing program 4: 19:47:35 executing program 1: 19:47:35 executing program 3: 19:47:35 executing program 2: 19:47:35 executing program 0: 19:47:35 executing program 1: 19:47:35 executing program 3: 19:47:36 executing program 4: 19:47:36 executing program 0: 19:47:36 executing program 2: 19:47:36 executing program 3: 19:47:36 executing program 5: 19:47:36 executing program 0: 19:47:36 executing program 2: 19:47:36 executing program 3: 19:47:36 executing program 4: 19:47:36 executing program 1: 19:47:36 executing program 0: 19:47:36 executing program 4: 19:47:36 executing program 1: 19:47:36 executing program 2: 19:47:36 executing program 5: 19:47:36 executing program 3: 19:47:36 executing program 4: 19:47:36 executing program 1: 19:47:36 executing program 0: 19:47:36 executing program 5: 19:47:36 executing program 3: 19:47:36 executing program 2: 19:47:36 executing program 4: 19:47:36 executing program 0: 19:47:36 executing program 1: 19:47:36 executing program 5: 19:47:36 executing program 2: 19:47:36 executing program 1: 19:47:36 executing program 3: 19:47:36 executing program 0: 19:47:36 executing program 4: 19:47:36 executing program 5: 19:47:36 executing program 3: 19:47:36 executing program 2: 19:47:36 executing program 1: 19:47:36 executing program 0: 19:47:36 executing program 4: 19:47:37 executing program 5: 19:47:37 executing program 3: 19:47:37 executing program 1: 19:47:37 executing program 2: 19:47:37 executing program 0: 19:47:37 executing program 4: 19:47:37 executing program 5: 19:47:37 executing program 3: 19:47:37 executing program 1: 19:47:37 executing program 0: 19:47:37 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x5, &(0x7f0000000000), 0x4) 19:47:37 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) 19:47:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000001000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000004dfe4fd07b1e000900000000000000000000000000000000000040000000000000000000000000000000000000110000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000"], 0xb8}}, 0x0) 19:47:37 executing program 3: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0xf, 0x4, 0x4, 0x4, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") close(r0) 19:47:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) getpeername(r0, 0x0, &(0x7f0000000100)) 19:47:37 executing program 1: r0 = socket$inet6(0xa, 0x80002, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x88, 0x20, 0x0, 0x0) [ 245.538420] audit: type=1804 audit(1576180057.376:64): pid=9287 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.4" name="/root/syzkaller-testdir716844886/syzkaller.ltE3lT/72/memory.events" dev="sda1" ino=16639 res=1 19:47:37 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x300) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x4) sendmsg$kcm(r1, &(0x7f0000003d00)={&(0x7f0000000380)=@in={0x2, 0x4e23, @local}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory', 0xea}]}, 0xfa38) 19:47:37 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000062000, 0x500001c) 19:47:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) r1 = socket$kcm(0x2, 0x6, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x0) 19:47:37 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x541b, &(0x7f00000001c0)='bond0\x00') 19:47:37 executing program 3: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00', 0x0, 0x10}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) 19:47:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 19:47:37 executing program 2: 19:47:37 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xb0, 0x10, &(0x7f0000000000), 0xfffffffffffffe69}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x1800000000000060, 0xe80, 0x0, &(0x7f0000000000)="b90703e6680d698cb89e15f02cea", 0x0, 0x100}, 0x28) 19:47:37 executing program 3: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_bp={0x0}, 0x30}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)) syz_genetlink_get_family_id$tipc(0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000300)='./file1\x00', 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x73ffec8e5805a0ba) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{}, {{@in6=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r7}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r5}, [@IFLA_MASTER={0x8, 0xa, r7}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000300)={'syz_tun\x00'}) r10 = socket$nl_route(0x10, 0x3, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r11, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r10, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, 0x0) r14 = socket$nl_route(0x10, 0x3, 0x0) r15 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r15, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r15, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$nl_route(r14, 0x0, 0x0) sendmsg$nl_route(r13, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r16, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000200)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) r17 = socket(0x100000000011, 0xa, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000140)) getsockopt$inet_mreqn(r17, 0x0, 0x23, &(0x7f0000000380)={@multicast2, @dev}, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r18 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$nl_route(0x10, 0x3, 0x0) r19 = socket(0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r19, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r20}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r18, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_MASTER={0x8, 0xa, r20}]}, 0x28}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r21, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r25, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r25, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r24, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r26}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(r22, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newlink={0x28, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r23}, [@IFLA_MASTER={0x8, 0xa, r26}]}, 0x28}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}]}, 0x34}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 245.856426] audit: type=1804 audit(1576180057.696:65): pid=9311 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir449488632/syzkaller.zPYO0e/83/memory.events" dev="sda1" ino=16633 res=1 19:47:37 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:37 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000240)=[{&(0x7f0000002340)="49024903d6ad8c12d0bbdb9da8429373d46477e65ba1cb9ada039403d96edbc9c862adfa64c8223fbc4d28ea22f244b14cd39c5fe2b958ae194e5eba57d73f572c2f14227da64124edda769444d57c6b09cd3e8f3b8ea221b38175f0cb6707e2e17cf71b5135446dd174f85fdbca0c83437b99a57c68fd975472d106827990151738a47309e535bf4856867c3daed7bf53a9fc377ff1443c5c442b7db3d5a53d857841b6130a0e3e633dee866e33bc087e535498eab508bf3eae428887569a81455c79f0f98175e20ca2d3ac93689f66840c3b0649e54c43b47ecbec0fe8a85e1f22bff8772f5d77eae774e3baa1335039aaffe18500043e9a100a3d0d85fca16f7b9f9565d3d3ce3e96fb93d35bba5026df59379342eca54abecebed2270ba185d854edc62a7012207204164d92f3e2795bb1475c1f977aff6029b35ff3b849db33414e0946e70ceda1bc388019039a5b16d3b6976d83630f415ca62f76d5ac2d41d17a2c7d953eadd069cbd624d1adaaa28dda70c6a6effe5eed44d72c9dbe739100157819fc5a5b371747973b77f506121cc863cbbebb6d3d1494d83e460522", 0x1a1}], 0x1) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000600)=0xda8, 0x4) sendto$inet(r0, &(0x7f00000012c0)='\f', 0x1d4c, 0x4815, 0x0, 0x0) 19:47:38 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r1, r2) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0xff, 0x9, 0x7, 0x8, 0x0, 0x6e92, 0x8000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x43a0a, 0x7, 0x8001, 0x6, 0x2, 0xffff, 0x8001}, r1, 0x6, r0, 0x1) [ 246.290984] audit: type=1804 audit(1576180058.126:66): pid=9345 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir449488632/syzkaller.zPYO0e/83/memory.events" dev="sda1" ino=16633 res=1 19:47:38 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000280)={0x0, @time={0x0, 0x1c9c380}}) 19:47:38 executing program 2: clone(0x3102801ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000aa8000/0x2000)=nil, 0x2000, 0x0, 0x812, r0, 0x0) mlockall(0x2) 19:47:38 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) [ 246.494060] audit: type=1400 audit(1576180058.326:67): avc: denied { map } for pid=9359 comm="syz-executor.2" path="socket:[36505]" dev="sockfs" ino=36505 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=unix_dgram_socket permissive=1 19:47:38 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r1, r2) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0xff, 0x9, 0x7, 0x8, 0x0, 0x6e92, 0x8000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x43a0a, 0x7, 0x8001, 0x6, 0x2, 0xffff, 0x8001}, r1, 0x6, r0, 0x1) 19:47:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000040)=@gcm_256={{}, "024e0385db92b63b", "5dbd9ea84a78f7893d8b17ba7b050b2445b14712684882ed9ef6540fafb6e018", "9bd7ca31", "4f8bfc5fa4a7fac8"}, 0x38) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) writev(r0, &(0x7f0000000240)=[{&(0x7f0000002340)='I', 0x1}], 0x1) 19:47:38 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 247.047721] bridge1: port 1(syz_tun) entered blocking state [ 247.070233] bridge1: port 1(syz_tun) entered disabled state [ 247.078829] device syz_tun entered promiscuous mode [ 247.182018] device syz_tun left promiscuous mode [ 247.205954] bridge1: port 1(syz_tun) entered disabled state 19:47:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000280)=""/101) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0xff00) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0xa, 0x2, 0x73) dup2(0xffffffffffffffff, r1) socket$inet6_sctp(0xa, 0x0, 0x84) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) 19:47:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x401000000001, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r1, 0x0) write$P9_RWALK(r1, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r2 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r1, r2) perf_event_open$cgroup(&(0x7f00000000c0)={0x2, 0x70, 0x0, 0x9, 0x7, 0x8, 0x0, 0x6e92, 0x8000, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x1}, 0x43a0a, 0x7, 0x8001, 0x6, 0x2, 0xffff, 0x8001}, r1, 0x6, r0, 0x1) creat(0x0, 0x109) 19:47:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000240)={"aa9028eb70b13ca413ac210e1b8203ee217f5554518f196e765635a18ecaa8c97c7acdb964184f46dae5acc9e93859e55dfa2596c53890e2a502a92ab99a40fa1d39cd1b331fefd95b464c7390ef8f9ac7cfd35c6039432e2f836d593a42eb6747ebd45ab80e8df41a7136a98bd579494f50a5d1785ee012fb9d596a4cf6d48535011e0a1bd22982b48e43b2329dd59036609d943802ce1490c310b254569d92a6c25db29621b0d5a7fc53f9c1bf7e6b2b85c83ad8ae354b418b8e181ed709990e0d6274d172c2bded54dce1c80d3fff72e872fa40ccfd4f3787fcad71f4b04d1197ff12d6fbc1fefb7659288ca4fe9776ed8a4fd568033d4d44bf0440220b8f3b5e744905fd32affd6374b3eaceff586cdc6d839a401d108340ccf88f8b74e6b0f33936d5eadd84e8affdf38ef92838dedee6540c5c64d7d6384a8f3169f437eee5b630addd8deda48f0176a01040c5c4783468ce71249644496fdd9171fa7eca04595d67b18d2151fbe06167744f1cba8185dcad17fb0955f48002df76b2687a51cad31876506942a3455c81fd63cfbf1c76cecc714e71068d3e37fffce4e0406b68ec3c5450bccb7a8bc8a2b3d6ebcc6af4d71f98301399da17abe9afd7005a63d98f67dbb6ad16427be201fbe72c875762191d6ffb64d29e2e6096887dbe8ae4560493bc36cfdbd66b37567e813548af533aae3d60ccf4b6586263167e5b7574ba69113bda109d8ac0255eed34ae61cbc9c5e816bccb2d03be1c4dc9d87db94d2a5f60219c84b9a5f883acb85b0338957e50669c9835858732e707bec827316bbb948acd4b6936bbc4cf54e7ade65651b60da4ff488a7798e58a559622ea55ec63a51a0b15384265578b5f945f1bfd2059abec811f0477879d6e2c0f3dcb96873aeaf4fc5ed6ef02be693b395b10639fe8900ba959f56bebcefef6c2f880088d38aaeebb4ba9b85300ce278f97acaf13c8c9258083804038d3c50a8e1a1ed7a0c4ade5ac8d4a85d084a38163f92750ff3552ee48edb14a6facc8d9d5811c2ea6627deb46f1b0f3155160fe6b19b31e28798f0661d1c693eb88bf8ef31128f8a561ea5b5e1308c848af1a21e182a9e13eae921746861b9b2ba3defd678643bbc43f9b38abd3aa200ae4862a8cc84a652b476a2b5e71d30bb65269785d056d9a38a7554b279b93abdeafbf8c05563e14bbba91fc8d0b99aef5c004f25f76e845cb9bbc0bd7ae46eeeb4bd05854ee8ec7c370fde6381c99780f5ee717d37b100e37562e96ca0508b3757a2b6854481caa7cdc474659d3340e3991efd3307149f519d0956d9896fd846d626e0f3687bcf83df6061b12518ff32830923f220d61b108712f7ab2a1d57b209a3b3959aad4a05c7c71c4e1b6e33f06d3631934cb73781bd24dc93fb22f5590cb2ec63da54038a4752eef39b7f83d314d505de24b59"}) 19:47:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000000)="2e00000022008151e00f80ecdb4cb904044865160b00170002000000000004140e00110002000000dc2976d153b4", 0x235}], 0x1}, 0x0) 19:47:39 executing program 2: clone(0x3102801ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x6, 0x8031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000aa8000/0x2000)=nil, 0x2000, 0x0, 0x812, r0, 0x0) mlockall(0x2) 19:47:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:39 executing program 1: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() tkill(r0, 0x9) 19:47:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:39 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, 0x0, 0x0) 19:47:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:39 executing program 1: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'\x00', 0x400}) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000200)={0x94, &(0x7f0000000140)}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x43732e5398416d0a}) 19:47:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) setsockopt$sock_attach_bpf(r0, 0x10e, 0x2, 0x0, 0x2f6) 19:47:39 executing program 4: socketpair(0x1e, 0x80005, 0x0, &(0x7f0000000340)={0x0, 0x0}) recvmsg(r1, &(0x7f000000e980)={0x0, 0x0, &(0x7f000000e900)=[{&(0x7f000000e840)=""/135, 0x87}], 0x1}, 0x2) sendmsg$tipc(r0, &(0x7f00000017c0)={0x0, 0x0, &(0x7f00000016c0)=[{&(0x7f0000000680)=']', 0x1}], 0x1}, 0x0) 19:47:39 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000130081f87059ae08060c04000aff0f020000000000000187015467abca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a03000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 19:47:39 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 248.039422] audit: type=1400 audit(1576180059.876:68): avc: denied { setopt } for pid=9460 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:47:39 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x5aeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x1, 0x0, [0x0]}) 19:47:40 executing program 2: r0 = socket$kcm(0x2, 0x1, 0x84) sendmsg$inet(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)='9', 0x1}], 0x1, &(0x7f00000001c0)=[@ip_tos_int={{0x14}}], 0x18}, 0x0) 19:47:40 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x20004004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000000c0)='cgrou\xb0\xfat\xa9pe\x00', 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="c5e12fc72ef374198129543fa391116ae27782a5c83dbf7a42bbee0e3e44e69e78ce8856f25ccac4543948988caab0da2c605a2dab60e52bdd06b5a8ae33986c1fb2cecd791143e0b2f01466079ade297c18b2ce372de43d14b49a8312a7ffbd5a99680cb8d25288b9f201e707b053a08ff89d1c06e8", 0x76}], 0x1}, 0x40000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400005) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 19:47:40 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000130081f87059ae08060c04000aff0f020000000000000187015467abca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a03000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) 19:47:40 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.stet\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) r1 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x3e, &(0x7f00000002c0)=r0, 0x161) sendmsg$kcm(r1, &(0x7f0000000540)={&(0x7f0000000380)=@in={0x2, 0x4e23, @rand_addr=0x7fffffff}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r1, &(0x7f0000000280)={[{0x0, 'memory'}]}, 0xfdef) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={0xffffffffffffffff, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x0, 0x1}, 0x0, 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 19:47:40 executing program 4: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) setsockopt$sock_attach_bpf(r1, 0x10e, 0x2, &(0x7f0000000000)=r2, 0x4) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) 19:47:40 executing program 5: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) r0 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8943, 0x0) 19:47:40 executing program 0: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) faccessat(0xffffffffffffffff, 0x0, 0x100, 0x0) 19:47:40 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000000), &(0x7f0000000040)=0x4) 19:47:40 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x20004004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000000c0)='cgrou\xb0\xfat\xa9pe\x00', 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="c5e12fc72ef374198129543fa391116ae27782a5c83dbf7a42bbee0e3e44e69e78ce8856f25ccac4543948988caab0da2c605a2dab60e52bdd06b5a8ae33986c1fb2cecd791143e0b2f01466079ade297c18b2ce372de43d14b49a8312a7ffbd5a99680cb8d25288b9f201e707b053a08ff89d1c06e8", 0x76}], 0x1}, 0x40000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400005) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 19:47:40 executing program 0: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x6}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}], 0x1}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}], 0x4}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}, {0x0}, {0x0}], 0x3) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:40 executing program 0: syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000001800)=[{&(0x7f0000000000)=""/18, 0x12}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00545) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r2, &(0x7f0000000200)=[{&(0x7f0000000100)=""/23, 0x17}], 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x73a0b1b, 0x0, 0x0, 0x800e00549) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)=""/116, 0x74}], 0x1}, 0x0) r5 = dup(r4) r6 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r6, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r5, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r7, &(0x7f0000000700)=[{&(0x7f0000000000)=""/35, 0x23}, {0x0}, {0x0}], 0x3) shutdown(r6, 0x0) shutdown(r3, 0x0) shutdown(r1, 0x0) 19:47:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001980)=[{&(0x7f00000006c0)=""/4096, 0x1000}, {0x0}, {0x0}, {0x0}, {0x0}], 0x5}, 0x0) r1 = dup(r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00505) shutdown(r1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r3, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001a40)=""/4096, 0x1000}, {0x0}], 0x2}, 0x2) r4 = dup(r3) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0x1de, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) readv(r6, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/217, 0xd9}], 0x1) shutdown(r5, 0x0) shutdown(r2, 0x0) 19:47:40 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x20004004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000000c0)='cgrou\xb0\xfat\xa9pe\x00', 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="c5e12fc72ef374198129543fa391116ae27782a5c83dbf7a42bbee0e3e44e69e78ce8856f25ccac4543948988caab0da2c605a2dab60e52bdd06b5a8ae33986c1fb2cecd791143e0b2f01466079ade297c18b2ce372de43d14b49a8312a7ffbd5a99680cb8d25288b9f201e707b053a08ff89d1c06e8", 0x76}], 0x1}, 0x40000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400005) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 19:47:40 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0x2aa, 0x20000001}, 0x20004004) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'\xf6\xff\xff\xff\xff\xff\xff\xff\x00\xe9\xd5\x00', 0x200091}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x4006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f00000000c0)='cgrou\xb0\xfat\xa9pe\x00', 0x2, 0x0) socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000003c0)="c5e12fc72ef374198129543fa391116ae27782a5c83dbf7a42bbee0e3e44e69e78ce8856f25ccac4543948988caab0da2c605a2dab60e52bdd06b5a8ae33986c1fb2cecd791143e0b2f01466079ade297c18b2ce372de43d14b49a8312a7ffbd5a99680cb8d25288b9f201e707b053a08ff89d1c06e8", 0x76}], 0x1}, 0x40000) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400005) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='cpuacct.usage_all\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000500)=0x3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, 0x0) write$cgroup_subtree(r4, &(0x7f0000000380)=ANY=[], 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000000), 0x12) gettid() openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) 19:47:40 executing program 4: r0 = socket$packet(0x11, 0x40800000000003, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x100, 0xb5481f3e129391aa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x800, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000040)="0104000073d1600000000000fbf55b42b90516db4d916502c555cf09570300a44b29d9fde6ea94211af8e74bab5b98aa9d89060000c846781d1aab3668c64de00004000000711608f2003ee478efddfc86a15aaaf3cd1ad1dfff004000000033e065b42ba58f7599e526b9ac2927b5ecccea8cb77d9e25", 0xfefb, 0x80001, 0x0, 0x35) 19:47:40 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:40 executing program 2: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) unlink(&(0x7f0000000300)='./bus\x00') mmap(&(0x7f0000008000/0x600000)=nil, 0x600000, 0x0, 0x11, r0, 0x0) [ 249.114784] protocol 88fb is buggy, dev hsr_slave_0 [ 249.120198] protocol 88fb is buggy, dev hsr_slave_1 19:47:41 executing program 3: io_setup(0x7, &(0x7f0000000100)=0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0}]) 19:47:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:41 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r3, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x4, [0x4d0, 0x0, 0xc0000101], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 19:47:41 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:41 executing program 2: socket$inet(0x2, 0x2, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f00000000c0)={0x7a, 0x4, [0x4d0, 0x0, 0xc0000101], [0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10]}) 19:47:41 executing program 4: 19:47:41 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(0x0, 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:41 executing program 4: 19:47:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:41 executing program 3: 19:47:41 executing program 2: 19:47:41 executing program 4: 19:47:41 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:41 executing program 3: 19:47:41 executing program 5: 19:47:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:41 executing program 2: 19:47:41 executing program 5: 19:47:41 executing program 4: 19:47:41 executing program 2: 19:47:41 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:41 executing program 3: 19:47:41 executing program 5: 19:47:41 executing program 2: 19:47:41 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:41 executing program 4: 19:47:41 executing program 3: 19:47:41 executing program 5: 19:47:41 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, 0x0) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:41 executing program 2: 19:47:41 executing program 4: 19:47:41 executing program 3: 19:47:42 executing program 5: 19:47:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 2: 19:47:42 executing program 4: 19:47:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:42 executing program 5: 19:47:42 executing program 3: 19:47:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 4: 19:47:42 executing program 2: 19:47:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:42 executing program 5: 19:47:42 executing program 3: 19:47:42 executing program 4: 19:47:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 2: 19:47:42 executing program 3: 19:47:42 executing program 5: 19:47:42 executing program 4: 19:47:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(0xffffffffffffffff, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:42 executing program 1: write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 2: 19:47:42 executing program 3: 19:47:42 executing program 5: 19:47:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, 0x0, 0x0) 19:47:42 executing program 4: 19:47:42 executing program 1: write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 2: 19:47:42 executing program 3: 19:47:42 executing program 1: write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:42 executing program 5: 19:47:42 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, 0x0, 0x0) 19:47:42 executing program 4: 19:47:42 executing program 2: 19:47:42 executing program 3: 19:47:42 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:43 executing program 4: 19:47:43 executing program 5: 19:47:43 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, 0x0, 0x0) 19:47:43 executing program 2: 19:47:43 executing program 3: 19:47:43 executing program 4: 19:47:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:43 executing program 5: 19:47:43 executing program 2: 19:47:43 executing program 0: 19:47:43 executing program 4: 19:47:43 executing program 3: 19:47:43 executing program 5: 19:47:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:43 executing program 2: 19:47:43 executing program 4: 19:47:43 executing program 3: 19:47:43 executing program 5: 19:47:43 executing program 0: 19:47:43 executing program 2: 19:47:43 executing program 3: 19:47:43 executing program 4: 19:47:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:43 executing program 0: 19:47:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r0, r1) 19:47:43 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x50000}]}) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x1) 19:47:43 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) getpid() clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000340)='[\'eth1-#\x00', 0xffffffffffffffff) 19:47:43 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x800143042, 0x0) ioctl$GIO_SCRNMAP(0xffffffffffffffff, 0x4b40, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = gettid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) stat(0x0, 0x0) fcntl$addseals(r0, 0x409, 0x0) tkill(r1, 0x1020000000016) 19:47:43 executing program 0: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f0000000100)={[{0xa20b, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa8, 0x9}, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}]}) 19:47:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) 19:47:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x0, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:44 executing program 0: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$sock_SIOCSIFVLAN_SET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x8983, &(0x7f00000000c0)={0x3, 'veth1\x00', {0xfff}, 0x9}) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000140)={0x0, 0x2, 0xffffffff, 0x2}) getsockopt$TIPC_NODE_RECVQ_DEPTH(r1, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980)='/dev/cachefiles\x00', 0x2280, 0x0) getsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f00000009c0), &(0x7f0000000a00)=0x4) ioctl$NBD_DO_IT(r1, 0xab03) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dlm-monitor\x00', 0x400000, 0x0) ioctl$KVM_REINJECT_CONTROL(r2, 0xae71, &(0x7f0000000a80)={0x6a}) r4 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000ac0)='/selinux/mls\x00', 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0xaf) r5 = syz_open_dev$tty1(0xc, 0x4, 0x2) sync_file_range(r5, 0x5, 0xfffffffffffffd18, 0x1) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000b00)) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) r6 = msgget(0x2, 0xa30) msgrcv(r6, &(0x7f0000000bc0)={0x0, ""/207}, 0xd7, 0x2, 0x6000) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000cc0)={0x2, [0x40, 0x7fff]}, &(0x7f0000000d00)=0x8) r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000d40)='/dev/hwrng\x00', 0x100, 0x0) ioctl$VT_WAITACTIVE(r7, 0x5607) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000dc0)={0x0, 0xfaca, 0x1, [0x7fff]}, &(0x7f0000000e00)=0xa) setsockopt$inet_sctp_SCTP_ASSOCINFO(r8, 0x84, 0x1, &(0x7f0000000e40)={r9, 0xffff, 0x4, 0x3f, 0x40, 0x7}, 0x14) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000e80)='/proc/capi/capi20ncci\x00', 0x400, 0x0) setsockopt$RDS_GET_MR(r10, 0x114, 0x2, &(0x7f0000000f80)={{&(0x7f0000000ec0)=""/75, 0x4b}, &(0x7f0000000f40), 0x10}, 0x20) ioctl$FS_IOC_SETFLAGS(r10, 0x40086602, &(0x7f0000000fc0)=0x5) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/user\x00', 0x2, 0x0) 19:47:44 executing program 2 (fault-call:3 fault-nth:0): openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r0, r1) 19:47:44 executing program 4 (fault-call:2 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:44 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 252.316107] FAULT_INJECTION: forcing a failure. [ 252.316107] name failslab, interval 1, probability 0, space 0, times 1 [ 252.392097] CPU: 1 PID: 9845 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 252.399861] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.409230] Call Trace: [ 252.411927] dump_stack+0x197/0x210 [ 252.415623] should_fail.cold+0xa/0x1b [ 252.419533] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 252.424655] ? lock_downgrade+0x880/0x880 [ 252.428835] __should_failslab+0x121/0x190 [ 252.433105] should_failslab+0x9/0x14 [ 252.436921] kmem_cache_alloc_trace+0x2cc/0x760 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 252.441692] ? lock_acquire+0x16f/0x3f0 [ 252.445736] ? vb2_fop_write+0xf0/0x410 [ 252.449782] __vb2_init_fileio+0x1cb/0xbe0 [ 252.454091] ? kstrtouint+0x142/0x1a0 [ 252.457916] __vb2_perform_fileio+0xc9a/0x1170 [ 252.462571] ? mutex_trylock+0x1e0/0x1e0 [ 252.466667] ? vb2_core_poll+0x780/0x780 [ 252.470760] vb2_write+0x38/0x50 [ 252.474153] vb2_fop_write+0x212/0x410 [ 252.478060] ? vb2_fop_poll+0x260/0x260 [ 252.482111] v4l2_write+0x1cc/0x230 [ 252.485766] __vfs_write+0x114/0x810 [ 252.489501] ? v4l2_poll+0x200/0x200 [ 252.493235] ? kernel_read+0x120/0x120 [ 252.497141] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 252.502727] ? __inode_security_revalidate+0xda/0x120 [ 252.507941] ? avc_policy_seqno+0xd/0x70 [ 252.512019] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 252.517049] ? selinux_file_permission+0x92/0x550 [ 252.521916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.527461] ? security_file_permission+0x89/0x230 [ 252.532400] ? rw_verify_area+0x118/0x360 [ 252.536556] vfs_write+0x20c/0x560 [ 252.540100] ksys_write+0x14f/0x2d0 [ 252.543730] ? __ia32_sys_read+0xb0/0xb0 [ 252.547796] ? do_syscall_64+0x26/0x620 [ 252.551773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.557142] ? do_syscall_64+0x26/0x620 [ 252.561130] __x64_sys_write+0x73/0xb0 [ 252.565025] do_syscall_64+0xfd/0x620 [ 252.568849] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.574057] RIP: 0033:0x45a909 19:47:44 executing program 0 (fault-call:2 fault-nth:0): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(0xffffffffffffffff, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 252.577263] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.596185] RSP: 002b:00007f3757e52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.603901] RAX: ffffffffffffffda RBX: 00007f3757e52c90 RCX: 000000000045a909 [ 252.611169] RDX: 000000000000050f RSI: 0000000020000600 RDI: 0000000000000005 [ 252.618439] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 252.625706] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3757e536d4 [ 252.632981] R13: 00000000004cbd8c R14: 00000000004e5a10 R15: 0000000000000006 [ 252.676765] FAULT_INJECTION: forcing a failure. [ 252.676765] name failslab, interval 1, probability 0, space 0, times 1 [ 252.688798] CPU: 0 PID: 9863 Comm: syz-executor.3 Not tainted 4.19.88-syzkaller #0 [ 252.696546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.705917] Call Trace: [ 252.708531] dump_stack+0x197/0x210 [ 252.712166] should_fail.cold+0xa/0x1b [ 252.716059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 252.721187] ? lock_downgrade+0x880/0x880 [ 252.725354] __should_failslab+0x121/0x190 [ 252.729599] should_failslab+0x9/0x14 [ 252.733405] __kmalloc+0x2e2/0x750 [ 252.736957] ? kernfs_fop_write+0x33b/0x480 [ 252.741284] kernfs_fop_write+0x33b/0x480 [ 252.745439] __vfs_write+0x114/0x810 [ 252.749154] ? kernfs_fop_open+0xd80/0xd80 [ 252.753388] ? kernel_read+0x120/0x120 [ 252.757301] ? __lock_is_held+0xb6/0x140 [ 252.761382] ? rcu_read_lock_sched_held+0x110/0x130 [ 252.766402] ? rcu_sync_lockdep_assert+0x6d/0xb0 [ 252.771173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.776711] ? __sb_start_write+0x1a9/0x360 [ 252.781038] vfs_write+0x20c/0x560 [ 252.784587] ksys_write+0x14f/0x2d0 [ 252.788217] ? __ia32_sys_read+0xb0/0xb0 [ 252.792282] ? do_syscall_64+0x26/0x620 [ 252.796285] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.801650] ? do_syscall_64+0x26/0x620 [ 252.805630] __x64_sys_write+0x73/0xb0 [ 252.809524] do_syscall_64+0xfd/0x620 [ 252.813326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 252.818513] RIP: 0033:0x45a909 [ 252.821708] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 252.840626] RSP: 002b:00007f9882b9bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.848352] RAX: ffffffffffffffda RBX: 00007f9882b9bc90 RCX: 000000000045a909 [ 252.855619] RDX: 0000000000000012 RSI: 0000000020000040 RDI: 0000000000000004 [ 252.862884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 252.870151] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9882b9c6d4 [ 252.877418] R13: 00000000004cbe1d R14: 00000000004e5ad0 R15: 0000000000000005 [ 252.886406] FAULT_INJECTION: forcing a failure. [ 252.886406] name failslab, interval 1, probability 0, space 0, times 0 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:44 executing program 2 (fault-call:3 fault-nth:1): openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 252.921770] CPU: 1 PID: 9868 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 252.929547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.938907] Call Trace: [ 252.939006] dump_stack+0x197/0x210 [ 252.939025] should_fail.cold+0xa/0x1b [ 252.939040] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 252.939055] ? lock_downgrade+0x880/0x880 [ 252.945404] __should_failslab+0x121/0x190 [ 252.945420] should_failslab+0x9/0x14 [ 252.945436] kmem_cache_alloc+0x2ae/0x700 [ 252.970717] ? __might_sleep+0x95/0x190 [ 252.974715] __anon_vma_prepare+0x62/0x3c0 [ 252.978964] do_huge_pmd_anonymous_page+0xeff/0x14e0 [ 252.984095] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 252.988858] ? __pmd+0x60/0x60 [ 252.992064] __handle_mm_fault+0x2c80/0x3f80 [ 252.996490] ? copy_page_range+0x2030/0x2030 [ 253.000928] ? count_memcg_event_mm+0x2b1/0x4d0 [ 253.005615] handle_mm_fault+0x1b5/0x690 [ 253.009700] __do_page_fault+0x62a/0xe90 [ 253.013784] ? vmalloc_fault+0x740/0x740 [ 253.017860] ? trace_hardirqs_off_caller+0x65/0x220 [ 253.022889] ? __might_fault+0x12b/0x1e0 [ 253.026971] do_page_fault+0x71/0x57d [ 253.030812] page_fault+0x1e/0x30 [ 253.031585] FAULT_INJECTION: forcing a failure. [ 253.031585] name failslab, interval 1, probability 0, space 0, times 0 [ 253.034270] RIP: 0010:__put_user_4+0x1c/0x30 19:47:44 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 253.034286] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 253.034294] RSP: 0018:ffff8880812bfe18 EFLAGS: 00010293 [ 253.034316] RAX: 0000000000000004 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 253.088203] RDX: 0000000000000059 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 253.095503] RBP: ffff8880812bfee0 R08: ffff88804fd1c040 R09: 0000000000000000 [ 253.095512] R10: ffff88804fd1c8c0 R11: ffffffff8a778db8 R12: 0000000000000002 [ 253.095520] R13: 0000000000000004 R14: 0000000000000005 R15: 0000000000000000 [ 253.095546] ? __might_fault+0x1a3/0x1e0 [ 253.095631] ? __sys_socketpair+0x11f/0x5d0 [ 253.095648] ? __ia32_sys_socket+0xb0/0xb0 [ 253.110194] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.110207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.110226] ? do_syscall_64+0x26/0x620 [ 253.110241] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.110252] ? do_syscall_64+0x26/0x620 [ 253.110270] __x64_sys_socketpair+0x97/0xf0 [ 253.110285] do_syscall_64+0xfd/0x620 [ 253.110300] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.110314] RIP: 0033:0x45a909 [ 253.169557] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.188487] RSP: 002b:00007f0283382c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 253.196217] RAX: ffffffffffffffda RBX: 00007f0283382c90 RCX: 000000000045a909 [ 253.203483] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 253.210741] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 19:47:45 executing program 3 (fault-call:2 fault-nth:1): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 253.217998] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833836d4 [ 253.225277] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000003 [ 253.246046] CPU: 1 PID: 9873 Comm: syz-executor.2 Not tainted 4.19.88-syzkaller #0 [ 253.253801] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.263170] Call Trace: [ 253.265774] dump_stack+0x197/0x210 [ 253.269405] should_fail.cold+0xa/0x1b [ 253.273287] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 253.278384] ? lock_downgrade+0x880/0x880 [ 253.282529] __should_failslab+0x121/0x190 [ 253.286757] should_failslab+0x9/0x14 [ 253.290546] __kmalloc+0x2e2/0x750 [ 253.294075] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.299443] ? mark_held_locks+0x100/0x100 [ 253.303671] ? __vb2_queue_alloc+0xf2/0xe90 [ 253.308048] ? vivid_vid_cap_overlay.cold+0x2b/0x2b [ 253.313173] __vb2_queue_alloc+0xf2/0xe90 [ 253.317375] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.322398] ? vivid_vid_cap_overlay.cold+0x2b/0x2b [ 253.327431] vb2_core_reqbufs+0x449/0xd70 [ 253.331595] ? vb2_core_create_bufs+0x830/0x830 [ 253.336266] ? rcu_read_lock_sched_held+0x110/0x130 [ 253.341291] ? lock_acquire+0x16f/0x3f0 [ 253.345272] ? vb2_fop_write+0xf0/0x410 [ 253.349243] __vb2_init_fileio+0x33f/0xbe0 [ 253.353476] ? kstrtouint+0x142/0x1a0 [ 253.357291] __vb2_perform_fileio+0xc9a/0x1170 [ 253.361864] ? mutex_trylock+0x1e0/0x1e0 [ 253.365939] ? vb2_core_poll+0x780/0x780 [ 253.369997] vb2_write+0x38/0x50 [ 253.373367] vb2_fop_write+0x212/0x410 [ 253.377247] ? vb2_fop_poll+0x260/0x260 [ 253.381224] v4l2_write+0x1cc/0x230 [ 253.384848] __vfs_write+0x114/0x810 [ 253.388569] ? v4l2_poll+0x200/0x200 [ 253.392276] ? kernel_read+0x120/0x120 [ 253.396168] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 253.401702] ? __inode_security_revalidate+0xda/0x120 [ 253.406900] ? avc_policy_seqno+0xd/0x70 [ 253.410955] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 253.415966] ? selinux_file_permission+0x92/0x550 [ 253.420799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.426330] ? security_file_permission+0x89/0x230 [ 253.431269] ? rw_verify_area+0x118/0x360 [ 253.435408] vfs_write+0x20c/0x560 [ 253.438947] ksys_write+0x14f/0x2d0 [ 253.442567] ? __ia32_sys_read+0xb0/0xb0 [ 253.446624] ? do_syscall_64+0x26/0x620 [ 253.450589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.455948] ? do_syscall_64+0x26/0x620 [ 253.459924] __x64_sys_write+0x73/0xb0 [ 253.463819] do_syscall_64+0xfd/0x620 [ 253.467614] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.472812] RIP: 0033:0x45a909 [ 253.476010] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.494915] RSP: 002b:00007f3757e52c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 253.502621] RAX: ffffffffffffffda RBX: 00007f3757e52c90 RCX: 000000000045a909 [ 253.509884] RDX: 000000000000050f RSI: 0000000020000600 RDI: 0000000000000005 [ 253.517160] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 253.524506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3757e536d4 [ 253.531763] R13: 00000000004cbd8c R14: 00000000004e5a10 R15: 0000000000000006 19:47:45 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r0, r1) 19:47:45 executing program 0 (fault-call:2 fault-nth:1): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 19:47:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:45 executing program 2 (fault-call:3 fault-nth:2): openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 253.689382] FAULT_INJECTION: forcing a failure. [ 253.689382] name failslab, interval 1, probability 0, space 0, times 0 [ 253.759880] CPU: 0 PID: 9888 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 253.767649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 253.777017] Call Trace: [ 253.779629] dump_stack+0x197/0x210 [ 253.783274] should_fail.cold+0xa/0x1b [ 253.787174] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 253.792283] ? lock_downgrade+0x880/0x880 [ 253.796442] __should_failslab+0x121/0x190 [ 253.800683] should_failslab+0x9/0x14 [ 253.804479] kmem_cache_alloc+0x2ae/0x700 [ 253.808625] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 253.813644] ? anon_vma_compatible+0x70/0x2d0 [ 253.818141] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.823682] __anon_vma_prepare+0x1b1/0x3c0 [ 253.828014] do_huge_pmd_anonymous_page+0xeff/0x14e0 [ 253.833121] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 253.837894] ? __pmd+0x60/0x60 [ 253.841095] __handle_mm_fault+0x2c80/0x3f80 [ 253.845511] ? copy_page_range+0x2030/0x2030 [ 253.849933] ? count_memcg_event_mm+0x2b1/0x4d0 [ 253.854604] handle_mm_fault+0x1b5/0x690 [ 253.858669] __do_page_fault+0x62a/0xe90 [ 253.862733] ? vmalloc_fault+0x740/0x740 [ 253.866794] ? trace_hardirqs_off_caller+0x65/0x220 [ 253.871807] ? __might_fault+0x12b/0x1e0 [ 253.875873] do_page_fault+0x71/0x57d [ 253.879677] page_fault+0x1e/0x30 [ 253.883135] RIP: 0010:__put_user_4+0x1c/0x30 [ 253.887542] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 253.906444] RSP: 0018:ffff88805261fe18 EFLAGS: 00010293 [ 253.911808] RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 253.919073] RDX: 0000000000000058 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 253.926337] RBP: ffff88805261fee0 R08: ffff888053bba040 R09: 0000000000000000 [ 253.933604] R10: ffff888053bba8c0 R11: ffffffff8a778db8 R12: 0000000000000002 [ 253.940867] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000000 [ 253.948172] ? __might_fault+0x1a3/0x1e0 [ 253.952243] ? __sys_socketpair+0x11f/0x5d0 [ 253.956566] ? __ia32_sys_socket+0xb0/0xb0 [ 253.960805] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.965571] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 253.970326] ? do_syscall_64+0x26/0x620 [ 253.974298] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.979657] ? do_syscall_64+0x26/0x620 [ 253.983634] __x64_sys_socketpair+0x97/0xf0 [ 253.987956] do_syscall_64+0xfd/0x620 [ 253.991775] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.996990] RIP: 0033:0x45a909 [ 254.000188] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.019084] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 254.026793] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 254.034055] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 254.041422] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 254.048686] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:45 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x9, 0x12) [ 254.055951] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:45 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:46 executing program 0 (fault-call:2 fault-nth:2): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:46 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:46 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, 0xffffffffffffffff, 0x0) write$P9_RWALK(r0, &(0x7f00000003c0)=ANY=[@ANYRES64], 0x8) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS(0xffffffffffffffff, 0x4c03, &(0x7f0000000200)) dup2(r0, r1) 19:47:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000200)={"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"}) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_SET_CPUID2(r4, 0x4008ae90, &(0x7f0000000600)=ANY=[@ANYBLOB="010013000000000000000080d7000000080000000300000004000000d7000000ff7f0000000000000000000000000000c3f08258526572a44fe64ba2932223aca933"]) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r6, 0xc08c5334, &(0x7f00000000c0)={0x7f, 0x306, 0x0, 'queue0\x00', 0x7}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:46 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xa, 0x12) 19:47:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44), 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 254.350512] FAULT_INJECTION: forcing a failure. [ 254.350512] name failslab, interval 1, probability 0, space 0, times 0 [ 254.367457] CPU: 0 PID: 9926 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 254.375208] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.384700] Call Trace: [ 254.387301] dump_stack+0x197/0x210 [ 254.390941] should_fail.cold+0xa/0x1b [ 254.394837] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 254.399947] ? lock_downgrade+0x880/0x880 [ 254.404108] __should_failslab+0x121/0x190 [ 254.408364] should_failslab+0x9/0x14 [ 254.412168] kmem_cache_alloc+0x2ae/0x700 [ 254.416328] __khugepaged_enter+0x3b/0x390 [ 254.420565] do_huge_pmd_anonymous_page+0x1026/0x14e0 [ 254.425761] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 254.430513] ? __pmd+0x60/0x60 [ 254.433715] __handle_mm_fault+0x2c80/0x3f80 [ 254.438130] ? copy_page_range+0x2030/0x2030 [ 254.442557] ? count_memcg_event_mm+0x2b1/0x4d0 [ 254.447229] handle_mm_fault+0x1b5/0x690 [ 254.451296] __do_page_fault+0x62a/0xe90 [ 254.455396] ? vmalloc_fault+0x740/0x740 [ 254.459461] ? trace_hardirqs_off_caller+0x65/0x220 [ 254.464475] ? __might_fault+0x12b/0x1e0 [ 254.468541] do_page_fault+0x71/0x57d [ 254.472347] page_fault+0x1e/0x30 [ 254.475799] RIP: 0010:__put_user_4+0x1c/0x30 [ 254.480220] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 254.499139] RSP: 0018:ffff88804a93fe18 EFLAGS: 00010293 [ 254.504509] RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 254.511777] RDX: 0000000000000058 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 254.519041] RBP: ffff88804a93fee0 R08: ffff888052aa44c0 R09: 0000000000000000 [ 254.526311] R10: ffff888052aa4d40 R11: ffffffff8a778db8 R12: 0000000000000002 [ 254.533579] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000000 [ 254.540887] ? __might_fault+0x1a3/0x1e0 [ 254.544976] ? __sys_socketpair+0x11f/0x5d0 [ 254.549320] ? __ia32_sys_socket+0xb0/0xb0 [ 254.553586] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.558339] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.563107] ? do_syscall_64+0x26/0x620 [ 254.567088] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.572626] ? do_syscall_64+0x26/0x620 [ 254.576617] __x64_sys_socketpair+0x97/0xf0 [ 254.580940] do_syscall_64+0xfd/0x620 [ 254.584746] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.589931] RIP: 0033:0x45a909 [ 254.593123] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 254.612023] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 254.619733] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 254.627000] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 254.634279] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 254.641548] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:46 executing program 0 (fault-call:2 fault-nth:3): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 254.648815] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:46 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) [ 254.721216] FAULT_INJECTION: forcing a failure. [ 254.721216] name fail_page_alloc, interval 1, probability 0, space 0, times 1 19:47:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558", 0x2f) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 254.773265] CPU: 1 PID: 9934 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 254.781026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 254.790391] Call Trace: [ 254.793007] dump_stack+0x197/0x210 [ 254.796661] should_fail.cold+0xa/0x1b [ 254.800567] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 254.805694] ? __lock_is_held+0xb6/0x140 [ 254.809776] ? should_fail+0x14d/0x85c [ 254.813714] __alloc_pages_nodemask+0x1ee/0x750 [ 254.818406] ? __khugepaged_enter+0x28d/0x390 [ 254.822926] ? __alloc_pages_slowpath+0x2870/0x2870 [ 254.827960] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 254.833498] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 254.839077] alloc_pages_vma+0x3b6/0x590 [ 254.843161] do_huge_pmd_anonymous_page+0x518/0x14e0 [ 254.848287] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 254.853066] ? __pmd+0x60/0x60 [ 254.856287] __handle_mm_fault+0x2c80/0x3f80 [ 254.860728] ? copy_page_range+0x2030/0x2030 [ 254.865162] ? count_memcg_event_mm+0x2b1/0x4d0 [ 254.869843] handle_mm_fault+0x1b5/0x690 19:47:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558", 0x2f) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 254.873923] __do_page_fault+0x62a/0xe90 [ 254.878023] ? vmalloc_fault+0x740/0x740 [ 254.882109] ? trace_hardirqs_off_caller+0x65/0x220 [ 254.887138] ? __might_fault+0x12b/0x1e0 [ 254.891227] do_page_fault+0x71/0x57d [ 254.895053] page_fault+0x1e/0x30 [ 254.898524] RIP: 0010:__put_user_4+0x1c/0x30 [ 254.902945] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 19:47:46 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MYc\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd2f \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\xc2l\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xb4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7\x00\x00\x00\x00\x00', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xaf\xe2-\xb9\xc8\xcc\x8844r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x79e) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_REGISTER_COALESCED_MMIO(r2, 0x4010ae67, &(0x7f0000000040)={0x3000, 0x10000}) [ 254.921856] RSP: 0018:ffff888052b27e18 EFLAGS: 00010293 [ 254.927230] RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 254.934727] RDX: 0000000000000058 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 254.942002] RBP: ffff888052b27ee0 R08: ffff888052f060c0 R09: 0000000000000000 [ 254.942010] R10: ffff888052f06940 R11: ffffffff8a778db8 R12: 0000000000000002 [ 254.942018] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000000 [ 254.942045] ? __might_fault+0x1a3/0x1e0 [ 254.942066] ? __sys_socketpair+0x11f/0x5d0 [ 254.972343] ? __ia32_sys_socket+0xb0/0xb0 [ 254.976611] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.981463] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 254.981477] ? do_syscall_64+0x26/0x620 [ 254.981496] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 254.995588] ? do_syscall_64+0x26/0x620 [ 254.999586] __x64_sys_socketpair+0x97/0xf0 [ 255.003933] do_syscall_64+0xfd/0x620 [ 255.007751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.012952] RIP: 0033:0x45a909 19:47:46 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558", 0x2f) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 255.016152] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.035067] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 255.042798] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 255.050088] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 255.057372] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 255.064654] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:46 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000, 0x2, &(0x7f0000ffa000/0x2000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 255.071938] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 19:47:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a", 0x46) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 19:47:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x10, 0x12) 19:47:47 executing program 0 (fault-call:2 fault-nth:4): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:47 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0x3b0004, 0xa94, 0x80000000, [], &(0x7f00000000c0)={0xa00964, 0x968, [], @p_u8=&(0x7f0000000080)=0xfe}}) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCGETA(r3, 0x5405, &(0x7f0000000140)) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a", 0x46) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 255.390128] FAULT_INJECTION: forcing a failure. [ 255.390128] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 255.412988] CPU: 1 PID: 9983 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 255.420735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.430113] Call Trace: [ 255.430139] dump_stack+0x197/0x210 [ 255.430159] should_fail.cold+0xa/0x1b [ 255.430175] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 255.430196] ? __might_sleep+0x95/0x190 [ 255.430214] __alloc_pages_nodemask+0x1ee/0x750 [ 255.430233] ? mem_cgroup_throttle_swaprate+0x196/0x66e [ 255.430251] ? __alloc_pages_slowpath+0x2870/0x2870 [ 255.430270] ? kasan_check_read+0x11/0x20 [ 255.430288] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 255.474286] alloc_pages_current+0x107/0x210 [ 255.478723] pte_alloc_one+0x1b/0x1a0 [ 255.482592] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 255.487753] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 255.492528] __handle_mm_fault+0x2c80/0x3f80 [ 255.496971] ? copy_page_range+0x2030/0x2030 [ 255.501410] ? count_memcg_event_mm+0x2b1/0x4d0 [ 255.506093] handle_mm_fault+0x1b5/0x690 [ 255.510173] __do_page_fault+0x62a/0xe90 [ 255.514682] ? vmalloc_fault+0x740/0x740 [ 255.518762] ? trace_hardirqs_off_caller+0x65/0x220 [ 255.523793] ? __might_fault+0x12b/0x1e0 [ 255.527874] do_page_fault+0x71/0x57d [ 255.531691] page_fault+0x1e/0x30 [ 255.535154] RIP: 0010:__put_user_4+0x1c/0x30 19:47:47 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f00000001c0)={{0x3, @addr=0x8}, 0x8, 0x9, 0x4}) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) fsetxattr$trusted_overlay_origin(r1, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) write$apparmor_exec(r1, &(0x7f0000000b00)=ANY=[], 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f0000000140)={0x9, "d8ade7842d3f2f0478d8862b0f31b77c0ed7db6b8ee4ec170654f9e5e4edc2f7", 0x1, 0x5, 0x3, 0x3ac800a80eb7650, 0x404, 0x2}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(r6, 0x0, 0x0) setsockopt$ALG_SET_KEY(r6, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r6, 0x8982, &(0x7f0000000280)={0x1, 'vlan0\x00', {}, 0x220}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rds(r3, &(0x7f0000000240)={0x2, 0x4e21, @remote}, 0x10) write$sndseq(r3, &(0x7f0000000040)=[{0xf6, 0xff, 0xf2, 0x6, @time={0x77359400}, {0x5, 0xce}, {0x7, 0x9}, @control={0x0, 0x9, 0x7}}, {0x2, 0xff, 0x1, 0x40, @tick=0x8, {0x80, 0x2e}, {0x9, 0x8}, @addr={0x6f, 0x7}}], 0x60) [ 255.539573] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 255.558808] RSP: 0018:ffff888051ddfe18 EFLAGS: 00010293 [ 255.564196] RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 255.571488] RDX: 0000000000000058 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 255.578780] RBP: ffff888051ddfee0 R08: ffff88804d554040 R09: 0000000000000000 19:47:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a", 0x46) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:47 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x2e2, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='GPLvmnet1*\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9ba) 19:47:47 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x900, 0x12) [ 255.586072] R10: ffff88804d5548c0 R11: ffffffff8a778db8 R12: 0000000000000002 [ 255.593357] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000000 [ 255.600672] ? __might_fault+0x1a3/0x1e0 [ 255.604763] ? __sys_socketpair+0x11f/0x5d0 [ 255.609100] ? __ia32_sys_socket+0xb0/0xb0 [ 255.613356] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.618130] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.622915] ? do_syscall_64+0x26/0x620 [ 255.626909] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.632291] ? do_syscall_64+0x26/0x620 [ 255.636290] __x64_sys_socketpair+0x97/0xf0 [ 255.640634] do_syscall_64+0xfd/0x620 [ 255.644457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.649655] RIP: 0033:0x45a909 [ 255.652853] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.671757] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 255.671770] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 19:47:47 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:47 executing program 0 (fault-call:2 fault-nth:5): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 255.671776] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 255.671783] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 255.671790] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 255.671796] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:47 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2800) recvmmsg(r1, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/151, 0x97}], 0x1}}], 0x2, 0x0, 0x0) ioctl$sock_netdev_private(r1, 0x89fb, &(0x7f0000000880)="8984c98c19d12c2749da18901534ab9c5c7022f96ab06c6fb5999d1b52feec1be3e461a19b2f33e9f222f68cc8ff42416d713fc10ed0c7d829384a93699da1672958c1ccc992323e61bd8a3370b7eefb3503e22fa72b08c1134969fecb21340ba762a4fdf699a97eb013365c5056537475e5344a2da481ff09ef2c5bb9e8c5bd7988b8c3b0a89632c9f30a89e43b635605312e26c10724b80c7b55e50e9ef163c9549851d95a21f6eeee4a9a6f7fbbb22d57f71fd452b92af382afa320f6d95c6ceec6c604c4a22feba532b927431e20b9a571c84762c1ef73cbb6b019ec6fda473f04ec9a13cbc88e2fc4a2d947e21187c7f5dc2c58b519d6ee345ff343d18147afe76077e882728494fa9bf949d3d543a54fbaeec191404bfe7e70326f5d41c9fc23ad356bfdd6edda0f495b9dd7c48b996a21d7088c928b7a216e6f09b49266f06c309769e34b11285bc4882acba47cdd1d7649e0be730a3e5bf903f43858ae4afb1f7abaff25c03829777a1a6f5d162f9a5cb1163320223a439725c59689f38a3708a7f4476532ddd43329463df22b4801f9c5498aa50e172d8e165819624c7cc732f49262d54de43db3b724d1ba1b30f12d9239516b9956e2481385d67f55c11e8509405473b855886aca57c8ef3076357a22132da10ccb3b40701a4eec76649e2709cdb6b7dca9d451c54f64f0488dffe64b0ff059304807c2639de42ce3f7b9e08ddc67b0e3d10237e1a43b4af567da040f604b347c4826fd70627b6b170aef73eb9f8af3465a7146ad2f04474ab3eb62e82aa756895b05bebcaf5261cbeff97b780ba49380e18836f5ac09768ebae00cfb3ac1fbfa402eb33cc5ff5428466936487508084d23ce702dae9095c9d04466d0e72ab5bf5e537c756735534178d1358ce400264219c70b96670704fb334c45d96fcc709d7d703dd1cbae664aed14cb8cf888eb62984a9e4605534f652eab6f5efd54751eb7e309d5eb2f781cc02de7c63cb7027ed0b3339f67f94c648a0b4b298b3f5d63e4b1425390144177e83ae622b946f6941654207cd371531da48b602e2d86c332318fe3efb6b22d45e0dfd9416d05df477ae377421f4f1184da178d3247075a329374222dba00a738bc2edec9b18f36d9ae014e408f83351188d336d5ac8ffdbffd0b8b321c094b864fa08575b4f336864efede069ec0da29c0cc25d42e257b81b4417b7ac62d5026761b58f47dac458ff5dc27fd109a42fa780058f8dab65306cb9301e08bf05a91ec7e79d2cdbd188fcea7ae194d2cc1ecab99a83e18768ba0638736154bfa6df56863e3aebdbade99f941f9679c6f2a4468635dab4a6b932abe914d927f5d0299614e26295d2215ad482e5d23444946a7b61cdefdf95cda3dc268d8f935f1edd69b92b33f70f0723a3718da899182408a79e2ff30ad5e550dc1a46b789636bdd0e5d77ff29103d3a870e54607c170ce5d360d711392d99f352ac3f7fc189ea5d2a25f20ce86bbbfb0bbfe3e79f5aa311d6e3750f2f6529b0215ef72688e7bfa9aafb0dc048c636ba7934fd0da960d52d98636eb94660e247f8e10627ceacba4d2e2a15a023cde084c83eb221fb61123b7017b2ab840b2288eb5f24c8a787bb14deaebebf882cefcae78124131e5d23b0d7c4e67a479244773948c645e6caef7b1e52712b4e2acf66d289a7de31ec28928d6745e1d6fb8b51fc7ac7ebe67f19770ae9facd3b452b9b7f92ebffc231427d3ddc71e0d5312e17300c4a4c459978abe79eba9c2fe1f9ef304cdff40003aec2023e06b220ce18defab74e9a537f8cd2d9f446ef8b999c1ee5860eb70cce59cec7b54357d4606228a8b79ba3236398c8e8a1ed4aecb945870e95d625ff664022fdeee89ab0ee41ea461fd51cf8e37211a5854590939ede7b256356b45dae1999f250fdf0a8a50969d36763f878dc45232b85f77599a45559e63055281cbfb4f7ee970d3a20a96119cc0a619dd205d49dfe6e044db48768cd6900432dc0dae8c3a2021c19787808dfab903455e3a31598aae02c41c97b0aa95717393021f46d7b87d0bfb41d95d2eabaea31544116fe9ff432e69dcc9b548abfbefa98e59a9ec0f71069786890759854bfa0f4bed7da614515799eccb6ba2b01bafdef1f11a843658212ac13989bf027b3ae24b3b6e2f5584068f28ddeb7b8631a4dc8614623c3591fcf0b9644cc37f80a6f26acecf7efd3aa27d939f5cb36ab9e99dff7b7de143ab691ccd0aa5d11ad8c2569850e33b9dc1922ef99b801f55bd3c86e351cfc19bfc578407688efba857c2ae017c98b17e76a502700d5ef807827d7e00f85b2289402a7209333a7b80625a026b1f70cef2de0a3e5a5dc947cc9aff200f87517bb71736d33b2ee479a1c6026cc15807483ceafc264dfbf32821498adedc6b8c0adfc09a962a2abc3038a6d4ef7dcec319ba59d70d371fe2a9b197d0c3cb553427eb7b6ee7a98ff243fd9d4879220a0bf6d6fb5cff1a5485b6d1978c2cf41e288b2363b9fb131012df363c7f0e4aa0e8cb695d6ad60c6d30f6e89cf81d010dc49605cae224fee1930a4333b0634377acd3ead53dd0a40b1d04bcae3fa2157ff6a25cc458afd1a681cfb42f5daef796053c5a2f542c1aeda998d6e7d80257d23d045e7e2db43adb2970cacaa7e1bddb1efd60e06b503ea12a7c530942337be718842dd2ac2249762fe984813cafb43a85eaada714d83d9e8baa65ddc5b9f8d021a0ade067b64c3e7b6ea8c9ebceaf46a86bd30c70400c291596d0d6314847a2f1a76e4cc906b19d92905f9888126ba0bebfc23e37f33070805a933ef955bb791e42022a2d7917ce317e6a58b1ade3299e140dcbbf4a2f201bc9d301cf2487d1964516f7bcf4879be2806fd5dcea662577b2392527d593c4baa850a9d0822e9178a0497559abaf699bdca58cb23c2e70f6c3da3433bfeeb3293e0532dd3fbced63bc44f16dc459ac64a24fb7be8b8f93260af3b35e447a3c4831ea640d4f9f111b3c947c591665a4adab1410ca233ec5029288650d56922556b0a16fa62df62018548f5dd124b48b64aafcf9fbad014a6615becf503fc2a52a9aa26e1e3c2a321cc99516c3e2e2e370a58327345e0adc0bbf613f0f6151cd5dd02be44fcf207f0744672b9078a89a24beee928433c4df546f1d144e3a140f969913dc16890ac7c24800ecb141266bec00bdee4064752c4811210d6887d7e116fd186a79c03435a4562b439ffb781499bc8fd66e917c8f19d22f131d0aef7ac303c9fab3b856f3305773d3bb52004ff4f34f25994d50f2aa32fa208291cb92134d73754f7d916397e13e481bdc4ee0f727db4eac0049c8e33ab7a0f18719de62363adce3b2a9b71e496dadaf71558d1b7e6e6a7357ef88dd849aff536683959b95480c2ecc30025c085c6b890c3725309ae352d3eaa5a2f30329cc2d752fd28f21593c9c112df8ecc2da177f21e54474dfc9001c15d3306e77f8e942decf8c7c468d5c2a8b3147e06a3d8ff4493d7b3e279ad2c60daa3e7c6824d27bcf19d31778c731c5ff1bdd648242c93798b044f91b1a4f8ccbc390b170ef14c4efdfb21551de83a8383596ccf5f288c3b5c5524fbec604392906dda078629c84ab248daa6992c01fb6336e36881ef91acfa7810b229b520c1f5915b3f296abc7ecc280aa8731487a55c66e34ad5c279a9a60fc107ea6252333a63077a4adfe924bfd69a9cb29ab7334d1e00dfa3274947823fb5fd20b16c74ad8216a576e9483423510356c283eeca1e9672926faf4aa03d01f724021fa495c3c27c6363c8f2a78c0616336ccc19190d7095f37f4969186229474dfd917c82ba55302e076385cf95e2d765f43d650bc27ee6d02f452ffa8827c389056587f685133da68cf4be5866f942bdf974100bc2dc2930bc6f5f72f5a7e7d1472c3dec74a81f223529308f93ddbde9c89398cb7fddf594686b3f6a7d24f57997812e1b21440562e3501ea158323237ba316d359a80e2208a4f3142c46494c99fc17f4e49688de549c6d332ede3e1b1effb2dc17e61c5db3df47eded58af80677671adef810e7f55bbc5af717c76f929e820e558684b86a3e84dfa0b5f972638a1983cf0c3ebb33d0d4f7e84f3e6ff29ccbfcf1d3e0878de2b2ae783912a038591c28c3c93939923477c857695e36de6b57178dabfd409057f586c7958b7883f8479c1da58ba4317d8e61eab6585cbafbbbdc971e3c39c6f8d25aab1877aace5c9b72e3f440573070147b8833e1d11809d8424b06aad3c36d359571daba02e0f326a2ba65f21c5bdd8f46b2601e9a0d6510ed40cc03644cd3ad1b4ee3eb2baa79ca64f5fe86b575130c991c6334f96e5f5a29e12faf5ab94bd294a2890c14bbe4e69247d98257746db1fc22eff5ec213cac2170fc1fa0a201dd405e472d85a356e8b7d9fa7988c4cc8a337cc9f6d005eea1eaae2864d0471de7e7a75c4cb34c02d2149ec3508c4e83f6cf81f990901b8f9c04e705efa73d136281e2606fe099b7bd9df2832f1fb0e8af217a9033bb135cd0c1752abc841f64be117e572a661140bd9a41e0b3778b70412a369e30282b1ebf7ad92bb65b5758b6d5e42a6c557d7c68208a2924e1b0b041067e0c1bde6d523b55817a76d2b6dfbac4a88a3b05d337be6e161d730e478c6fed1177e0fd6fbd0c3fa02afbe59ba546a7a8dbb76c879ed193a795fc216ba0697cb131cb412fe7eec62774d556e4ba4307114426bdfec3e750bef46d45d7adfa3afbabcbca1e2ff4f2652402b303d3cd24f1cac7d7234d6a88a6190b31d5db426ce43c05174e46ffa437b7f01de1300bf4a0a1cf7077871ccd1be23dc7b3973c993fe98e747d8d7017bf1fa571168dc54993f69e5a2fdd0eea4e4f93c4e103f6a57fd64211c094d57f0c54490a5da5677e06f5884a327a67bfb98602b1efcbbfa53935b6ccf4a34f0310c6a91da6104fe1e0200093b244928e7717e6ea2c3c509f15129a6ee249695a046ab0b2d4635eb93f90ac5427898b0f2ecab419073ea8123e06c119613a4f3c1a135e13664d133782acf074f5b74929e52bdf3d531a07215e01386268337b78a1e3dfc32a4e0b048528dc999dbb5ad2ca77cc05d70925cb4af3154ec7c716225759d820b31d337c15b5aeacbd34c2bf5867306e80931a7f951064c53c343abb44a98d580582e69150cf57af9118abe592be6d6530fdc92857e59b2ddfd1b10decbb4ce713963bdf124bfe3a59542fc7f1416729eec889e82999e2bf96dc0e8fe65df045d6be4454fcad6be578a95cbf7985dd1dd6d7e8d4380dd59e28d46505e82e6659dfc7a3670175f902dfc6c7edd67152e7a1acefd1eb70c01c235e49899466bf140d8ebe42ff75033416afd76bed238a619b7394d959734bcfa0f84af029eb5ed37dc5501669586cd26a2ec4812ccd9ae983a77749d5b2c51b93b52222559b77269619fffb5bca56a5dec063f591d6c580737b448910a0f739ebd910ec5d314a82e591cdde458608f87686353c3fda682fbd230a54f3f6b31e59c97472da545ccc03c73ac35b5c8cec640dc7d24140dae8f86f0f97c31c1077978feed35a7805522f7404ea6c7ea389f1b722700259f114950dc1378ade160c6a5e4694ebf3f47b0dabfd8bb2f161060cf164a4a8f19fd611192b2880f1b4aa2c685d846779a3ce4dd2cc9976077e4d2545a170f815f629e10c60e3408ffa76905fde770d8bf2696566f673c879dafff9223897c9282b9027f4342e293196d3c8ec2ee3c0263dd806f2e19bcee1bd7e3a18b804863c9d3e9f2") r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/packet\x00') write$apparmor_exec(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x50f) [ 255.752055] FAULT_INJECTION: forcing a failure. [ 255.752055] name failslab, interval 1, probability 0, space 0, times 0 [ 255.769794] FAULT_INJECTION: forcing a failure. [ 255.769794] name failslab, interval 1, probability 0, space 0, times 0 [ 255.784095] CPU: 0 PID: 10003 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 255.795374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.812561] Call Trace: [ 255.815170] dump_stack+0x197/0x210 [ 255.818813] should_fail.cold+0xa/0x1b [ 255.822715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 255.827835] ? lock_downgrade+0x880/0x880 [ 255.832012] __should_failslab+0x121/0x190 [ 255.836266] should_failslab+0x9/0x14 [ 255.840082] kmem_cache_alloc+0x2ae/0x700 [ 255.844248] ? kasan_check_write+0x14/0x20 [ 255.848499] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 255.853345] ? check_preemption_disabled+0x48/0x290 [ 255.858360] getname_flags+0xd6/0x5b0 [ 255.862774] getname+0x1a/0x20 [ 255.865960] do_sys_open+0x2c9/0x550 [ 255.869668] ? filp_open+0x80/0x80 [ 255.873207] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.877957] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 255.882707] ? do_syscall_64+0x26/0x620 [ 255.886684] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.892060] ? do_syscall_64+0x26/0x620 [ 255.896034] __x64_sys_openat+0x9d/0x100 [ 255.900115] do_syscall_64+0xfd/0x620 [ 255.903913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 255.909093] RIP: 0033:0x45a909 [ 255.912278] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 255.931693] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 255.940003] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 19:47:47 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f00000003c0)={0x1, 0x1, 0x1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') r5 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r6 = socket$unix(0x1, 0x5, 0x0) bind$unix(r6, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r6, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) connect(r7, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r8 = gettid() r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r11, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r12}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r5, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={r12, 0x8d18}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x66, &(0x7f0000000240)={r13, 0x80000000}, &(0x7f0000000280)=0x8) r14 = gettid() sendmmsg$unix(r5, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs={0x2}, 0xffffffffffffffe7, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1400000000000000fd00000001000000", @ANYRES32=r7, @ANYBLOB="0000000014580000f2ff0000000000000000a4d15967c5484653225f3c583f3a8e000000000000000000", @ANYRES32=r8, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000416c2ab70100000001000000", @ANYRES32=r6, @ANYBLOB="000000001c000000010000000200000000000000", @ANYRES32=r14, @ANYRESHEX=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x94}], 0x1, 0x0) r15 = syz_open_procfs(r14, &(0x7f00000013c0)='cpuset\x00') r16 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001400)='/proc/self/net/pfkey\x00', 0x0, 0x0) r17 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r18 = dup(r17) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) r19 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r19, 0x80064d1c, &(0x7f0000000340)) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000001500)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x14002000}, 0xc, &(0x7f00000014c0)={&(0x7f0000000400)=ANY=[@ANYRESDEC=r19, @ANYRES16=r4, @ANYBLOB="000229bd7000fcdbdf250100000008000100000000000c00040000080000000000000c000500c39bea9299eb1efa0c00060001000000000000000c0008002005ffffffffffff2400070008000100", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=r15, @ANYBLOB="a0dc28d2ab1b58d6bb161c8e2b36eced20ccdf655250f2759d25fe71ada28e5188699fdb1fcdf565830a6676d1ce3f73e28920519c1efb4bed191e0ee2dc46f2f3d5002640ae8f3b5891de75035313d582020010dc2e2c251846a3fbc6b1e145ac6f7ea5c10bce6f34c93f0ba219e35b3a70cefb2b8d61", @ANYRES32=r16, @ANYBLOB="08000100", @ANYRES32=r18], 0xa}, 0x1, 0x0, 0x0, 0x10}, 0x8011) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') [ 255.947277] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 255.954535] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 255.961798] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 255.969067] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 255.976350] CPU: 1 PID: 10005 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 255.984163] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 255.993522] Call Trace: [ 255.996126] dump_stack+0x197/0x210 [ 255.999787] should_fail.cold+0xa/0x1b [ 256.003687] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 256.008803] ? lock_downgrade+0x880/0x880 [ 256.008826] __should_failslab+0x121/0x190 [ 256.008842] should_failslab+0x9/0x14 [ 256.008854] kmem_cache_alloc+0x2ae/0x700 [ 256.008869] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 256.008887] ptlock_alloc+0x20/0x70 [ 256.008905] pte_alloc_one+0x6d/0x1a0 [ 256.008922] do_huge_pmd_anonymous_page+0x712/0x14e0 [ 256.008941] ? thp_get_unmapped_area+0x1f0/0x1f0 [ 256.008961] __handle_mm_fault+0x2c80/0x3f80 [ 256.025604] ? copy_page_range+0x2030/0x2030 [ 256.025635] ? count_memcg_event_mm+0x2b1/0x4d0 [ 256.025652] handle_mm_fault+0x1b5/0x690 [ 256.025670] __do_page_fault+0x62a/0xe90 [ 256.025689] ? vmalloc_fault+0x740/0x740 [ 256.034827] ? trace_hardirqs_off_caller+0x65/0x220 [ 256.034840] ? __might_fault+0x12b/0x1e0 [ 256.034861] do_page_fault+0x71/0x57d [ 256.034879] page_fault+0x1e/0x30 [ 256.034892] RIP: 0010:__put_user_4+0x1c/0x30 19:47:47 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00d", 0x52) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 256.034906] Code: 1f 00 c3 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 8b 1c 25 40 ee 01 00 48 8b 9b 18 14 00 00 48 83 eb 03 48 39 d9 73 3c 0f 1f 00 <89> 01 31 c0 0f 1f 00 c3 66 90 66 2e 0f 1f 84 00 00 00 00 00 65 48 [ 256.034915] RSP: 0018:ffff88805163fe18 EFLAGS: 00010293 [ 256.034926] RAX: 0000000000000005 RBX: 00007fffffffeffd RCX: 0000000020000040 [ 256.034934] RDX: 0000000000000058 RSI: ffffffff8194d673 RDI: 0000000000000286 [ 256.034941] RBP: ffff88805163fee0 R08: ffff888093d5a400 R09: 0000000000000000 [ 256.034948] R10: ffff888093d5ac80 R11: ffffffff8a778db8 R12: 0000000000000002 [ 256.034959] R13: 0000000000000005 R14: 0000000000000006 R15: 0000000000000000 [ 256.048600] ? __might_fault+0x1a3/0x1e0 [ 256.057389] ? __sys_socketpair+0x11f/0x5d0 [ 256.057404] ? __ia32_sys_socket+0xb0/0xb0 [ 256.057423] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.057436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.057451] ? do_syscall_64+0x26/0x620 [ 256.057465] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.057478] ? do_syscall_64+0x26/0x620 [ 256.057496] __x64_sys_socketpair+0x97/0xf0 [ 256.057511] do_syscall_64+0xfd/0x620 [ 256.057527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.070299] RIP: 0033:0x45a909 [ 256.070313] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.070324] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 256.234142] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 256.241425] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d 19:47:48 executing program 5 (fault-call:2 fault-nth:1): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 256.248705] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 256.255988] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 256.263269] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:48 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) flock(0xffffffffffffffff, 0x4) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) flock(r0, 0x0) 19:47:48 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00d", 0x52) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:48 executing program 0 (fault-call:2 fault-nth:6): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 256.452445] FAULT_INJECTION: forcing a failure. [ 256.452445] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 256.464301] CPU: 1 PID: 10040 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 256.472111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.481464] Call Trace: [ 256.484087] dump_stack+0x197/0x210 [ 256.487719] should_fail.cold+0xa/0x1b [ 256.491605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 256.496795] ? mark_held_locks+0x100/0x100 [ 256.501032] __alloc_pages_nodemask+0x1ee/0x750 [ 256.505762] ? __alloc_pages_slowpath+0x2870/0x2870 [ 256.510778] ? find_held_lock+0x35/0x130 [ 256.514872] cache_grow_begin+0x91/0x8c0 [ 256.518930] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 256.524472] ? check_preemption_disabled+0x48/0x290 [ 256.529504] kmem_cache_alloc+0x63b/0x700 [ 256.533645] ? kasan_check_write+0x14/0x20 [ 256.537877] getname_flags+0xd6/0x5b0 [ 256.541670] getname+0x1a/0x20 [ 256.544852] do_sys_open+0x2c9/0x550 [ 256.548555] ? filp_open+0x80/0x80 [ 256.552958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.557704] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.562450] ? do_syscall_64+0x26/0x620 [ 256.566432] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.571788] ? do_syscall_64+0x26/0x620 [ 256.575756] __x64_sys_openat+0x9d/0x100 [ 256.579832] do_syscall_64+0xfd/0x620 [ 256.583623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.588801] RIP: 0033:0x45a909 [ 256.591986] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.611048] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 256.618746] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 256.629390] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 256.636649] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 256.643906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 256.651165] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 256.682877] FAULT_INJECTION: forcing a failure. [ 256.682877] name failslab, interval 1, probability 0, space 0, times 0 [ 256.694568] CPU: 0 PID: 10041 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 256.702385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.711743] Call Trace: [ 256.714335] dump_stack+0x197/0x210 [ 256.717988] should_fail.cold+0xa/0x1b [ 256.721900] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 256.727022] ? find_held_lock+0x35/0x130 [ 256.731103] ? do_huge_pmd_anonymous_page+0xee5/0x14e0 [ 256.736400] __should_failslab+0x121/0x190 [ 256.740649] should_failslab+0x9/0x14 [ 256.744465] kmem_cache_alloc+0x47/0x700 [ 256.747304] FAULT_INJECTION: forcing a failure. [ 256.747304] name failslab, interval 1, probability 0, space 0, times 0 [ 256.748563] ebitmap_cpy+0xcd/0x270 [ 256.748575] ? hashtab_search+0x1b9/0x250 [ 256.748596] mls_compute_sid+0x5d0/0xf60 [ 256.771589] ? mls_convert_context+0x790/0x790 [ 256.776179] security_compute_sid.part.0+0xace/0x15c0 [ 256.781373] ? compute_sid_handle_invalid_context+0x340/0x340 [ 256.787257] ? __do_page_fault+0x676/0xe90 [ 256.791521] ? __lock_acquire+0x6ee/0x49c0 [ 256.795750] ? lock_downgrade+0x880/0x880 [ 256.799888] ? count_memcg_event_mm+0x2b1/0x4d0 [ 256.804562] security_transition_sid+0x126/0x190 [ 256.809348] selinux_socket_create+0x44c/0x610 [ 256.813939] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 256.819237] ? __might_fault+0x12b/0x1e0 [ 256.823319] security_socket_create+0x7b/0xc0 [ 256.827933] __sock_create+0x90/0x730 [ 256.831735] __sys_socketpair+0x1ea/0x5d0 [ 256.835893] ? __ia32_sys_socket+0xb0/0xb0 [ 256.840126] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.844878] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 256.849650] ? do_syscall_64+0x26/0x620 [ 256.853625] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.858981] ? do_syscall_64+0x26/0x620 [ 256.862977] __x64_sys_socketpair+0x97/0xf0 [ 256.867303] do_syscall_64+0xfd/0x620 [ 256.871100] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 256.876285] RIP: 0033:0x45a909 [ 256.879478] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 256.898492] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 256.906194] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 256.913455] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 256.920715] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:48 executing program 5 (fault-call:2 fault-nth:2): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 256.927990] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 256.935263] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 256.942578] CPU: 1 PID: 10044 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 256.950395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 256.959760] Call Trace: [ 256.962361] dump_stack+0x197/0x210 [ 256.966003] should_fail.cold+0xa/0x1b [ 256.969904] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 256.975029] ? lock_downgrade+0x880/0x880 [ 256.979185] __should_failslab+0x121/0x190 [ 256.983415] should_failslab+0x9/0x14 [ 256.987205] kmem_cache_alloc+0x2ae/0x700 [ 256.991347] ? __save_stack_trace+0x99/0x100 [ 256.995762] __alloc_file+0x27/0x330 [ 256.999469] alloc_empty_file+0x72/0x170 [ 257.003519] path_openat+0xef/0x45e0 [ 257.007235] ? __lock_acquire+0x6ee/0x49c0 [ 257.011455] ? getname_flags+0xd6/0x5b0 [ 257.015416] ? getname+0x1a/0x20 [ 257.018789] ? do_sys_open+0x2c9/0x550 [ 257.022672] ? __x64_sys_openat+0x9d/0x100 [ 257.026896] ? do_syscall_64+0xfd/0x620 [ 257.030864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.036221] ? switch_mm_irqs_off+0x7fa/0x1360 [ 257.040813] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 257.045488] ? __lock_is_held+0xb6/0x140 [ 257.049548] do_filp_open+0x1a1/0x280 [ 257.053337] ? __alloc_fd+0x44d/0x560 [ 257.057139] ? may_open_dev+0x100/0x100 [ 257.061106] ? lock_downgrade+0x880/0x880 [ 257.065246] ? do_raw_spin_unlock+0x178/0x270 [ 257.069741] do_sys_open+0x3fe/0x550 [ 257.073446] ? filp_open+0x80/0x80 [ 257.076976] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.081720] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.086463] ? do_syscall_64+0x26/0x620 [ 257.094160] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.099512] ? do_syscall_64+0x26/0x620 [ 257.103489] __x64_sys_openat+0x9d/0x100 [ 257.107556] do_syscall_64+0xfd/0x620 [ 257.111349] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.116528] RIP: 0033:0x45a909 19:47:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00d", 0x52) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 257.119713] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.139468] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 257.147166] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 257.154423] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 257.161700] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.168957] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 257.176214] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 19:47:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xa00, 0x12) 19:47:49 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x50f) 19:47:49 executing program 0 (fault-call:2 fault-nth:7): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc0101000000", 0x58) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0x60400) semget$private(0x0, 0x2, 0x82) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc0101000000", 0x58) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:49 executing program 5 (fault-call:2 fault-nth:3): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:49 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvo\x00', 0x100, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$apparmor_exec(r1, &(0x7f0000000880)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x26d) [ 257.449641] FAULT_INJECTION: forcing a failure. [ 257.449641] name failslab, interval 1, probability 0, space 0, times 0 [ 257.461252] CPU: 0 PID: 10068 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 257.469067] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.478433] Call Trace: [ 257.481049] dump_stack+0x197/0x210 [ 257.484709] should_fail.cold+0xa/0x1b [ 257.488626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 257.493748] ? __lock_is_held+0xb6/0x140 19:47:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc0101000000", 0x58) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 257.497826] __should_failslab+0x121/0x190 [ 257.497840] should_failslab+0x9/0x14 [ 257.497857] kmem_cache_alloc+0x47/0x700 [ 257.505919] ebitmap_cpy+0xcd/0x270 [ 257.505930] ? hashtab_search+0x1b9/0x250 [ 257.505947] mls_compute_sid+0x5d0/0xf60 [ 257.505962] ? mls_convert_context+0x790/0x790 [ 257.505987] security_compute_sid.part.0+0xace/0x15c0 [ 257.530960] FAULT_INJECTION: forcing a failure. [ 257.530960] name failslab, interval 1, probability 0, space 0, times 0 [ 257.531612] ? compute_sid_handle_invalid_context+0x340/0x340 [ 257.548862] ? __do_page_fault+0x676/0xe90 [ 257.553116] ? __lock_acquire+0x6ee/0x49c0 [ 257.553133] ? lock_downgrade+0x880/0x880 [ 257.553145] ? count_memcg_event_mm+0x2b1/0x4d0 [ 257.553173] security_transition_sid+0x126/0x190 [ 257.561542] selinux_socket_create+0x44c/0x610 [ 257.561561] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 257.561576] ? __might_fault+0x12b/0x1e0 [ 257.561598] security_socket_create+0x7b/0xc0 [ 257.561616] __sock_create+0x90/0x730 [ 257.593264] __sys_socketpair+0x1ea/0x5d0 19:47:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e22, 0x10000, @local, 0x7}, 0x1c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000200)=[@in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e21, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5c2}, @in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e22, 0x5, @local, 0x800}, @in={0x2, 0x4e22, @multicast2}], 0x68) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/access\x00', 0x2, 0x0) [ 257.597439] ? __ia32_sys_socket+0xb0/0xb0 [ 257.601683] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.606446] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.611204] ? do_syscall_64+0x26/0x620 [ 257.615176] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.620553] ? do_syscall_64+0x26/0x620 [ 257.624549] __x64_sys_socketpair+0x97/0xf0 [ 257.628891] do_syscall_64+0xfd/0x620 [ 257.632710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.637909] RIP: 0033:0x45a909 [ 257.641117] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.660032] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 257.667746] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 257.675017] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 257.682285] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 257.689557] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 257.696828] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 257.711274] CPU: 1 PID: 10073 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 257.719113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 257.728482] Call Trace: [ 257.731088] dump_stack+0x197/0x210 [ 257.734722] should_fail.cold+0xa/0x1b [ 257.738625] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 257.743760] ? lock_downgrade+0x880/0x880 [ 257.747940] __should_failslab+0x121/0x190 [ 257.752198] should_failslab+0x9/0x14 [ 257.756008] kmem_cache_alloc+0x2ae/0x700 [ 257.760175] ? rcu_read_lock_sched_held+0x110/0x130 [ 257.765213] selinux_file_alloc_security+0xb4/0x190 [ 257.770249] security_file_alloc+0x63/0xa0 [ 257.774491] __alloc_file+0xcf/0x330 [ 257.778220] alloc_empty_file+0x72/0x170 [ 257.782286] path_openat+0xef/0x45e0 [ 257.786005] ? __lock_acquire+0x6ee/0x49c0 [ 257.790239] ? getname_flags+0xd6/0x5b0 [ 257.794227] ? getname+0x1a/0x20 [ 257.797592] ? do_sys_open+0x2c9/0x550 [ 257.801480] ? __x64_sys_openat+0x9d/0x100 [ 257.805723] ? do_syscall_64+0xfd/0x620 [ 257.809786] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.815156] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 257.819826] ? __lock_is_held+0xb6/0x140 [ 257.823902] do_filp_open+0x1a1/0x280 [ 257.827700] ? __alloc_fd+0x44d/0x560 [ 257.831501] ? may_open_dev+0x100/0x100 [ 257.835487] ? lock_downgrade+0x880/0x880 [ 257.839642] ? do_raw_spin_unlock+0x178/0x270 [ 257.844161] do_sys_open+0x3fe/0x550 [ 257.847889] ? filp_open+0x80/0x80 [ 257.851438] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.856195] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 257.860949] ? do_syscall_64+0x26/0x620 [ 257.864926] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.870288] ? do_syscall_64+0x26/0x620 [ 257.874267] __x64_sys_openat+0x9d/0x100 [ 257.878336] do_syscall_64+0xfd/0x620 [ 257.882190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 257.887398] RIP: 0033:0x45a909 [ 257.890610] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 257.909525] RSP: 002b:00007fe442d33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 257.917239] RAX: ffffffffffffffda RBX: 00007fe442d33c90 RCX: 000000000045a909 [ 257.924503] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 257.931943] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 257.939214] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d346d4 19:47:49 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ff", 0x5b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:49 executing program 0 (fault-call:2 fault-nth:8): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 257.946482] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000003 [ 258.047230] FAULT_INJECTION: forcing a failure. [ 258.047230] name failslab, interval 1, probability 0, space 0, times 0 [ 258.058729] CPU: 0 PID: 10089 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 258.066539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.075904] Call Trace: [ 258.078519] dump_stack+0x197/0x210 [ 258.082177] should_fail.cold+0xa/0x1b [ 258.086085] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 258.091210] ? __lock_is_held+0xb6/0x140 19:47:49 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x1000000, 0x12) 19:47:49 executing program 5 (fault-call:2 fault-nth:4): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:49 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RLINK(r1, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r2, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 258.095292] __should_failslab+0x121/0x190 [ 258.099540] should_failslab+0x9/0x14 [ 258.103354] kmem_cache_alloc+0x47/0x700 [ 258.107438] ebitmap_cpy+0xcd/0x270 [ 258.111072] ? hashtab_search+0x1b9/0x250 [ 258.115232] mls_compute_sid+0x5d0/0xf60 [ 258.119318] ? mls_convert_context+0x790/0x790 [ 258.123925] security_compute_sid.part.0+0xace/0x15c0 [ 258.129139] ? compute_sid_handle_invalid_context+0x340/0x340 [ 258.135039] ? __do_page_fault+0x676/0xe90 [ 258.139294] ? __lock_acquire+0x6ee/0x49c0 19:47:50 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcsa\x00', 0x8002, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0x7f) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 258.140063] FAULT_INJECTION: forcing a failure. [ 258.140063] name failslab, interval 1, probability 0, space 0, times 0 [ 258.143536] ? lock_downgrade+0x880/0x880 [ 258.143551] ? count_memcg_event_mm+0x2b1/0x4d0 [ 258.143579] security_transition_sid+0x126/0x190 [ 258.143603] selinux_socket_create+0x44c/0x610 [ 258.173097] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 258.178294] ? __might_fault+0x12b/0x1e0 [ 258.182379] security_socket_create+0x7b/0xc0 [ 258.187246] __sock_create+0x90/0x730 [ 258.187266] __sys_socketpair+0x1ea/0x5d0 19:47:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf\x1c\xb1f\xf7\x9e\xe0\xbawP\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x87\xb8[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa02\xdb\x95wp\xfb\x01\xf3\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x11\x8c\xbc\xad+\x97\x03\xd6\xbbL', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x26d) [ 258.195233] ? __ia32_sys_socket+0xb0/0xb0 [ 258.195253] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.204226] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.208996] ? do_syscall_64+0x26/0x620 [ 258.212966] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.218333] ? do_syscall_64+0x26/0x620 [ 258.222325] __x64_sys_socketpair+0x97/0xf0 [ 258.226654] do_syscall_64+0xfd/0x620 [ 258.230472] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.235666] RIP: 0033:0x45a909 19:47:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000080), 0x0, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x50f) [ 258.238863] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.261416] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 258.269129] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 258.276407] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 258.283685] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.291047] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 258.298332] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 258.336619] CPU: 1 PID: 10095 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 19:47:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x2000000, 0x12) 19:47:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ff", 0x5b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 258.344464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.353834] Call Trace: [ 258.356436] dump_stack+0x197/0x210 [ 258.360076] should_fail.cold+0xa/0x1b [ 258.363980] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 258.369097] ? lock_downgrade+0x880/0x880 [ 258.373272] __should_failslab+0x121/0x190 [ 258.377521] should_failslab+0x9/0x14 [ 258.381338] kmem_cache_alloc_trace+0x2cc/0x760 [ 258.386021] ? pointer+0x970/0x970 [ 258.389663] snd_seq_create_port+0xb4/0x590 [ 258.394004] ? scnprintf+0x140/0x140 19:47:50 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x2, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000a40)='net/netstat\x00') write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 258.397727] ? path_openat+0x10d7/0x45e0 [ 258.401803] snd_seq_ioctl_create_port+0x109/0x6d0 [ 258.406744] ? mark_held_locks+0x100/0x100 [ 258.406764] snd_seq_kernel_client_ctl+0xf8/0x140 [ 258.406780] create_port+0x18a/0x250 [ 258.406793] ? async_call_lookup_ports+0x20/0x20 [ 258.406816] ? snd_seq_oss_process_event+0x26c0/0x26c0 [ 258.419581] ? create_port+0x250/0x250 [ 258.433582] snd_seq_oss_open+0x2dd/0x960 [ 258.437754] odev_open+0x70/0x90 [ 258.441124] ? odev_release+0x80/0x80 [ 258.445015] soundcore_open+0x453/0x610 [ 258.449007] ? sound_devnode+0xf0/0xf0 [ 258.452908] chrdev_open+0x245/0x6b0 [ 258.456635] ? cdev_put.part.0+0x50/0x50 [ 258.460713] ? security_file_open+0x16b/0x1b0 [ 258.465223] do_dentry_open+0x4c3/0x1210 [ 258.469415] ? kasan_check_read+0x11/0x20 [ 258.473581] ? cdev_put.part.0+0x50/0x50 [ 258.477670] ? chown_common+0x5c0/0x5c0 [ 258.481664] ? inode_permission+0xb4/0x560 [ 258.486019] vfs_open+0xa0/0xd0 [ 258.486033] path_openat+0x10d7/0x45e0 [ 258.486050] ? __lock_acquire+0x6ee/0x49c0 [ 258.486063] ? finish_task_switch+0x146/0x7c0 [ 258.486076] ? _raw_spin_unlock_irq+0x28/0x90 [ 258.486099] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 258.486112] ? __lock_is_held+0xb6/0x140 [ 258.486131] ? f2fs_write_failed.isra.0+0x10/0xd0 [ 258.494248] do_filp_open+0x1a1/0x280 [ 258.494261] ? __alloc_fd+0x44d/0x560 [ 258.494276] ? may_open_dev+0x100/0x100 [ 258.532606] ? do_raw_spin_unlock+0x178/0x270 [ 258.537136] do_sys_open+0x3fe/0x550 [ 258.540873] ? filp_open+0x80/0x80 [ 258.544436] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.549206] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.553975] ? do_syscall_64+0x26/0x620 [ 258.557965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.563342] ? do_syscall_64+0x26/0x620 [ 258.567336] __x64_sys_openat+0x9d/0x100 [ 258.571414] do_syscall_64+0xfd/0x620 [ 258.575245] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.580452] RIP: 0033:0x45a909 [ 258.583653] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.602593] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 258.610324] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 258.617612] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 258.624900] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 258.632309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 258.632323] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 258.674157] ALSA: seq_oss: can't create port 19:47:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2bf283627741a5ab) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:50 executing program 0 (fault-call:2 fault-nth:9): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ff", 0x5b) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:50 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r2 = socket$unix(0x1, 0x5, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x200, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() gettid() r5 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r6 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0xc4cedb54ce2eaede) sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x6e, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1400000000000000fd0000a8c5893000", @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r4, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r2, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r5, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r6, @ANYRES32=r3, @ANYRES32=r2, @ANYRES32=r1], 0x80}], 0x1, 0x0) r7 = getpgrp(r4) r8 = syz_open_procfs(r7, &(0x7f0000000380)='mountstats\x00') write$apparmor_exec(r8, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x50f) [ 258.732512] FAULT_INJECTION: forcing a failure. [ 258.732512] name failslab, interval 1, probability 0, space 0, times 0 [ 258.758310] CPU: 1 PID: 10124 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 258.766770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.776133] Call Trace: [ 258.778737] dump_stack+0x197/0x210 [ 258.782385] should_fail.cold+0xa/0x1b [ 258.786303] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 258.791426] ? lock_downgrade+0x880/0x880 [ 258.795593] __should_failslab+0x121/0x190 [ 258.799850] should_failslab+0x9/0x14 [ 258.803666] kmem_cache_alloc+0x2ae/0x700 [ 258.807815] ? selinux_socket_create+0x2ab/0x610 [ 258.812567] ? sock_destroy_inode+0x60/0x60 [ 258.816885] sock_alloc_inode+0x1d/0x260 [ 258.820941] alloc_inode+0x64/0x190 [ 258.824559] new_inode_pseudo+0x19/0xf0 [ 258.828527] sock_alloc+0x41/0x270 [ 258.832145] __sock_create+0xc2/0x730 [ 258.835941] __sys_socketpair+0x1ea/0x5d0 [ 258.840095] ? __ia32_sys_socket+0xb0/0xb0 [ 258.844329] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.849077] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 258.854006] ? do_syscall_64+0x26/0x620 [ 258.858016] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.863383] ? do_syscall_64+0x26/0x620 [ 258.867354] __x64_sys_socketpair+0x97/0xf0 [ 258.871669] do_syscall_64+0xfd/0x620 [ 258.875463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 258.880637] RIP: 0033:0x45a909 [ 258.883818] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 258.902725] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 258.910423] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 258.917679] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 258.924936] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:50 executing program 5 (fault-call:2 fault-nth:5): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:50 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x9000000, 0x12) 19:47:50 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf", 0x5c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 258.932194] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 258.939549] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 259.008845] FAULT_INJECTION: forcing a failure. [ 259.008845] name failslab, interval 1, probability 0, space 0, times 0 [ 259.033872] CPU: 1 PID: 10139 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 259.041728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.051093] Call Trace: [ 259.053707] dump_stack+0x197/0x210 [ 259.057367] should_fail.cold+0xa/0x1b [ 259.061271] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 259.066382] ? lock_downgrade+0x880/0x880 [ 259.070533] __should_failslab+0x121/0x190 [ 259.074764] should_failslab+0x9/0x14 [ 259.078555] kmem_cache_alloc_trace+0x2cc/0x760 [ 259.083216] ? kasan_check_write+0x14/0x20 [ 259.087448] snd_seq_queue_alloc+0x54/0x4d0 [ 259.091769] ? snd_seq_kernel_client_ctl+0x100/0x140 [ 259.096869] snd_seq_ioctl_create_queue+0xb0/0x330 [ 259.101789] snd_seq_kernel_client_ctl+0xf8/0x140 [ 259.106623] alloc_seq_queue.isra.0+0xdc/0x180 [ 259.111192] ? delete_port+0xd0/0xd0 [ 259.114915] snd_seq_oss_open+0x2ff/0x960 [ 259.119094] odev_open+0x70/0x90 [ 259.122452] ? odev_release+0x80/0x80 [ 259.126243] soundcore_open+0x453/0x610 [ 259.130212] ? sound_devnode+0xf0/0xf0 [ 259.134098] chrdev_open+0x245/0x6b0 [ 259.137803] ? cdev_put.part.0+0x50/0x50 [ 259.141857] ? security_file_open+0x16b/0x1b0 [ 259.146345] do_dentry_open+0x4c3/0x1210 [ 259.150396] ? kasan_check_read+0x11/0x20 [ 259.154532] ? cdev_put.part.0+0x50/0x50 [ 259.158590] ? chown_common+0x5c0/0x5c0 [ 259.162555] ? inode_permission+0xb4/0x560 [ 259.166782] vfs_open+0xa0/0xd0 [ 259.170052] path_openat+0x10d7/0x45e0 [ 259.173931] ? __lock_acquire+0x6ee/0x49c0 [ 259.178151] ? getname_flags+0xd6/0x5b0 [ 259.182111] ? getname+0x1a/0x20 [ 259.185480] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 259.190137] ? __lock_is_held+0xb6/0x140 [ 259.194194] ? find_held_lock+0x35/0x130 [ 259.198246] do_filp_open+0x1a1/0x280 [ 259.202036] ? __alloc_fd+0x44d/0x560 [ 259.205827] ? may_open_dev+0x100/0x100 [ 259.209801] ? do_raw_spin_unlock+0x178/0x270 [ 259.214297] do_sys_open+0x3fe/0x550 [ 259.218004] ? filp_open+0x80/0x80 [ 259.221537] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.226284] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.231031] ? do_syscall_64+0x26/0x620 [ 259.234996] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.240346] ? do_syscall_64+0x26/0x620 [ 259.244313] __x64_sys_openat+0x9d/0x100 [ 259.248367] do_syscall_64+0xfd/0x620 [ 259.252158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.257336] RIP: 0033:0x45a909 [ 259.260518] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.279407] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 259.287103] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 259.294472] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 259.301756] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf", 0x5c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) select(0x40, &(0x7f00000000c0)={0x10000, 0x0, 0xcf, 0x1, 0x0, 0x100000000, 0x4, 0x2}, &(0x7f0000000100)={0x58b, 0x8000, 0x7, 0x101, 0xbe, 0x1ff, 0x1ff, 0x7fffffff}, &(0x7f0000000140)={0x1, 0x3, 0x2, 0xfffffffffffffffd, 0x8001, 0xfffffffffffffffd, 0x4, 0x5}, &(0x7f0000000180)={0x0, 0x2710}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80064d1c, &(0x7f0000000340)) write$apparmor_exec(r1, &(0x7f00000000c0)=ANY=[], 0x0) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x0, 0x0) setsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000080)=0x1, 0x4) [ 259.309026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 259.316301] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 259.335540] socket: no more sockets 19:47:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf", 0x5c) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='\x00?\x00', 0x10000, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:51 executing program 0 (fault-call:2 fault-nth:10): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:51 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80064d1c, &(0x7f0000000340)) r3 = dup3(r2, r0, 0xc0000) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x101400, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xa000000, 0x12) 19:47:51 executing program 5 (fault-call:2 fault-nth:6): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 259.534043] FAULT_INJECTION: forcing a failure. [ 259.534043] name failslab, interval 1, probability 0, space 0, times 0 [ 259.630168] CPU: 1 PID: 10161 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 259.638142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.647532] Call Trace: [ 259.650148] dump_stack+0x197/0x210 [ 259.653803] should_fail.cold+0xa/0x1b [ 259.657862] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 259.657885] ? lock_downgrade+0x880/0x880 [ 259.657908] __should_failslab+0x121/0x190 [ 259.657927] should_failslab+0x9/0x14 [ 259.667205] kmem_cache_alloc_trace+0x2cc/0x760 [ 259.667220] ? kmem_cache_alloc+0x32a/0x700 [ 259.667237] ? selinux_socket_create+0x2ab/0x610 [ 259.667254] ? sock_destroy_inode+0x60/0x60 [ 259.667269] sock_alloc_inode+0x63/0x260 [ 259.667282] alloc_inode+0x64/0x190 [ 259.667295] new_inode_pseudo+0x19/0xf0 [ 259.667308] sock_alloc+0x41/0x270 [ 259.667322] __sock_create+0xc2/0x730 [ 259.667341] __sys_socketpair+0x1ea/0x5d0 [ 259.717515] ? __ia32_sys_socket+0xb0/0xb0 [ 259.721760] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.726524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 259.731285] ? do_syscall_64+0x26/0x620 [ 259.735266] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.740629] ? do_syscall_64+0x26/0x620 [ 259.744627] __x64_sys_socketpair+0x97/0xf0 [ 259.748961] do_syscall_64+0xfd/0x620 [ 259.752766] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.760996] RIP: 0033:0x45a909 19:47:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) [ 259.764195] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.783102] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 259.790813] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 259.798082] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 259.805349] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.812617] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 259.819888] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:51 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x50f) 19:47:51 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x10000000, 0x12) 19:47:51 executing program 0 (fault-call:2 fault-nth:11): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 259.913146] socket: no more sockets 19:47:51 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x9, 0x4, 0xff, 0x7f, 0x0, 0x7e14, 0x2a0, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xba3f, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x4000, 0x0, 0xfff, 0x8, 0x8, 0x1, 0x200}, 0x0, 0x3, r0, 0x8) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$unix(0x1, 0x5, 0x0) bind$unix(r4, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r4, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) connect(r5, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r6 = gettid() r7 = gettid() sendmmsg$unix(r5, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x200000ae, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0xfd, 0x1, [r5]}}, @cred={{0x1c, 0x1, 0x2, {r6}}}, @rights={{0x14, 0x1, 0x1, [r4]}}, @cred={{0x1c, 0x1, 0x2, {r7}}}], 0x70}], 0xfd, 0x0) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(r9, r9) sendmsg$nl_generic(r3, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x808244}, 0xc, &(0x7f0000000500)={&(0x7f0000000280)={0x270, 0x3e, 0x400, 0x70bd27, 0x25dfdbff, {0x17}, [@nested={0x25c, 0x2d, [@generic="ff81201f42ba1dcc2b5d7af33c606632c1d6f09978e3102f075de3c0f9ed33a2813b56425437032b4534062ba4f7f9015f32c196ca57980aebb97233634a73c55c03793373304a361016ab7750e6bd137a50cb38552491883a162cad967b3bd53c92fceb801c6566eec50d152663d930003fcb42669ca1f3ded6a0837a255e4be1e1d212ce64c91807bc198774daad766ee84950515a468e5caa96b7e160e07a779d0b54458c3be84d24d6ee63ca4334ba29c69e1c6e28", @generic="40729f26280a81b86fd2aadf448865da0fa63a7e1e2c238472449e4a14", @typed={0x10, 0x5c, @str='/dev/autofs\x00'}, @typed={0x8, 0x5, @pid}, @typed={0x8, 0x8c, @pid=r7}, @typed={0x14, 0x6f, @ipv6=@dev={0xfe, 0x80, [], 0x11}}, @generic="bbe5bede2be5eb474abcb90e0b39f23fdee8fcc89c70aee6107f18672799fced895a60ba67b0fe4b33459413648ba40e7264a9950d5fd1240033446905b7c0cffa82cfe90ce3bc2b724c6fc303927c406a590bcf58bf625cb4cfbbf9", @typed={0x8, 0x84, @uid=r9}, @generic="a21ef4d65ae10c461425d6740f844ea112196909da1085f14178b1e561d169d8185fc079b72da422a98f6b1aa83cdbd12ca27ca17b483736a017168a961f7c7091eae6e9f21fba638f7e13c074a3a2554dd39b3929689f54afbfc99f62d8ed98e96a67c76d3136ce8b2b0737357f79ba24112092cd7c51b4bb3bd990e379e6383f7df6ac4e78615a5e78cc00f10641525b7deed5cb709b74b3b55edf66e42e9b7b6a703971df72e6b4142fdd2c3925d47fd5592b254f70ae4bf32fbde109411a5c95dbc497a7826a424f954322ce20bd27816aa77744b668ebd42fb851be985e26494be199aaf9c3", @typed={0x4, 0xe}]}]}, 0x270}, 0x1, 0x0, 0x0, 0x106}, 0x40000) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000200)) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') [ 259.967576] FAULT_INJECTION: forcing a failure. [ 259.967576] name failslab, interval 1, probability 0, space 0, times 0 [ 260.010821] FAULT_INJECTION: forcing a failure. [ 260.010821] name failslab, interval 1, probability 0, space 0, times 0 [ 260.045118] CPU: 0 PID: 10191 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 260.053004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.062366] Call Trace: [ 260.064973] dump_stack+0x197/0x210 19:47:51 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x7fffffff, 0x240400) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x21000100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000500)={0xfc, r1, 0x300, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xd1fd}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'gretap0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x23}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'eql\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffeffff}]}, 0xfc}, 0x1, 0x0, 0x0, 0x40848c2}, 0x42003) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x90100, 0x0) write$P9_RREADLINK(r2, &(0x7f00000000c0)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x80000, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) accept$alg(r3, 0x0, 0x0) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000280)="8b", 0x1) ioctl$sock_proto_private(r3, 0x89eb, &(0x7f0000000040)="f1ef48c3a17d3991afa4efd8dfa88e2348783da77f60e6bf8b62b11e2c452e90d33f7dbe88b36bf1e2aa1c98") r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r4, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 260.068610] should_fail.cold+0xa/0x1b [ 260.072514] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 260.077643] __should_failslab+0x121/0x190 [ 260.081893] should_failslab+0x9/0x14 [ 260.085707] kmem_cache_alloc+0x2ae/0x700 [ 260.089866] ? map_id_range_down+0x1ee/0x370 [ 260.094292] ? __put_user_ns+0x70/0x70 [ 260.098192] selinux_inode_alloc_security+0xb6/0x2a0 [ 260.098210] security_inode_alloc+0x8a/0xd0 [ 260.107612] inode_init_always+0x56e/0xb40 [ 260.107627] alloc_inode+0x81/0x190 [ 260.107641] new_inode_pseudo+0x19/0xf0 [ 260.107658] sock_alloc+0x41/0x270 [ 260.107678] __sock_create+0xc2/0x730 [ 260.126807] __sys_socketpair+0x1ea/0x5d0 [ 260.130977] ? __ia32_sys_socket+0xb0/0xb0 [ 260.135315] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.140084] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.144852] ? do_syscall_64+0x26/0x620 [ 260.148840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.154215] ? do_syscall_64+0x26/0x620 [ 260.158205] __x64_sys_socketpair+0x97/0xf0 [ 260.162537] do_syscall_64+0xfd/0x620 [ 260.166338] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.171515] RIP: 0033:0x45a909 [ 260.174698] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.193587] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 260.201288] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 260.208548] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d 19:47:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, 0x0) [ 260.215822] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.223080] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 260.230338] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 260.240236] CPU: 0 PID: 10185 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 260.248061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.257601] Call Trace: [ 260.260212] dump_stack+0x197/0x210 [ 260.263852] should_fail.cold+0xa/0x1b 19:47:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80064d1c, &(0x7f0000000340)) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x9, 0xbc, 0x7, 0x2, 0x7}) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 260.267767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 260.272979] ? lock_downgrade+0x880/0x880 [ 260.277161] __should_failslab+0x121/0x190 [ 260.281412] should_failslab+0x9/0x14 [ 260.285225] kmem_cache_alloc_trace+0x2cc/0x760 [ 260.290343] ? kasan_check_write+0x14/0x20 [ 260.290365] snd_seq_queue_alloc+0x54/0x4d0 [ 260.290381] ? snd_seq_kernel_client_ctl+0x100/0x140 [ 260.304027] snd_seq_ioctl_create_queue+0xb0/0x330 [ 260.309083] snd_seq_kernel_client_ctl+0xf8/0x140 [ 260.313947] alloc_seq_queue.isra.0+0xdc/0x180 19:47:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, 0x0) [ 260.318549] ? delete_port+0xd0/0xd0 [ 260.322306] snd_seq_oss_open+0x2ff/0x960 [ 260.326473] odev_open+0x70/0x90 [ 260.329850] ? odev_release+0x80/0x80 [ 260.333661] soundcore_open+0x453/0x610 [ 260.337654] ? sound_devnode+0xf0/0xf0 [ 260.341572] chrdev_open+0x245/0x6b0 [ 260.345296] ? cdev_put.part.0+0x50/0x50 [ 260.345317] ? security_file_open+0x16b/0x1b0 [ 260.353857] do_dentry_open+0x4c3/0x1210 [ 260.357930] ? kasan_check_read+0x11/0x20 [ 260.362100] ? cdev_put.part.0+0x50/0x50 [ 260.366178] ? chown_common+0x5c0/0x5c0 19:47:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000880)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x26d) [ 260.370164] ? inode_permission+0xb4/0x560 [ 260.374413] vfs_open+0xa0/0xd0 [ 260.377706] path_openat+0x10d7/0x45e0 [ 260.381609] ? __lock_acquire+0x6ee/0x49c0 [ 260.385849] ? getname_flags+0xd6/0x5b0 [ 260.389827] ? getname+0x1a/0x20 [ 260.393221] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 260.397905] ? __lock_is_held+0xb6/0x140 [ 260.401990] do_filp_open+0x1a1/0x280 [ 260.405801] ? __alloc_fd+0x44d/0x560 [ 260.409613] ? may_open_dev+0x100/0x100 [ 260.413609] ? do_raw_spin_unlock+0x178/0x270 [ 260.418136] do_sys_open+0x3fe/0x550 [ 260.418152] ? filp_open+0x80/0x80 [ 260.425417] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.430187] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.434962] ? do_syscall_64+0x26/0x620 [ 260.438945] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.444316] ? do_syscall_64+0x26/0x620 [ 260.448309] __x64_sys_openat+0x9d/0x100 [ 260.452410] do_syscall_64+0xfd/0x620 [ 260.456244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.461426] RIP: 0033:0x45a909 [ 260.464608] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.483512] RSP: 002b:00007fe442d33c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 260.491221] RAX: ffffffffffffffda RBX: 00007fe442d33c90 RCX: 000000000045a909 [ 260.498499] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 260.505760] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 260.513020] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d346d4 [ 260.520276] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000003 [ 260.562775] socket: no more sockets 19:47:52 executing program 5 (fault-call:2 fault-nth:7): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x100, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000080)={0xff, 0x4, 0x18, "bcd83f85a5f7d114c0551ed29dbf4010a51b4b1a179eb4c010df02479b40b6d50d19be1d71b19a3f92edc825c83c64eb78af34db40757eca1de139e4", 0x2b, "a5f2c7f954c5b0f0422b32e86e0c08a8a9d030704ce8abab9d5aaecb514aab96a49a6ff5b1e2151cfdce9155331c46533e297f24328c5c57c76afac9", 0x8}) write$apparmor_exec(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"/621], 0xffffffffffffff79) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$rds(r3, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) 19:47:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, 0x0) [ 260.678451] FAULT_INJECTION: forcing a failure. [ 260.678451] name failslab, interval 1, probability 0, space 0, times 0 [ 260.690740] CPU: 0 PID: 10226 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 260.698565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.707944] Call Trace: [ 260.710553] dump_stack+0x197/0x210 [ 260.714204] should_fail.cold+0xa/0x1b [ 260.718118] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 260.723241] ? lock_downgrade+0x880/0x880 19:47:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x100000000000000, 0x12) 19:47:52 executing program 0 (fault-call:2 fault-nth:12): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:52 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 260.727419] __should_failslab+0x121/0x190 [ 260.731677] should_failslab+0x9/0x14 [ 260.735495] kmem_cache_alloc_trace+0x2cc/0x760 [ 260.740178] ? lockdep_init_map+0x9/0x10 [ 260.744245] ? debug_mutex_init+0x2d/0x60 [ 260.744271] snd_seq_prioq_new+0x40/0x120 [ 260.752559] snd_seq_queue_alloc+0x128/0x4d0 [ 260.757086] ? snd_seq_kernel_client_ctl+0x100/0x140 [ 260.757106] snd_seq_ioctl_create_queue+0xb0/0x330 [ 260.757120] snd_seq_kernel_client_ctl+0xf8/0x140 [ 260.757136] alloc_seq_queue.isra.0+0xdc/0x180 [ 260.772046] ? delete_port+0xd0/0xd0 [ 260.772094] snd_seq_oss_open+0x2ff/0x960 [ 260.784536] odev_open+0x70/0x90 [ 260.787918] ? odev_release+0x80/0x80 [ 260.791740] soundcore_open+0x453/0x610 [ 260.795752] ? sound_devnode+0xf0/0xf0 [ 260.799645] chrdev_open+0x245/0x6b0 [ 260.803361] ? cdev_put.part.0+0x50/0x50 [ 260.807440] ? security_file_open+0x16b/0x1b0 [ 260.811952] do_dentry_open+0x4c3/0x1210 [ 260.816024] ? kasan_check_read+0x11/0x20 [ 260.820188] ? cdev_put.part.0+0x50/0x50 [ 260.824279] ? chown_common+0x5c0/0x5c0 [ 260.828280] ? inode_permission+0xb4/0x560 [ 260.832540] vfs_open+0xa0/0xd0 [ 260.835832] path_openat+0x10d7/0x45e0 [ 260.839751] ? __lock_acquire+0x6ee/0x49c0 [ 260.844010] ? getname_flags+0xd6/0x5b0 [ 260.847993] ? getname+0x1a/0x20 [ 260.851415] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 260.856104] ? __lock_is_held+0xb6/0x140 [ 260.860190] do_filp_open+0x1a1/0x280 [ 260.864008] ? __alloc_fd+0x44d/0x560 [ 260.865239] FAULT_INJECTION: forcing a failure. [ 260.865239] name failslab, interval 1, probability 0, space 0, times 0 [ 260.867828] ? may_open_dev+0x100/0x100 [ 260.867865] ? do_raw_spin_unlock+0x178/0x270 [ 260.887766] do_sys_open+0x3fe/0x550 [ 260.891495] ? filp_open+0x80/0x80 [ 260.895050] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.899801] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 260.904551] ? do_syscall_64+0x26/0x620 [ 260.908532] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.913918] ? do_syscall_64+0x26/0x620 [ 260.917895] __x64_sys_openat+0x9d/0x100 [ 260.917913] do_syscall_64+0xfd/0x620 [ 260.917931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.917945] RIP: 0033:0x45a909 [ 260.934178] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.953171] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 260.960884] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 260.968154] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 260.975417] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.982681] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 260.989967] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 260.997270] CPU: 1 PID: 10235 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 261.005086] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.014449] Call Trace: [ 261.017055] dump_stack+0x197/0x210 [ 261.020700] should_fail.cold+0xa/0x1b [ 261.024605] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 261.029723] ? lock_downgrade+0x880/0x880 [ 261.033894] __should_failslab+0x121/0x190 [ 261.038137] should_failslab+0x9/0x14 [ 261.041948] __kmalloc+0x2e2/0x750 [ 261.045568] ? sk_prot_alloc+0x19c/0x2e0 [ 261.049641] sk_prot_alloc+0x19c/0x2e0 [ 261.053536] sk_alloc+0x39/0xf70 [ 261.056963] can_create+0x1e7/0x4b0 [ 261.056982] __sock_create+0x3d8/0x730 [ 261.057001] __sys_socketpair+0x1ea/0x5d0 [ 261.064504] ? __ia32_sys_socket+0xb0/0xb0 [ 261.064524] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.064540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.064554] ? do_syscall_64+0x26/0x620 [ 261.064568] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.064580] ? do_syscall_64+0x26/0x620 [ 261.064596] __x64_sys_socketpair+0x97/0xf0 [ 261.064613] do_syscall_64+0xfd/0x620 [ 261.086452] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.086467] RIP: 0033:0x45a909 19:47:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0xffffffffffffffc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0xffffffffffffffc1}, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f0000000200)={{0x8, 0x2, 0x178, 0x9, 'syz0\x00', 0x3}, 0x6, [0x80000001, 0x3, 0xff, 0x8, 0x1000, 0x1, 0x6, 0x6, 0xfff, 0x5, 0xce, 0x2, 0x65a1, 0x1, 0x7, 0x800000000000000, 0x76f, 0x400, 0x1, 0x6, 0x300000000000000, 0x2, 0x7, 0x9, 0x1ff, 0x8001, 0x400, 0x40, 0x77, 0xfffffffffffffff7, 0x1f, 0x7, 0xe0000000, 0x1, 0x6, 0x8000000000, 0x6, 0x9, 0xa40, 0x5, 0x2, 0x20000000000000, 0x9, 0x6, 0x80000000, 0x7cf0, 0x7ff, 0x0, 0x2, 0x10000, 0x5, 0x80, 0x9, 0x9, 0x8, 0xb, 0x5b28, 0x4, 0x3, 0x4, 0x9, 0xffffffff, 0x8, 0x6aa6, 0x0, 0x7e319650, 0x27a0e84f, 0x9, 0x1c0000000000000, 0x401, 0x8, 0xeb1, 0x4, 0xfffffffffffffff7, 0x7, 0x5e56864f, 0x0, 0x7, 0x0, 0x2, 0x800, 0x2, 0x5, 0x0, 0x4, 0x0, 0x2, 0x8, 0x5, 0x400, 0x9, 0x4, 0x81, 0x80000000, 0x0, 0x9, 0x2, 0x2bc0000000, 0xffff, 0x9, 0x401, 0x9, 0xe4b, 0x6, 0x5, 0x1, 0x0, 0x0, 0x1f, 0xb904, 0x74, 0x2, 0xfffffffffffffff7, 0x5, 0x1f, 0x8a4e, 0x1002, 0x400, 0xa37, 0x1c, 0xffffffffffffffff, 0x401, 0x80000001, 0x3, 0x7, 0x2, 0x83c, 0x1], {r2, r3+30000000}}) r4 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:52 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) 19:47:52 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x200000000000000, 0x12) 19:47:52 executing program 5 (fault-call:2 fault-nth:8): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 261.112277] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.131187] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 261.138912] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 261.146200] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 261.153493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.154204] FAULT_INJECTION: forcing a failure. [ 261.154204] name failslab, interval 1, probability 0, space 0, times 0 [ 261.160768] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) 19:47:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x1, 0x4) syz_read_part_table(0x4, 0x5, &(0x7f0000001880)=[{&(0x7f0000000880)="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", 0x1000, 0x9}, {&(0x7f0000000080)="685280111d1ca80f10f5b50d9bc30bfb780c4ce8e9a33ab7c42cf3ce15a55d21abb37be60b2ed58d7a80bc1f31895f491a5d621f67862cf09cbe5c2ffbd2fb54f3aad67f7285f4dadd60b5eceff2663d2119a38d72ca95b731d4b860110eebc7c7f5df87d31b2e94add8d0eb08aa6404930639eb03ac1ada149fa7c799a6388255610ff06215dc8e435f3dd0307a8ea0368584e98c2f93b399fb4a664231c0144ae14c", 0xa3, 0x9}, {&(0x7f0000000140)="0b637e8482900e976a67a0f96f084a73e8ca6fd84dcbb49aa22e3d7762d757cc21f92723aaab8f033c7184dbae1312b6e588a93ca6152285b9df33d5bc61280c294ca1856580e68fc930a2", 0x4b, 0xfffffffffffffc01}, {&(0x7f0000000240)="b0e3f268902e06f07e41a6931ea8d65e13054f2343033031adee6834f3d4bb353f2b41dbe7b214de74b6bbe9b15c17dafa36c3953ef5398841e7ff610d997d6c933d0835a6fcd15b9968d1263ffd60649f88c7f237aadd6f7f1640764265860dafb9ac7875534e8c654e0e59a9d24689bd643320a4a961f713cccffdfb3016ed6ffa95711b0068896045a2651e6b6d8a7c6bc07b664bb408ebd4b5172aade800a55896be58f01ec283daf2f9f82977f7eb3b967bbe3865033e118bb2de70805bff34301172041d9db907958e607da776854d902c54d00dcfa07e308d1f5aa0dd0474ea0a17fedcde35dd40e86a50be163d292b0d79e970ef45", 0xf9, 0x2}, {&(0x7f0000000500)="7467e894d210c78f019565fe45f606b288ebdc960450f1f747b481c3a0db5538c5f58eae9903be6849302027f2e8d01c91a9473f4f7510ddc92e6c63dd070f92eac6a8389bf80df6ad07e4c1e0a78123a75bbe6263fbac7e96cdd9026ed6df03ccf109d80f5452ed8075cc4d1105708185bc069561188d06509242dc6f4f2f683571df192bd37eee729388ee2f848f6007cd5db4d9a12d59251ea2d160f067c27e264140edec3f8fe54c89a2071d132621bffc23302285d5f35792530a", 0xbd}]) [ 261.160776] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:53 executing program 0 (fault-call:2 fault-nth:13): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:53 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x900000000000000, 0x12) [ 261.289286] CPU: 0 PID: 10246 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 261.297138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.306512] Call Trace: [ 261.309126] dump_stack+0x197/0x210 [ 261.312781] should_fail.cold+0xa/0x1b [ 261.316690] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 261.321808] ? lock_downgrade+0x880/0x880 [ 261.325981] __should_failslab+0x121/0x190 [ 261.328749] FAULT_INJECTION: forcing a failure. [ 261.328749] name failslab, interval 1, probability 0, space 0, times 0 [ 261.330232] should_failslab+0x9/0x14 [ 261.345220] kmem_cache_alloc_trace+0x2cc/0x760 [ 261.349896] ? __lockdep_init_map+0x10c/0x5b0 [ 261.354398] snd_seq_prioq_new+0x40/0x120 [ 261.358539] snd_seq_queue_alloc+0x152/0x4d0 [ 261.362937] ? snd_seq_kernel_client_ctl+0x100/0x140 [ 261.368038] snd_seq_ioctl_create_queue+0xb0/0x330 [ 261.372975] snd_seq_kernel_client_ctl+0xf8/0x140 [ 261.377811] alloc_seq_queue.isra.0+0xdc/0x180 [ 261.382391] ? delete_port+0xd0/0xd0 [ 261.386125] snd_seq_oss_open+0x2ff/0x960 [ 261.390276] odev_open+0x70/0x90 [ 261.393634] ? odev_release+0x80/0x80 [ 261.397428] soundcore_open+0x453/0x610 [ 261.401402] ? sound_devnode+0xf0/0xf0 [ 261.405282] chrdev_open+0x245/0x6b0 [ 261.408997] ? cdev_put.part.0+0x50/0x50 [ 261.413055] ? security_file_open+0x16b/0x1b0 [ 261.417544] do_dentry_open+0x4c3/0x1210 [ 261.421596] ? kasan_check_read+0x11/0x20 [ 261.425738] ? cdev_put.part.0+0x50/0x50 [ 261.429791] ? chown_common+0x5c0/0x5c0 [ 261.433763] ? inode_permission+0xb4/0x560 [ 261.437993] vfs_open+0xa0/0xd0 [ 261.441265] path_openat+0x10d7/0x45e0 [ 261.445146] ? __lock_acquire+0x6ee/0x49c0 [ 261.449371] ? getname_flags+0xd6/0x5b0 [ 261.453338] ? getname+0x1a/0x20 [ 261.456703] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 261.461365] ? __lock_is_held+0xb6/0x140 [ 261.465425] do_filp_open+0x1a1/0x280 [ 261.469216] ? __alloc_fd+0x44d/0x560 [ 261.473020] ? may_open_dev+0x100/0x100 [ 261.476995] ? do_raw_spin_unlock+0x178/0x270 [ 261.481498] do_sys_open+0x3fe/0x550 [ 261.485327] ? filp_open+0x80/0x80 [ 261.488869] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.493622] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.498401] ? do_syscall_64+0x26/0x620 [ 261.502372] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.507739] ? do_syscall_64+0x26/0x620 [ 261.511713] __x64_sys_openat+0x9d/0x100 [ 261.515774] do_syscall_64+0xfd/0x620 [ 261.519577] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.524781] RIP: 0033:0x45a909 [ 261.531970] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.550874] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 261.558689] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 261.565954] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 261.573221] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.580509] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 261.587785] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 261.595067] CPU: 1 PID: 10261 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 261.602885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.612286] Call Trace: [ 261.614920] dump_stack+0x197/0x210 [ 261.618566] should_fail.cold+0xa/0x1b [ 261.622462] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 261.627568] ? lock_downgrade+0x880/0x880 [ 261.627592] __should_failslab+0x121/0x190 [ 261.627609] should_failslab+0x9/0x14 [ 261.627621] kmem_cache_alloc_trace+0x2cc/0x760 [ 261.627647] selinux_sk_alloc_security+0x65/0x1a0 [ 261.627664] security_sk_alloc+0x77/0xc0 [ 261.653996] sk_prot_alloc+0x1bb/0x2e0 [ 261.658012] sk_alloc+0x39/0xf70 [ 261.661409] can_create+0x1e7/0x4b0 [ 261.665062] __sock_create+0x3d8/0x730 [ 261.668981] __sys_socketpair+0x1ea/0x5d0 [ 261.673154] ? __ia32_sys_socket+0xb0/0xb0 [ 261.677393] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.682171] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 261.686942] ? do_syscall_64+0x26/0x620 [ 261.691041] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.696422] ? do_syscall_64+0x26/0x620 [ 261.700414] __x64_sys_socketpair+0x97/0xf0 [ 261.704768] do_syscall_64+0xfd/0x620 [ 261.708590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.713788] RIP: 0033:0x45a909 [ 261.716979] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:47:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x2, 0x4, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 19:47:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)) [ 261.735889] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 261.743619] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 261.750924] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 261.758309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.765792] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 261.773077] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 19:47:53 executing program 5 (fault-call:2 fault-nth:9): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:53 executing program 0 (fault-call:2 fault-nth:14): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000001400)={'stack ', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\xba\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdbe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xb1\xaa\xfc\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\xe2\xcf\xc1U\x06KE\x18y\xea\xcb[\xbf\xa5&\xc2\xcc\a\x8d*\xc2\xe0\xce7qv\x7f\xaf\xeb$\x02\xb1<%Q\x90\xd2\xa3\xf2\x02\xbf\xc7\xb0\xd1y\xc6\x80\x14\xdd\xa7\xd2wD\x7f\x84w\x89\x1c~\xa7\x7f=T\xbe\xcd\xc8\x95\x911\x94\x8bb\xc3\xccCr\x98o\xc9\x17\xe7\xad\xa6\x99\x8f\x99\xabHP\xc4\xb5\t\x15jj*!\xd0\xa2\x93\xfc\x0e\xf8\x9b4\xcf \x00\xdb\xb8GC\xb0&L\xa9\"\xe7\xfc\x1dDTRi8\xd7o\x03\xdf\xad\x14\x93\xc9\x1f\xf6O\xe3\xdb\xe1KSG\x7f\xa1\xf5\xd4\x8a\xa1\x89u\xb1\xd2I\xff\x10S\xe7\xaf\xbc\xe8\x7f\xf9\x8fE\xcc\x0ej$\xdc\x0f\xe3\x13v7X#!Y\' \xe1\xf8b\x0fb\xea\xa2]P\xfc'}, 0xfe8a) [ 261.949740] FAULT_INJECTION: forcing a failure. [ 261.949740] name failslab, interval 1, probability 0, space 0, times 0 [ 262.001661] CPU: 1 PID: 10277 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 262.009517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.018885] Call Trace: [ 262.021501] dump_stack+0x197/0x210 [ 262.025151] should_fail.cold+0xa/0x1b [ 262.029059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 262.034268] ? lock_downgrade+0x880/0x880 [ 262.038443] __should_failslab+0x121/0x190 [ 262.042698] should_failslab+0x9/0x14 [ 262.046517] kmem_cache_alloc_trace+0x2cc/0x760 [ 262.051203] ? __lockdep_init_map+0x10c/0x5b0 [ 262.054993] FAULT_INJECTION: forcing a failure. [ 262.054993] name failslab, interval 1, probability 0, space 0, times 0 [ 262.055720] snd_seq_timer_new+0x3c/0x90 [ 262.055743] snd_seq_queue_alloc+0x177/0x4d0 [ 262.075395] ? snd_seq_kernel_client_ctl+0x100/0x140 [ 262.080519] snd_seq_ioctl_create_queue+0xb0/0x330 [ 262.085450] snd_seq_kernel_client_ctl+0xf8/0x140 [ 262.090304] alloc_seq_queue.isra.0+0xdc/0x180 [ 262.094880] ? delete_port+0xd0/0xd0 [ 262.098602] snd_seq_oss_open+0x2ff/0x960 [ 262.102759] odev_open+0x70/0x90 [ 262.106117] ? odev_release+0x80/0x80 [ 262.109913] soundcore_open+0x453/0x610 [ 262.113955] ? sound_devnode+0xf0/0xf0 [ 262.117841] chrdev_open+0x245/0x6b0 [ 262.121552] ? cdev_put.part.0+0x50/0x50 [ 262.125616] ? security_file_open+0x16b/0x1b0 [ 262.130202] do_dentry_open+0x4c3/0x1210 [ 262.134294] ? kasan_check_read+0x11/0x20 [ 262.138443] ? cdev_put.part.0+0x50/0x50 [ 262.142617] ? chown_common+0x5c0/0x5c0 [ 262.146595] ? inode_permission+0xb4/0x560 [ 262.150834] vfs_open+0xa0/0xd0 [ 262.154132] path_openat+0x10d7/0x45e0 [ 262.158030] ? __lock_acquire+0x6ee/0x49c0 [ 262.162358] ? getname_flags+0xd6/0x5b0 [ 262.167200] ? getname+0x1a/0x20 [ 262.170572] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 262.175251] ? __lock_is_held+0xb6/0x140 [ 262.179332] do_filp_open+0x1a1/0x280 [ 262.183157] ? __alloc_fd+0x44d/0x560 [ 262.186983] ? may_open_dev+0x100/0x100 [ 262.190980] ? do_raw_spin_unlock+0x178/0x270 [ 262.195499] do_sys_open+0x3fe/0x550 [ 262.199212] ? filp_open+0x80/0x80 [ 262.202782] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.207540] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.212409] ? do_syscall_64+0x26/0x620 [ 262.216393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.221755] ? do_syscall_64+0x26/0x620 [ 262.225751] __x64_sys_openat+0x9d/0x100 [ 262.229853] do_syscall_64+0xfd/0x620 [ 262.233661] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.238882] RIP: 0033:0x45a909 [ 262.242077] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.260975] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 262.268681] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 262.275942] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 262.283202] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.290464] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 19:47:53 executing program 1 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:53 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x14, r2, 0xfc4318e113e49cb9, 0x0, 0x0, {0xb}}, 0x14}}, 0x0) sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0xd337bca8370aa045}, 0xc, &(0x7f0000000080)={&(0x7f0000000880)={0x244, r2, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x48f8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc229}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x27}]}, @TIPC_NLA_BEARER={0x148, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x1, @remote, 0xfffffff9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1ff, @mcast1, 0xaac}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x4, @empty, 0x9}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'hsr0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80, @loopback, 0x7c2}}}}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc36}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x80000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3f}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}]}, 0x244}, 0x1, 0x0, 0x0, 0x40000}, 0x40000014) [ 262.297741] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 262.305044] CPU: 0 PID: 10290 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 262.312866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.322421] Call Trace: [ 262.325034] dump_stack+0x197/0x210 [ 262.328682] should_fail.cold+0xa/0x1b [ 262.332589] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 262.337719] ? __lock_acquire+0x6ee/0x49c0 [ 262.341990] ? is_bpf_text_address+0xd3/0x170 [ 262.346507] __should_failslab+0x121/0x190 19:47:54 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x50f) openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)=',dev/bsg\x00', 0x80, 0x0) [ 262.350763] should_failslab+0x9/0x14 [ 262.354600] kmem_cache_alloc+0x47/0x700 [ 262.358676] ? mark_held_locks+0x100/0x100 [ 262.362932] ebitmap_cpy+0xcd/0x270 [ 262.366563] ? hashtab_search+0x1b9/0x250 [ 262.370723] mls_compute_sid+0x5d0/0xf60 [ 262.374800] ? mls_convert_context+0x790/0x790 [ 262.379398] security_compute_sid.part.0+0xace/0x15c0 [ 262.384611] ? compute_sid_handle_invalid_context+0x340/0x340 [ 262.390572] ? register_netdevice_notifier+0x3d0/0x630 [ 262.395864] ? find_held_lock+0x35/0x130 19:47:54 executing program 5 (fault-call:2 fault-nth:10): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:54 executing program 2: r0 = msgget$private(0x0, 0x0) msgrcv(r0, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/58], 0x1, 0x0, 0x800) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/228) r1 = semget(0x0, 0x0, 0x40f) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000240)=""/35) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80064d1c, &(0x7f0000000340)) r4 = dup3(r2, r3, 0x80000) ioctl$LOOP_GET_STATUS(r4, 0x4c03, &(0x7f0000000140)) r5 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r5, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000300)={'rose0\x00', {0x2, 0x4e22, @rand_addr=0x7fff}}) [ 262.399940] ? register_netdevice_notifier+0x3d0/0x630 [ 262.405244] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 262.410457] security_transition_sid+0x126/0x190 [ 262.415233] selinux_socket_post_create+0x675/0x830 [ 262.420275] ? selinux_sb_copy_data+0x4a0/0x4a0 [ 262.424965] security_socket_post_create+0x83/0xd0 [ 262.429911] __sock_create+0x5b1/0x730 [ 262.433817] __sys_socketpair+0x1ea/0x5d0 [ 262.437982] ? __ia32_sys_socket+0xb0/0xb0 [ 262.442234] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.443331] FAULT_INJECTION: forcing a failure. [ 262.443331] name failslab, interval 1, probability 0, space 0, times 0 [ 262.446997] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.447013] ? do_syscall_64+0x26/0x620 [ 262.447028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.447041] ? do_syscall_64+0x26/0x620 [ 262.447059] __x64_sys_socketpair+0x97/0xf0 [ 262.447081] do_syscall_64+0xfd/0x620 [ 262.484695] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.489901] RIP: 0033:0x45a909 19:47:54 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_SET_LAPIC(r1, 0x4400ae8f, &(0x7f0000000880)={"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"}) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r2, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 262.493106] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.512046] RSP: 002b:00007f0283382c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 262.519769] RAX: ffffffffffffffda RBX: 00007f0283382c90 RCX: 000000000045a909 [ 262.527077] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 262.534354] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 262.541632] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833836d4 [ 262.548910] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000003 [ 262.557236] CPU: 1 PID: 10298 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 262.565051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.565057] Call Trace: [ 262.565077] dump_stack+0x197/0x210 [ 262.565098] should_fail.cold+0xa/0x1b [ 262.565114] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 262.565131] ? lock_downgrade+0x880/0x880 [ 262.565156] __should_failslab+0x121/0x190 [ 262.565172] should_failslab+0x9/0x14 [ 262.565185] __kmalloc_track_caller+0x2de/0x750 [ 262.565201] ? rcu_read_lock_sched_held+0x110/0x130 [ 262.565214] ? kmem_cache_alloc_trace+0x348/0x760 [ 262.565289] ? snd_timer_instance_new+0x72/0x3d0 [ 262.565306] kstrdup+0x3a/0x70 [ 262.577250] snd_timer_instance_new+0x72/0x3d0 [ 262.584828] snd_timer_open+0x95c/0x1820 [ 262.584843] ? scnprintf+0x140/0x140 [ 262.584860] ? snd_timer_instance_new+0x3d0/0x3d0 [ 262.584875] ? fs_reclaim_acquire+0x20/0x20 [ 262.584899] snd_seq_timer_open+0x240/0x580 [ 262.584917] ? snd_seq_timer_set_skew+0xb0/0xb0 [ 262.594143] ? mark_held_locks+0xb1/0x100 [ 262.594159] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 262.594177] ? snd_seq_timer_defaults+0x389/0x470 [ 262.602174] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 262.602190] ? lockdep_hardirqs_on+0x415/0x5d0 [ 262.602210] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 262.611869] queue_use+0xcb/0x240 [ 262.611887] snd_seq_queue_alloc+0x2c5/0x4d0 [ 262.669174] snd_seq_ioctl_create_queue+0xb0/0x330 [ 262.678833] snd_seq_kernel_client_ctl+0xf8/0x140 [ 262.678849] alloc_seq_queue.isra.0+0xdc/0x180 [ 262.678861] ? delete_port+0xd0/0xd0 [ 262.678897] snd_seq_oss_open+0x2ff/0x960 [ 262.678914] odev_open+0x70/0x90 [ 262.678928] ? odev_release+0x80/0x80 [ 262.678948] soundcore_open+0x453/0x610 [ 262.725190] ? sound_devnode+0xf0/0xf0 [ 262.729094] chrdev_open+0x245/0x6b0 [ 262.732826] ? cdev_put.part.0+0x50/0x50 [ 262.732846] ? security_file_open+0x16b/0x1b0 [ 262.732861] do_dentry_open+0x4c3/0x1210 [ 262.732878] ? kasan_check_read+0x11/0x20 [ 262.741421] ? cdev_put.part.0+0x50/0x50 [ 262.741439] ? chown_common+0x5c0/0x5c0 [ 262.741455] ? inode_permission+0xb4/0x560 [ 262.741473] vfs_open+0xa0/0xd0 [ 262.752112] FAULT_INJECTION: forcing a failure. [ 262.752112] name failslab, interval 1, probability 0, space 0, times 0 [ 262.753720] path_openat+0x10d7/0x45e0 [ 262.753733] ? __lock_acquire+0x6ee/0x49c0 [ 262.753742] ? getname_flags+0xd6/0x5b0 [ 262.753749] ? getname+0x1a/0x20 [ 262.753764] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 262.753775] ? __lock_is_held+0xb6/0x140 19:47:54 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0xa00000000000000, 0x12) [ 262.753788] ? find_held_lock+0x35/0x130 [ 262.753799] do_filp_open+0x1a1/0x280 [ 262.753810] ? __alloc_fd+0x44d/0x560 [ 262.753819] ? may_open_dev+0x100/0x100 [ 262.753835] ? do_raw_spin_unlock+0x178/0x270 [ 262.753853] do_sys_open+0x3fe/0x550 [ 262.753863] ? filp_open+0x80/0x80 [ 262.753875] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.753886] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 262.753897] ? do_syscall_64+0x26/0x620 [ 262.753908] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.753918] ? do_syscall_64+0x26/0x620 [ 262.753929] __x64_sys_openat+0x9d/0x100 [ 262.753941] do_syscall_64+0xfd/0x620 [ 262.753953] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 262.753960] RIP: 0033:0x45a909 [ 262.753972] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 262.753978] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 262.753988] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 262.753994] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 262.754000] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 262.754006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 262.754012] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 262.767224] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 262.777610] CPU: 0 PID: 10304 Comm: syz-executor.1 Not tainted 4.19.88-syzkaller #0 [ 262.777616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 262.777620] Call Trace: [ 262.777640] dump_stack+0x197/0x210 [ 262.777658] should_fail.cold+0xa/0x1b [ 262.781599] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 262.785759] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 262.785777] __should_failslab+0x121/0x190 [ 262.785794] should_failslab+0x9/0x14 [ 262.824082] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 262.825633] __kmalloc+0x71/0x750 [ 262.825652] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 262.825666] __tty_buffer_request_room+0x1fb/0x5c0 [ 262.825684] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 262.829233] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 262.833957] ? do_raw_spin_lock+0xc8/0x240 [ 262.889800] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 262.894803] pty_write+0x133/0x200 [ 262.894822] tty_put_char+0x130/0x160 [ 262.894839] ? dev_match_devt+0x90/0x90 [ 262.903315] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 262.909417] ? mutex_trylock+0x1e0/0x1e0 [ 262.909432] ? kasan_check_read+0x11/0x20 [ 262.909449] do_output_char+0x15c/0x880 [ 263.065444] __process_echoes+0x3cd/0xa40 [ 263.069582] process_echoes+0xfc/0x170 [ 263.073451] n_tty_set_termios+0xb36/0xe70 [ 263.077668] ? n_tty_poll+0x940/0x940 [ 263.081453] tty_set_termios+0x659/0x8c0 [ 263.085516] ? tty_wait_until_sent+0x580/0x580 [ 263.090098] ? lock_downgrade+0x880/0x880 [ 263.094228] ? __init_ldsem+0x170/0x170 [ 263.098189] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.103728] set_termios+0x378/0x5a0 [ 263.107428] ? tty_perform_flush+0x80/0x80 [ 263.111676] ? lock_acquire+0x16f/0x3f0 [ 263.115637] ? ldsem_down_read+0x33/0x40 [ 263.119687] tty_mode_ioctl+0x601/0x8c0 [ 263.123648] ? set_termios+0x5a0/0x5a0 [ 263.127521] ? ldsem_wake+0x40/0x40 [ 263.131129] ? kasan_check_read+0x11/0x20 [ 263.135272] n_tty_ioctl_helper+0x59/0x3b0 [ 263.139504] n_tty_ioctl+0x59/0x360 [ 263.143119] ? ldsem_down_read+0x33/0x40 [ 263.147167] tty_ioctl+0x8b5/0x1510 [ 263.150776] ? commit_echoes+0x1c0/0x1c0 [ 263.154821] ? tty_vhangup+0x30/0x30 [ 263.158516] ? mark_held_locks+0x100/0x100 [ 263.162736] ? proc_cwd_link+0x1d0/0x1d0 [ 263.166785] ? __fget+0x340/0x540 [ 263.170232] ? __might_sleep+0x95/0x190 [ 263.174190] ? tty_vhangup+0x30/0x30 [ 263.177901] do_vfs_ioctl+0xd5f/0x1380 [ 263.181775] ? selinux_file_ioctl+0x46f/0x5e0 [ 263.186251] ? selinux_file_ioctl+0x125/0x5e0 [ 263.190730] ? ioctl_preallocate+0x210/0x210 [ 263.195133] ? selinux_file_mprotect+0x620/0x620 [ 263.199876] ? iterate_fd+0x360/0x360 [ 263.203663] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.209199] ? fput+0x128/0x1a0 [ 263.212479] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.218023] ? security_file_ioctl+0x8d/0xc0 [ 263.222430] ksys_ioctl+0xab/0xd0 [ 263.225874] __x64_sys_ioctl+0x73/0xb0 [ 263.229751] do_syscall_64+0xfd/0x620 [ 263.233540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.238720] RIP: 0033:0x45a909 [ 263.241899] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.260928] RSP: 002b:00007f07746fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.268622] RAX: ffffffffffffffda RBX: 00007f07746fbc90 RCX: 000000000045a909 [ 263.275875] RDX: 0000000020000000 RSI: 0000000000005402 RDI: 0000000000000003 [ 263.283144] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 263.290401] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07746fc6d4 [ 263.297921] R13: 00000000004c5a56 R14: 00000000004dbc00 R15: 0000000000000004 [ 263.305193] [ 263.305197] ====================================================== [ 263.305201] WARNING: possible circular locking dependency detected [ 263.305203] 4.19.88-syzkaller #0 Not tainted [ 263.305207] ------------------------------------------------------ [ 263.305210] syz-executor.1/10304 is trying to acquire lock: [ 263.305212] 000000001d7dfc75 (console_owner){-.-.}, at: vprintk_emit+0x3d5/0x6d0 [ 263.305220] [ 263.305223] but task is already holding lock: [ 263.305224] 000000007b412359 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 263.305233] [ 263.305235] which lock already depends on the new lock. [ 263.305237] [ 263.305238] [ 263.305241] the existing dependency chain (in reverse order) is: [ 263.305243] [ 263.305244] -> #2 (&(&port->lock)->rlock){-.-.}: [ 263.305253] _raw_spin_lock_irqsave+0x95/0xcd [ 263.305255] tty_port_tty_get+0x22/0x90 [ 263.305257] tty_port_default_wakeup+0x16/0x40 [ 263.305260] tty_port_tty_wakeup+0x57/0x70 [ 263.305262] uart_write_wakeup+0x46/0x70 [ 263.305265] serial8250_tx_chars+0x495/0xaf0 [ 263.305268] serial8250_handle_irq.part.0+0x261/0x2b0 [ 263.305271] serial8250_default_handle_irq+0xc0/0x150 [ 263.305273] serial8250_interrupt+0xfc/0x1e0 [ 263.305276] __handle_irq_event_percpu+0x144/0x8f0 [ 263.305278] handle_irq_event_percpu+0x74/0x160 [ 263.305281] handle_irq_event+0xa7/0x134 [ 263.305283] handle_edge_irq+0x25e/0x8d0 [ 263.305285] handle_irq+0x39/0x50 [ 263.305287] do_IRQ+0x99/0x1d0 [ 263.305290] ret_from_intr+0x0/0x1e [ 263.305292] native_safe_halt+0xe/0x10 [ 263.305294] arch_cpu_idle+0xa/0x10 [ 263.305297] default_idle_call+0x36/0x90 [ 263.305299] do_idle+0x30c/0x4d0 [ 263.305301] cpu_startup_entry+0xc8/0xe0 [ 263.305303] rest_init+0x219/0x222 [ 263.305306] start_kernel+0x88c/0x8c5 [ 263.305308] x86_64_start_reservations+0x29/0x2b [ 263.305311] x86_64_start_kernel+0x77/0x7b [ 263.305313] secondary_startup_64+0xa4/0xb0 [ 263.305314] [ 263.305316] -> #1 (&port_lock_key){-.-.}: [ 263.305324] _raw_spin_lock_irqsave+0x95/0xcd [ 263.305326] serial8250_console_write+0x7ca/0x9f0 [ 263.305329] univ8250_console_write+0x5f/0x70 [ 263.305331] console_unlock+0xbdf/0x10d0 [ 263.305334] vprintk_emit+0x280/0x6d0 [ 263.305336] vprintk_default+0x28/0x30 [ 263.305338] vprintk_func+0x7e/0x189 [ 263.305340] printk+0xba/0xed [ 263.305343] register_console+0x77f/0xb90 [ 263.305345] univ8250_console_init+0x3e/0x4b [ 263.305348] console_init+0x4f7/0x761 [ 263.305350] start_kernel+0x59c/0x8c5 [ 263.305352] x86_64_start_reservations+0x29/0x2b [ 263.305355] x86_64_start_kernel+0x77/0x7b [ 263.305357] secondary_startup_64+0xa4/0xb0 [ 263.305358] [ 263.305360] -> #0 (console_owner){-.-.}: [ 263.305368] lock_acquire+0x16f/0x3f0 [ 263.305370] vprintk_emit+0x412/0x6d0 [ 263.305373] vprintk_default+0x28/0x30 [ 263.305375] vprintk_func+0x7e/0x189 [ 263.305377] printk+0xba/0xed [ 263.305379] should_fail+0x6f1/0x85c [ 263.305382] __should_failslab+0x121/0x190 [ 263.305384] should_failslab+0x9/0x14 [ 263.305386] __kmalloc+0x71/0x750 [ 263.305389] __tty_buffer_request_room+0x1fb/0x5c0 [ 263.305392] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 263.305394] pty_write+0x133/0x200 [ 263.305397] tty_put_char+0x130/0x160 [ 263.305399] do_output_char+0x15c/0x880 [ 263.305401] __process_echoes+0x3cd/0xa40 [ 263.305404] process_echoes+0xfc/0x170 [ 263.305406] n_tty_set_termios+0xb36/0xe70 [ 263.305409] tty_set_termios+0x659/0x8c0 [ 263.305411] set_termios+0x378/0x5a0 [ 263.305413] tty_mode_ioctl+0x601/0x8c0 [ 263.305415] n_tty_ioctl_helper+0x59/0x3b0 [ 263.305418] n_tty_ioctl+0x59/0x360 [ 263.305420] tty_ioctl+0x8b5/0x1510 [ 263.305422] do_vfs_ioctl+0xd5f/0x1380 [ 263.305424] ksys_ioctl+0xab/0xd0 [ 263.305427] __x64_sys_ioctl+0x73/0xb0 [ 263.305429] do_syscall_64+0xfd/0x620 [ 263.305432] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.305433] [ 263.305436] other info that might help us debug this: [ 263.305437] [ 263.305439] Chain exists of: [ 263.305440] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 263.305450] [ 263.305452] Possible unsafe locking scenario: [ 263.305454] [ 263.305456] CPU0 CPU1 [ 263.305458] ---- ---- [ 263.305460] lock(&(&port->lock)->rlock); [ 263.305466] lock(&port_lock_key); [ 263.305471] lock(&(&port->lock)->rlock); [ 263.305476] lock(console_owner); [ 263.305480] [ 263.305482] *** DEADLOCK *** [ 263.305483] [ 263.305485] 5 locks held by syz-executor.1/10304: [ 263.305487] #0: 00000000e0b162b1 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 263.305496] #1: 000000003f65ff7c (&o_tty->termios_rwsem/1){++++}, at: tty_set_termios+0x105/0x8c0 [ 263.305509] #2: 00000000efdb3ef9 (&tty->ldisc_sem){++++}, at: tty_ldisc_ref+0x22/0x90 [ 263.305518] #3: 0000000053dd09bc (&ldata->output_lock){+.+.}, at: process_echoes+0xb6/0x170 [ 263.305528] #4: 000000007b412359 (&(&port->lock)->rlock){-.-.}, at: pty_write+0xff/0x200 [ 263.305537] [ 263.305539] stack backtrace: [ 263.305543] CPU: 0 PID: 10304 Comm: syz-executor.1 Not tainted 4.19.88-syzkaller #0 [ 263.305547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.305549] Call Trace: [ 263.305551] dump_stack+0x197/0x210 [ 263.305554] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 263.305556] __lock_acquire+0x2e19/0x49c0 [ 263.305559] ? mark_held_locks+0x100/0x100 [ 263.305561] ? vprintk_emit+0x3ed/0x6d0 [ 263.305563] ? vprintk_emit+0x3ed/0x6d0 [ 263.305565] lock_acquire+0x16f/0x3f0 [ 263.305568] ? vprintk_emit+0x3d5/0x6d0 [ 263.305570] vprintk_emit+0x412/0x6d0 [ 263.305572] ? vprintk_emit+0x3d5/0x6d0 [ 263.305574] vprintk_default+0x28/0x30 [ 263.305577] vprintk_func+0x7e/0x189 [ 263.305579] ? kasan_check_read+0x11/0x20 [ 263.305581] printk+0xba/0xed [ 263.305584] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 263.305586] ? check_noncircular+0x20/0x20 [ 263.305588] ? kernel_text_address+0x73/0xf0 [ 263.305591] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.305594] ? ___ratelimit+0x60/0x595 [ 263.305596] should_fail+0x6f1/0x85c [ 263.305599] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.305601] __should_failslab+0x121/0x190 [ 263.305603] should_failslab+0x9/0x14 [ 263.305606] __kmalloc+0x71/0x750 [ 263.305608] ? __tty_buffer_request_room+0x1fb/0x5c0 [ 263.305611] __tty_buffer_request_room+0x1fb/0x5c0 [ 263.305614] tty_insert_flip_string_fixed_flag+0x93/0x1f0 [ 263.305617] ? do_raw_spin_lock+0xc8/0x240 [ 263.305619] pty_write+0x133/0x200 [ 263.305621] tty_put_char+0x130/0x160 [ 263.305623] ? dev_match_devt+0x90/0x90 [ 263.305626] ? mutex_trylock+0x1e0/0x1e0 [ 263.305628] ? kasan_check_read+0x11/0x20 [ 263.305630] do_output_char+0x15c/0x880 [ 263.305633] __process_echoes+0x3cd/0xa40 [ 263.305635] process_echoes+0xfc/0x170 [ 263.305637] n_tty_set_termios+0xb36/0xe70 [ 263.305640] ? n_tty_poll+0x940/0x940 [ 263.305642] tty_set_termios+0x659/0x8c0 [ 263.305644] ? tty_wait_until_sent+0x580/0x580 [ 263.305647] ? lock_downgrade+0x880/0x880 [ 263.305649] ? __init_ldsem+0x170/0x170 [ 263.305652] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.305654] set_termios+0x378/0x5a0 [ 263.305657] ? tty_perform_flush+0x80/0x80 [ 263.305659] ? lock_acquire+0x16f/0x3f0 [ 263.305661] ? ldsem_down_read+0x33/0x40 [ 263.305664] tty_mode_ioctl+0x601/0x8c0 [ 263.305666] ? set_termios+0x5a0/0x5a0 [ 263.305668] ? ldsem_wake+0x40/0x40 [ 263.305670] ? kasan_check_read+0x11/0x20 [ 263.305673] n_tty_ioctl_helper+0x59/0x3b0 [ 263.305675] n_tty_ioctl+0x59/0x360 [ 263.305677] ? ldsem_down_read+0x33/0x40 [ 263.305679] tty_ioctl+0x8b5/0x1510 [ 263.305682] ? commit_echoes+0x1c0/0x1c0 [ 263.305685] ? tty_vhangup+0x30/0x30 [ 263.305688] ? mark_held_locks+0x100/0x100 [ 263.305690] ? proc_cwd_link+0x1d0/0x1d0 [ 263.305692] ? __fget+0x340/0x540 [ 263.305695] ? __might_sleep+0x95/0x190 [ 263.305697] ? tty_vhangup+0x30/0x30 [ 263.305699] do_vfs_ioctl+0xd5f/0x1380 [ 263.305701] ? selinux_file_ioctl+0x46f/0x5e0 [ 263.305704] ? selinux_file_ioctl+0x125/0x5e0 [ 263.305707] ? ioctl_preallocate+0x210/0x210 [ 263.305709] ? selinux_file_mprotect+0x620/0x620 [ 263.305711] ? iterate_fd+0x360/0x360 [ 263.305714] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.305716] ? fput+0x128/0x1a0 [ 263.305719] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 263.305722] ? security_file_ioctl+0x8d/0xc0 [ 263.305724] ksys_ioctl+0xab/0xd0 [ 263.305726] __x64_sys_ioctl+0x73/0xb0 [ 263.305729] do_syscall_64+0xfd/0x620 [ 263.305732] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.305734] RIP: 0033:0x45a909 [ 263.305742] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.305745] RSP: 002b:00007f07746fbc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.305751] RAX: ffffffffffffffda RBX: 00007f07746fbc90 RCX: 000000000045a909 [ 263.305755] RDX: 0000000020000000 RSI: 0000000000005402 RDI: 0000000000000003 [ 263.305759] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 19:47:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r1, 0x80064d1c, &(0x7f0000000340)) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80064d1c, &(0x7f0000000340)) syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) r3 = dup3(r2, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f00000000c0)={0x6a3}) 19:47:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x400003}) 19:47:56 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) socket$isdn(0x22, 0x3, 0x23) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r1) accept4$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10, 0xc0800) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r2, 0x80064d1c, &(0x7f0000000340)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1e9afcb65e5d40d3, r2, 0x54a11000) 19:47:56 executing program 0 (fault-call:2 fault-nth:15): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:56 executing program 5 (fault-call:2 fault-nth:11): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040)=0x1000000000000000, 0x12) [ 263.305762] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f07746fc6d4 [ 263.305766] R13: 00000000004c5a56 R14: 00000000004dbc00 R15: 0000000000000004 [ 264.241018] kobject: 'loop4' (0000000066c0039c): kobject_uevent_env [ 264.270946] FAULT_INJECTION: forcing a failure. [ 264.270946] name failslab, interval 1, probability 0, space 0, times 0 [ 264.282409] CPU: 1 PID: 10321 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 264.288346] kobject: 'loop4' (0000000066c0039c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 264.290206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.290211] Call Trace: [ 264.290232] dump_stack+0x197/0x210 [ 264.290256] should_fail.cold+0xa/0x1b 19:47:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x2, &(0x7f0000000000)={0x0, 0x400003}) [ 264.304214] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 264.309056] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 264.309074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 264.309085] ? is_bpf_text_address+0xd3/0x170 [ 264.309102] ? kernel_text_address+0x73/0xf0 [ 264.311731] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 264.315303] __should_failslab+0x121/0x190 [ 264.315316] should_failslab+0x9/0x14 [ 264.315328] kmem_cache_alloc+0x47/0x700 [ 264.315341] ? mark_held_locks+0x100/0x100 [ 264.315355] ebitmap_cpy+0xcd/0x270 [ 264.315370] ? hashtab_search+0x1b9/0x250 [ 264.377895] mls_compute_sid+0x5d0/0xf60 [ 264.381954] ? mls_convert_context+0x790/0x790 [ 264.386533] security_compute_sid.part.0+0xace/0x15c0 [ 264.391896] ? compute_sid_handle_invalid_context+0x340/0x340 [ 264.397834] ? __rtnl_unlock+0x7c/0x90 [ 264.401717] ? netdev_run_todo+0x559/0x7a0 [ 264.405945] ? register_netdevice_notifier+0x7e/0x630 [ 264.411152] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 264.416433] security_transition_sid+0x126/0x190 [ 264.421179] selinux_socket_post_create+0x675/0x830 [ 264.426185] ? selinux_sb_copy_data+0x4a0/0x4a0 [ 264.430845] security_socket_post_create+0x83/0xd0 [ 264.435767] __sock_create+0x5b1/0x730 [ 264.439645] __sys_socketpair+0x1ea/0x5d0 [ 264.443781] ? __ia32_sys_socket+0xb0/0xb0 [ 264.448003] ? __ia32_sys_read+0xb0/0xb0 [ 264.452054] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.457404] __x64_sys_socketpair+0x97/0xf0 [ 264.461741] do_syscall_64+0xfd/0x620 [ 264.465529] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.470724] RIP: 0033:0x45a909 [ 264.473908] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.492810] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 264.500518] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 264.507787] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 264.515044] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.522299] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 264.529555] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 264.556019] FAULT_INJECTION: forcing a failure. [ 264.556019] name failslab, interval 1, probability 0, space 0, times 0 [ 264.567320] CPU: 0 PID: 10331 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 264.575137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.584500] Call Trace: [ 264.587081] dump_stack+0x197/0x210 [ 264.590692] should_fail.cold+0xa/0x1b [ 264.594568] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 264.599690] ? lock_downgrade+0x880/0x880 [ 264.603827] ? set_page_refcounted+0x100/0x100 [ 264.608410] __should_failslab+0x121/0x190 [ 264.612640] should_failslab+0x9/0x14 [ 264.616490] __kmalloc_track_caller+0x2de/0x750 [ 264.621156] ? kmem_cache_alloc_trace+0x314/0x760 [ 264.625986] ? snd_timer_instance_new+0x72/0x3d0 [ 264.630739] kstrdup+0x3a/0x70 [ 264.633927] snd_timer_instance_new+0x72/0x3d0 [ 264.638493] snd_timer_open+0x95c/0x1820 [ 264.642593] ? scnprintf+0x140/0x140 [ 264.646295] ? snd_timer_instance_new+0x3d0/0x3d0 [ 264.651122] ? snd_seq_deliver_single_event.constprop.0+0x870/0x870 [ 264.657518] snd_seq_timer_open+0x240/0x580 [ 264.661826] ? snd_seq_timer_set_skew+0xb0/0xb0 [ 264.666489] ? lock_downgrade+0x880/0x880 [ 264.670633] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 264.675736] queue_use+0xcb/0x240 [ 264.679181] snd_seq_queue_alloc+0x2c5/0x4d0 [ 264.683613] snd_seq_ioctl_create_queue+0xb0/0x330 [ 264.688528] snd_seq_kernel_client_ctl+0xf8/0x140 [ 264.693376] alloc_seq_queue.isra.0+0xdc/0x180 [ 264.697946] ? delete_port+0xd0/0xd0 [ 264.701679] snd_seq_oss_open+0x2ff/0x960 [ 264.705813] odev_open+0x70/0x90 [ 264.709165] ? odev_release+0x80/0x80 [ 264.712952] soundcore_open+0x453/0x610 [ 264.716912] ? sound_devnode+0xf0/0xf0 [ 264.720784] chrdev_open+0x245/0x6b0 [ 264.724603] ? cdev_put.part.0+0x50/0x50 [ 264.728653] ? security_file_open+0x16b/0x1b0 [ 264.733136] do_dentry_open+0x4c3/0x1210 [ 264.737183] ? match_exception_partial+0x242/0x2d0 [ 264.742098] ? cdev_put.part.0+0x50/0x50 [ 264.747102] ? chown_common+0x5c0/0x5c0 [ 264.751065] ? inode_permission+0xb4/0x560 [ 264.755303] vfs_open+0xa0/0xd0 [ 264.758577] path_openat+0x10d7/0x45e0 [ 264.762461] ? save_stack+0x45/0xd0 [ 264.766072] ? kasan_kmalloc+0xce/0xf0 [ 264.769959] ? kasan_slab_alloc+0xf/0x20 [ 264.774004] ? kmem_cache_alloc+0x12e/0x700 [ 264.778307] ? getname_flags+0xd6/0x5b0 [ 264.782274] ? getname+0x1a/0x20 [ 264.785642] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 264.790306] ? mark_held_locks+0x100/0x100 [ 264.794534] ? __alloc_pages_nodemask+0x377/0x750 [ 264.799421] ? __alloc_pages_slowpath+0x2870/0x2870 [ 264.804429] do_filp_open+0x1a1/0x280 [ 264.808230] ? may_open_dev+0x100/0x100 [ 264.812193] ? do_raw_spin_unlock+0x178/0x270 [ 264.816680] do_sys_open+0x3fe/0x550 [ 264.820381] ? filp_open+0x80/0x80 [ 264.823916] ? __ia32_sys_read+0xb0/0xb0 [ 264.827982] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 264.833333] __x64_sys_openat+0x9d/0x100 [ 264.837509] do_syscall_64+0xfd/0x620 [ 264.841301] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.846476] RIP: 0033:0x45a909 [ 264.849662] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.868585] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 264.876438] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 264.883776] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 264.891086] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 264.898362] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 264.905618] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 19:47:56 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x4b47, &(0x7f0000000000)={0x0, 0x400003}) 19:47:56 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x20000052) 19:47:56 executing program 5 (fault-call:2 fault-nth:12): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:56 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x10002, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000040)="5edc32756a9d1f5329cf3d7a9bf7183bf1ffb6cbb47d4dd2dfc75e3d93c7e4980e41eb90438364f6583fa3ff", 0x2c}, {&(0x7f0000000080)="03e4d037147d2e8b58789dae63c533d62099c3ba923077367e55aa28b984804a399d25af7eb22fc13c224cbaefa16cdc295904274d4179e04a9c9f4e6a5a15e1a82e9ab3c2c561183d17bfc72de2c43973", 0x51}, {&(0x7f0000000100)="1a785f69881cae7d1092ec0507eee229e777b5252bfcf3c2313c033557de85d216f020b2dce0abb5be19231fe5c627974fea83ae933f5844d0e33cb2060ce5f0eddf6e1a7074f808b2c0d265ce129f53a2032bdf07bc44bcb79295c89909ffa5902d8c2337873c92891fcc594adadd5fd6bde2fb66f0afb08ada54045340a63e738dee2879b9079692f94f6fddfe06e2bc4547e230a6c9514a5c4be99d432b677e4b6631659857139d6ad041b009724d26ea9bf4d5e4b493eb43c7ae3581b3f0085cda15a60a1684556160b3a65b1ae299544f1c88b3dd1748685f35405a8e753356ad09367e873c5cd08a472a4ee071337d5f3602b80ed6", 0xf8}, {&(0x7f0000000240)="457af82143a66352a95cf8ed14a79727db7b34debb9158b6e725d476057133c87d8312eec28aa67d8faad7e36fa60ed7e639553336617f3173f4", 0x3a}, {&(0x7f0000000280)="a74e5e303c24255f4ce5284006d5d06f61d906d0515a8661c1a76cf4f4d20c2b565367bc6b840bb97173741d55b11dafd8b7abc11b3d24ad002516559bff974f20f9cae4b52023955ca3f497c9beb7588f9ae863af768b103df06a43cf5313471b75426c1a35f790f09db70dfda73781480f357ac63fe517d1f154cfb4931197fdb8b171a513059442a4de3f138d80276d441f69e0440e6f9aa656", 0x9b}], 0x5) ioctl$FBIOBLANK(r1, 0x4611, 0x0) write$apparmor_exec(r1, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) r4 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r4, &(0x7f0000000080)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r3, r2}}, 0x18) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(0xffffffffffffffff, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r3, 0x1, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e24, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000580)={0x1, 0x10, 0xfa00, {&(0x7f0000000340), r3}}, 0x18) [ 264.924911] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 264.944252] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 264.954821] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 264.961374] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:47:56 executing program 0 (fault-call:2 fault-nth:16): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 264.972022] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 264.989266] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 264.998110] FAULT_INJECTION: forcing a failure. [ 264.998110] name failslab, interval 1, probability 0, space 0, times 0 [ 264.999286] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 265.010018] CPU: 1 PID: 10349 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 265.010027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.010030] Call Trace: [ 265.010052] dump_stack+0x197/0x210 [ 265.010073] should_fail.cold+0xa/0x1b [ 265.018762] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 265.024372] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 265.024390] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.024409] ? is_bpf_text_address+0xd3/0x170 [ 265.037189] kobject: 'loop0' (0000000094cdd153): kobject_uevent_env [ 265.040102] ? kernel_text_address+0x73/0xf0 [ 265.040118] __should_failslab+0x121/0x190 [ 265.040135] should_failslab+0x9/0x14 [ 265.044092] kobject: 'loop0' (0000000094cdd153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 265.053447] kmem_cache_alloc+0x47/0x700 [ 265.053461] ? mark_held_locks+0x100/0x100 [ 265.053476] ebitmap_cpy+0xcd/0x270 [ 265.053486] ? hashtab_search+0x1b9/0x250 [ 265.053498] mls_compute_sid+0x5d0/0xf60 [ 265.053510] ? mls_convert_context+0x790/0x790 [ 265.053528] security_compute_sid.part.0+0xace/0x15c0 [ 265.099170] FAULT_INJECTION: forcing a failure. [ 265.099170] name failslab, interval 1, probability 0, space 0, times 0 [ 265.100150] ? compute_sid_handle_invalid_context+0x340/0x340 [ 265.142950] ? __rtnl_unlock+0x7c/0x90 [ 265.146831] ? netdev_run_todo+0x559/0x7a0 [ 265.151068] ? register_netdevice_notifier+0x7e/0x630 [ 265.156264] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 265.161455] security_transition_sid+0x126/0x190 [ 265.166214] selinux_socket_post_create+0x675/0x830 [ 265.171228] ? selinux_sb_copy_data+0x4a0/0x4a0 [ 265.175899] security_socket_post_create+0x83/0xd0 [ 265.180829] __sock_create+0x5b1/0x730 [ 265.184725] __sys_socketpair+0x1ea/0x5d0 [ 265.188869] ? __ia32_sys_socket+0xb0/0xb0 [ 265.193099] ? __ia32_sys_read+0xb0/0xb0 [ 265.197155] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.202509] __x64_sys_socketpair+0x97/0xf0 [ 265.206828] do_syscall_64+0xfd/0x620 [ 265.210625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.215817] RIP: 0033:0x45a909 [ 265.219013] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.237939] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 265.245652] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 265.252923] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 265.260187] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 265.267448] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 265.274734] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 265.301099] CPU: 1 PID: 10354 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 265.308948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.318327] Call Trace: [ 265.320931] dump_stack+0x197/0x210 [ 265.324577] should_fail.cold+0xa/0x1b [ 265.328487] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.333718] ? lock_downgrade+0x880/0x880 [ 265.337887] ? set_page_refcounted+0x100/0x100 [ 265.342493] __should_failslab+0x121/0x190 [ 265.346741] should_failslab+0x9/0x14 [ 265.350553] kmem_cache_alloc_trace+0x2cc/0x760 [ 265.355238] ? memcpy+0x46/0x50 [ 265.358531] ? kstrdup+0x5a/0x70 [ 265.359828] kobject: 'loop0' (0000000094cdd153): kobject_uevent_env [ 265.361907] ? snd_hrtimer_callback+0x3d0/0x3d0 [ 265.361921] snd_hrtimer_open+0x44/0x114 [ 265.361937] ? snd_hrtimer_callback+0x3d0/0x3d0 [ 265.371726] kobject: 'loop0' (0000000094cdd153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 265.373001] snd_timer_open+0x1136/0x1820 [ 265.373019] ? snd_timer_instance_new+0x3d0/0x3d0 [ 265.380924] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 265.381726] ? snd_seq_deliver_single_event.constprop.0+0x870/0x870 [ 265.381749] snd_seq_timer_open+0x240/0x580 [ 265.393385] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 265.395408] ? snd_seq_timer_set_skew+0xb0/0xb0 [ 265.395425] ? lock_downgrade+0x880/0x880 [ 265.395444] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 265.395461] queue_use+0xcb/0x240 [ 265.445029] snd_seq_queue_alloc+0x2c5/0x4d0 [ 265.449441] snd_seq_ioctl_create_queue+0xb0/0x330 [ 265.454364] snd_seq_kernel_client_ctl+0xf8/0x140 [ 265.459201] alloc_seq_queue.isra.0+0xdc/0x180 [ 265.463766] ? delete_port+0xd0/0xd0 [ 265.467474] snd_seq_oss_open+0x2ff/0x960 [ 265.471613] odev_open+0x70/0x90 [ 265.474965] ? odev_release+0x80/0x80 [ 265.478750] soundcore_open+0x453/0x610 [ 265.482714] ? sound_devnode+0xf0/0xf0 [ 265.486607] chrdev_open+0x245/0x6b0 [ 265.490406] ? cdev_put.part.0+0x50/0x50 [ 265.494989] ? security_file_open+0x16b/0x1b0 [ 265.499480] do_dentry_open+0x4c3/0x1210 [ 265.503532] ? match_exception_partial+0x242/0x2d0 [ 265.508522] ? cdev_put.part.0+0x50/0x50 [ 265.512580] ? chown_common+0x5c0/0x5c0 [ 265.516542] ? inode_permission+0xb4/0x560 [ 265.520762] vfs_open+0xa0/0xd0 [ 265.524024] path_openat+0x10d7/0x45e0 [ 265.527902] ? save_stack+0x45/0xd0 [ 265.531513] ? kasan_kmalloc+0xce/0xf0 [ 265.535382] ? kasan_slab_alloc+0xf/0x20 [ 265.539426] ? kmem_cache_alloc+0x12e/0x700 [ 265.543741] ? getname_flags+0xd6/0x5b0 [ 265.547711] ? getname+0x1a/0x20 [ 265.551070] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 265.555729] ? mark_held_locks+0x100/0x100 [ 265.559957] ? __alloc_pages_nodemask+0x377/0x750 [ 265.564799] ? __alloc_pages_slowpath+0x2870/0x2870 [ 265.569826] do_filp_open+0x1a1/0x280 [ 265.573624] ? may_open_dev+0x100/0x100 [ 265.577602] ? do_raw_spin_unlock+0x178/0x270 [ 265.582262] do_sys_open+0x3fe/0x550 [ 265.585974] ? filp_open+0x80/0x80 [ 265.589520] ? __ia32_sys_read+0xb0/0xb0 [ 265.593579] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.598941] __x64_sys_openat+0x9d/0x100 [ 265.603000] do_syscall_64+0xfd/0x620 [ 265.606801] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.611980] RIP: 0033:0x45a909 [ 265.615158] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.634058] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 265.641755] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 265.649019] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 265.656282] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 265.663552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 265.670813] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 265.691497] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 265.699230] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 265.712684] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 265.720622] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' 19:47:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x8, 0x4, 0x7, 0x9, 0x6, 0x8, 0x1f, 0x1c}}) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') 19:47:57 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_dccp(0xa, 0x6, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r3, 0x80064d1c, &(0x7f0000000340)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCSMRU(r4, 0x40047452, &(0x7f00000000c0)=0x81) r5 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x100000000, 0x40500) ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000080)) write$cgroup_int(r1, &(0x7f0000000040), 0x12) 19:47:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x4b49, &(0x7f0000000000)={0x0, 0x400003}) 19:47:57 executing program 5 (fault-call:2 fault-nth:13): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:57 executing program 0 (fault-call:2 fault-nth:17): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:57 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='?dev/kvm\x00', 0x90200, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0x3, 0x2) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x44080, 0x0) sendfile(r1, r2, 0x0, 0x7) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 265.798967] kobject: 'loop4' (0000000066c0039c): kobject_uevent_env [ 265.799456] FAULT_INJECTION: forcing a failure. [ 265.799456] name failslab, interval 1, probability 0, space 0, times 0 [ 265.810389] kobject: 'loop4' (0000000066c0039c): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 265.816814] CPU: 1 PID: 10373 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 265.834052] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.843405] Call Trace: [ 265.846006] dump_stack+0x197/0x210 [ 265.849637] should_fail.cold+0xa/0x1b [ 265.853520] ? __sock_create+0x5b1/0x730 [ 265.857587] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.862693] ? is_bpf_text_address+0xd3/0x170 [ 265.867189] ? kernel_text_address+0x73/0xf0 [ 265.871595] ? kasan_unpoison_shadow+0x35/0x50 [ 265.876183] __should_failslab+0x121/0x190 [ 265.880420] should_failslab+0x9/0x14 [ 265.884216] kmem_cache_alloc+0x47/0x700 [ 265.888279] ebitmap_cpy+0xcd/0x270 [ 265.892009] ? hashtab_search+0x1b9/0x250 [ 265.896163] mls_compute_sid+0x5d0/0xf60 [ 265.900231] ? mls_convert_context+0x790/0x790 [ 265.904817] security_compute_sid.part.0+0xace/0x15c0 [ 265.910029] ? compute_sid_handle_invalid_context+0x340/0x340 [ 265.915932] ? __rtnl_unlock+0x7c/0x90 [ 265.919827] ? netdev_run_todo+0x559/0x7a0 [ 265.924073] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 265.929273] security_transition_sid+0x126/0x190 [ 265.934054] selinux_socket_create+0x44c/0x610 [ 265.938636] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 265.943845] security_socket_create+0x7b/0xc0 [ 265.948360] __sock_create+0x90/0x730 [ 265.952163] __sys_socketpair+0x272/0x5d0 [ 265.956315] ? __ia32_sys_socket+0xb0/0xb0 [ 265.960550] ? __ia32_sys_read+0xb0/0xb0 [ 265.964616] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 265.970632] __x64_sys_socketpair+0x97/0xf0 [ 265.974976] do_syscall_64+0xfd/0x620 [ 265.978782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.983967] RIP: 0033:0x45a909 [ 265.987256] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.006156] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 266.013871] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 266.021149] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 266.029133] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.036404] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:57 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5401, &(0x7f0000000000)={0x0, 0x400003}) [ 266.043666] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 266.063758] kobject: 'vcs27' (0000000032de9929): kobject_add_internal: parent: 'vc', set: 'devices' [ 266.064218] kobject: 'vcs27' (0000000032de9929): kobject_uevent_env [ 266.064248] kobject: 'vcs27' (0000000032de9929): fill_kobj_path: path = '/devices/virtual/vc/vcs27' 19:47:57 executing program 5 (fault-call:2 fault-nth:14): r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) [ 266.064389] kobject: 'vcsu27' (00000000ee3b6d96): kobject_add_internal: parent: 'vc', set: 'devices' [ 266.064924] kobject: 'vcsu27' (00000000ee3b6d96): kobject_uevent_env [ 266.065003] kobject: 'vcsu27' (00000000ee3b6d96): fill_kobj_path: path = '/devices/virtual/vc/vcsu27' [ 266.065141] kobject: 'vcsa27' (000000005a45ae56): kobject_add_internal: parent: 'vc', set: 'devices' [ 266.065436] kobject: 'vcsa27' (000000005a45ae56): kobject_uevent_env [ 266.065466] kobject: 'vcsa27' (000000005a45ae56): fill_kobj_path: path = '/devices/virtual/vc/vcsa27' 19:47:57 executing program 0 (fault-call:2 fault-nth:18): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:58 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80200200}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv6_delroute={0x34, 0x19, 0x606, 0x70bd2b, 0x25dfdbfc, {0xa, 0x10, 0x14, 0x7, 0xff, 0x4, 0x0, 0x7}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x5}, @RTA_ENCAP_TYPE={0xc44d50b312d58612, 0x15, 0xdd59f120837c7c76}, @RTA_ENCAP_TYPE={0x8, 0x15, 0x7}]}, 0xfe83}, 0x1, 0x0, 0x0, 0x1000}, 0x40000) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x200000ae, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0xfd, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x70}], 0xfd, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000001300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)\x00'}, 0x58) r7 = accept$alg(r6, 0x0, 0x0) fcntl$setstatus(r7, 0x4, 0x2800) recvmmsg(r7, &(0x7f0000000540)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000003c0)=""/151, 0x97}], 0x1}}], 0x2, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000180)=0x0) r9 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r9, 0x80064d1c, &(0x7f0000000340)) r10 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$SOUND_MIXER_READ_VOLUME(r10, 0x80064d1c, &(0x7f0000000340)) kcmp(r5, r8, 0x0, r9, r10) [ 266.075923] FAULT_INJECTION: forcing a failure. [ 266.075923] name failslab, interval 1, probability 0, space 0, times 0 [ 266.075940] CPU: 1 PID: 10381 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 266.075947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.075951] Call Trace: [ 266.075971] dump_stack+0x197/0x210 [ 266.075989] should_fail.cold+0xa/0x1b [ 266.076006] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 266.076024] ? lock_downgrade+0x880/0x880 [ 266.076045] ? set_page_refcounted+0x100/0x100 [ 266.076064] __should_failslab+0x121/0x190 [ 266.076078] should_failslab+0x9/0x14 [ 266.076092] kmem_cache_alloc_trace+0x2cc/0x760 [ 266.076111] snd_seq_oss_readq_new+0x4b/0x2d0 [ 266.076126] snd_seq_oss_open+0x4c7/0x960 [ 266.076140] odev_open+0x70/0x90 [ 266.076150] ? odev_release+0x80/0x80 [ 266.076166] soundcore_open+0x453/0x610 [ 266.076182] ? sound_devnode+0xf0/0xf0 [ 266.076195] chrdev_open+0x245/0x6b0 [ 266.076209] ? cdev_put.part.0+0x50/0x50 [ 266.076224] ? security_file_open+0x16b/0x1b0 [ 266.076239] do_dentry_open+0x4c3/0x1210 [ 266.076254] ? match_exception_partial+0x242/0x2d0 [ 266.076266] ? cdev_put.part.0+0x50/0x50 [ 266.076278] ? chown_common+0x5c0/0x5c0 [ 266.076292] ? inode_permission+0xb4/0x560 [ 266.076307] vfs_open+0xa0/0xd0 [ 266.076320] path_openat+0x10d7/0x45e0 [ 266.076332] ? save_stack+0x45/0xd0 [ 266.076345] ? kasan_kmalloc+0xce/0xf0 [ 266.076358] ? kasan_slab_alloc+0xf/0x20 [ 266.076369] ? kmem_cache_alloc+0x12e/0x700 [ 266.076380] ? getname_flags+0xd6/0x5b0 [ 266.076391] ? getname+0x1a/0x20 [ 266.076410] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 266.076423] ? mark_held_locks+0x100/0x100 [ 266.076439] ? __alloc_pages_nodemask+0x377/0x750 [ 266.076456] ? __alloc_pages_slowpath+0x2870/0x2870 [ 266.076471] do_filp_open+0x1a1/0x280 [ 266.076484] ? may_open_dev+0x100/0x100 [ 266.076504] ? do_raw_spin_unlock+0x178/0x270 [ 266.076527] do_sys_open+0x3fe/0x550 [ 266.076542] ? filp_open+0x80/0x80 [ 266.076556] ? __ia32_sys_read+0xb0/0xb0 [ 266.076573] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.076596] __x64_sys_openat+0x9d/0x100 [ 266.076614] do_syscall_64+0xfd/0x620 [ 266.076631] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.076643] RIP: 0033:0x45a909 [ 266.076657] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.076666] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 266.076679] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 266.076687] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 266.076695] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.076703] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 266.076711] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 266.110674] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 266.190650] FAULT_INJECTION: forcing a failure. [ 266.190650] name failslab, interval 1, probability 0, space 0, times 0 [ 266.262425] FAULT_INJECTION: forcing a failure. [ 266.262425] name failslab, interval 1, probability 0, space 0, times 0 [ 266.264023] CPU: 0 PID: 10390 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 266.264036] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.344237] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 266.344753] Call Trace: [ 266.344774] dump_stack+0x197/0x210 [ 266.344791] should_fail.cold+0xa/0x1b [ 266.355267] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 266.357978] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 266.357994] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 266.358010] ? is_bpf_text_address+0xd3/0x170 [ 266.366574] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 266.385271] ? kernel_text_address+0x73/0xf0 [ 266.385290] __should_failslab+0x121/0x190 [ 266.385303] should_failslab+0x9/0x14 [ 266.385319] kmem_cache_alloc+0x47/0x700 [ 266.408289] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 266.414836] ? mark_held_locks+0x100/0x100 [ 266.414853] ebitmap_cpy+0xcd/0x270 [ 266.414863] ? hashtab_search+0x1b9/0x250 [ 266.414876] mls_compute_sid+0x5d0/0xf60 [ 266.414887] ? mls_convert_context+0x790/0x790 [ 266.414906] security_compute_sid.part.0+0xace/0x15c0 [ 266.427720] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 266.429457] ? compute_sid_handle_invalid_context+0x340/0x340 [ 266.429472] ? __rtnl_unlock+0x7c/0x90 [ 266.429488] ? netdev_run_todo+0x559/0x7a0 [ 266.442532] kobject: 'loop0' (0000000094cdd153): kobject_uevent_env [ 266.447060] ? register_netdevice_notifier+0x7e/0x630 [ 266.447074] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 266.447092] security_transition_sid+0x126/0x190 [ 266.447114] selinux_socket_post_create+0x675/0x830 [ 266.469236] kobject: 'loop0' (0000000094cdd153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 266.475403] ? selinux_sb_copy_data+0x4a0/0x4a0 [ 266.475423] security_socket_post_create+0x83/0xd0 [ 266.475438] __sock_create+0x5b1/0x730 [ 266.475454] __sys_socketpair+0x1ea/0x5d0 [ 266.496718] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 266.502069] ? __ia32_sys_socket+0xb0/0xb0 [ 266.502083] ? __ia32_sys_read+0xb0/0xb0 [ 266.502100] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 266.514563] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 266.516436] __x64_sys_socketpair+0x97/0xf0 [ 266.516452] do_syscall_64+0xfd/0x620 [ 266.516469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.694354] RIP: 0033:0x45a909 [ 266.694370] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.716469] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 266.724191] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 266.724204] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 266.738837] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 266.738850] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 19:47:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5403, &(0x7f0000000000)={0x0, 0x400003}) 19:47:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5404, &(0x7f0000000000)={0x0, 0x400003}) 19:47:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x4500, 0x0) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x6, [@default, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null]}) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x1000, 0x0) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x39) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x100000000, 0x11543fa7ca7f9c6d) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r4}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0x101, 0x1, 0x0, 0x7f, 0x8000, 0x1, 0x4, 0x79f9, r4}, &(0x7f00000002c0)=0x20) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffe000/0x1000)=nil, 0x1000}, 0x1}) [ 266.753372] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 266.802179] CPU: 1 PID: 10397 Comm: syz-executor.5 Not tainted 4.19.88-syzkaller #0 [ 266.810025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.819380] Call Trace: [ 266.821965] dump_stack+0x197/0x210 [ 266.825608] should_fail.cold+0xa/0x1b [ 266.830266] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 266.835359] ? lock_downgrade+0x880/0x880 [ 266.839506] ? set_page_refcounted+0x100/0x100 [ 266.844080] __should_failslab+0x121/0x190 [ 266.848300] should_failslab+0x9/0x14 [ 266.852087] __kmalloc+0x2e2/0x750 [ 266.855614] ? kmem_cache_alloc_trace+0x314/0x760 [ 266.860444] ? snd_seq_oss_readq_new+0x9a/0x2d0 [ 266.865109] snd_seq_oss_readq_new+0x9a/0x2d0 [ 266.872542] snd_seq_oss_open+0x4c7/0x960 [ 266.876676] odev_open+0x70/0x90 [ 266.880027] ? odev_release+0x80/0x80 [ 266.883824] soundcore_open+0x453/0x610 [ 266.887785] ? sound_devnode+0xf0/0xf0 [ 266.891670] chrdev_open+0x245/0x6b0 [ 266.895373] ? cdev_put.part.0+0x50/0x50 [ 266.899421] ? security_file_open+0x16b/0x1b0 [ 266.903906] do_dentry_open+0x4c3/0x1210 [ 266.907955] ? match_exception_partial+0x242/0x2d0 [ 266.912869] ? cdev_put.part.0+0x50/0x50 [ 266.916916] ? chown_common+0x5c0/0x5c0 [ 266.920875] ? inode_permission+0xb4/0x560 [ 266.925112] vfs_open+0xa0/0xd0 [ 266.928400] path_openat+0x10d7/0x45e0 [ 266.932294] ? save_stack+0x45/0xd0 [ 266.935913] ? kasan_kmalloc+0xce/0xf0 [ 266.939792] ? kasan_slab_alloc+0xf/0x20 [ 266.943847] ? kmem_cache_alloc+0x12e/0x700 [ 266.948155] ? getname_flags+0xd6/0x5b0 [ 266.952113] ? getname+0x1a/0x20 [ 266.955471] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 266.960142] ? mark_held_locks+0x100/0x100 [ 266.964487] ? __alloc_pages_nodemask+0x377/0x750 [ 266.969329] ? __alloc_pages_slowpath+0x2870/0x2870 [ 266.974449] do_filp_open+0x1a1/0x280 [ 266.978261] ? may_open_dev+0x100/0x100 [ 266.982245] ? do_raw_spin_unlock+0x178/0x270 [ 266.986741] do_sys_open+0x3fe/0x550 [ 266.990447] ? filp_open+0x80/0x80 [ 266.993995] ? __ia32_sys_read+0xb0/0xb0 [ 266.998055] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.003410] __x64_sys_openat+0x9d/0x100 [ 267.007459] do_syscall_64+0xfd/0x620 [ 267.011246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.016432] RIP: 0033:0x45a909 [ 267.019613] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.038544] RSP: 002b:00007fe442d54c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 19:47:58 executing program 3: r0 = socket$isdn(0x22, 0x3, 0x22) pwrite64(r0, &(0x7f0000000080)="d4311c242aa5c2d8b58bbee711bd58f00f82241ffe518c819f8e0bbbc454e072afdfbfe4435828d7d8d0357348d475099aafa0db2048a9bd70f537ee21d088efec614897c295291992a3680a092cc4e3919ac17e24d1299a08cf8966c0cbb2a33f3b523db259e4710231410c4c29e1d0629d3797d1bb20e224a1e88831afeec046ee78430f03f1a5104fb2c34db02b", 0x8f, 0x9) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x12201, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f0000000200)=0x8) 19:47:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5405, &(0x7f0000000000)={0x0, 0x400003}) [ 267.046251] RAX: ffffffffffffffda RBX: 00007fe442d54c90 RCX: 000000000045a909 [ 267.053518] RDX: 0002000000084003 RSI: 0000000020000180 RDI: ffffffffffffff9c [ 267.060776] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.068291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe442d556d4 [ 267.075557] R13: 00000000004c83f5 R14: 00000000004df758 R15: 0000000000000004 [ 267.094785] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env 19:47:58 executing program 0 (fault-call:2 fault-nth:19): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) [ 267.101248] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:47:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x200, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 267.161126] kobject: 'loop0' (0000000094cdd153): kobject_uevent_env [ 267.168784] kobject: 'loop0' (0000000094cdd153): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 267.187323] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env 19:47:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000280)='keyri.g\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r1) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f00000001c0)="f38c96aa824b41abe107070d45bfa614693c591d229f506640bf2f7f7d6792037b229e637749785fd24b94792641bdae6989a83f4d5a751247f0cb05a0f5f2b906ca93f6f047688d42d6367e", 0x4c, r1) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000240)={r2, 0x20, 0x16}, &(0x7f0000000280)={'enc=', 'oaep', ' hash=', {'michael_mic-generic\x00'}}, &(0x7f0000000300)="97fbbe77c35a6450463c97a42620b9b90300b104cb3edfe57fc99156d69e33c1", &(0x7f0000000340)=""/22) r3 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x100, 0x0) ioctl$KVM_GET_CLOCK(0xffffffffffffffff, 0x8030ae7c, &(0x7f0000000380)) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r4, 0x110, 0x3) write$cgroup_int(r3, &(0x7f0000000040), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz0\x00', 0x200002, 0x0) 19:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5406, &(0x7f0000000000)={0x0, 0x400003}) [ 267.207775] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 267.248158] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 267.263087] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 267.278733] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 267.300313] FAULT_INJECTION: forcing a failure. [ 267.300313] name failslab, interval 1, probability 0, space 0, times 0 [ 267.309555] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 267.311747] CPU: 0 PID: 10436 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 267.329030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.336022] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 267.338386] Call Trace: [ 267.338408] dump_stack+0x197/0x210 [ 267.338427] should_fail.cold+0xa/0x1b [ 267.355594] ? __sock_create+0x5b1/0x730 [ 267.356784] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 267.359678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 267.359692] ? is_bpf_text_address+0xd3/0x170 [ 267.359709] ? kernel_text_address+0x73/0xf0 [ 267.377640] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 267.378907] ? kasan_unpoison_shadow+0x35/0x50 [ 267.378925] __should_failslab+0x121/0x190 [ 267.378941] should_failslab+0x9/0x14 [ 267.383440] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 267.389744] kmem_cache_alloc+0x47/0x700 [ 267.389760] ebitmap_cpy+0xcd/0x270 [ 267.389770] ? hashtab_search+0x1b9/0x250 [ 267.389790] mls_compute_sid+0x5d0/0xf60 [ 267.389806] ? mls_convert_context+0x790/0x790 [ 267.395963] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 267.398773] security_compute_sid.part.0+0xace/0x15c0 [ 267.398795] ? compute_sid_handle_invalid_context+0x340/0x340 [ 267.402708] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 267.412038] ? __rtnl_unlock+0x7c/0x90 [ 267.412053] ? netdev_run_todo+0x559/0x7a0 [ 267.412070] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 267.412085] security_transition_sid+0x126/0x190 [ 267.412102] selinux_socket_create+0x44c/0x610 [ 267.416975] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 267.419768] ? selinux_sctp_assoc_request+0x5c0/0x5c0 [ 267.419788] security_socket_create+0x7b/0xc0 [ 267.419804] __sock_create+0x90/0x730 [ 267.424051] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 267.428001] __sys_socketpair+0x272/0x5d0 [ 267.428015] ? __ia32_sys_socket+0xb0/0xb0 [ 267.428031] ? __ia32_sys_read+0xb0/0xb0 [ 267.428045] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.428061] __x64_sys_socketpair+0x97/0xf0 [ 267.434242] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 267.439043] do_syscall_64+0xfd/0x620 [ 267.439058] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.439070] RIP: 0033:0x45a909 [ 267.439084] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.439091] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 267.439107] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 267.445187] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 267.450152] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 267.450159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 19:47:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='.dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5407, &(0x7f0000000000)={0x0, 0x400003}) 19:47:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x94}]}, &(0x7f0000000100)='GPL\x00'}, 0x3b) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000040), 0x12) 19:47:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmmsg$alg(r0, &(0x7f0000003480)=[{0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000240)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x48}, {0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000002c0)="9e1360079218928b2959bc87f76a2d536cd9e34e13ecff859a96a25680412608798a55f58bac7b028a158812082a5cf33a944894d2f5ac2b0a1de6b4326319493ddaabca3d9d2c0f154c1f1d9a5086bf2ddf943dee17cb4ea22615ebdc28399b191adee10a07", 0x66}], 0x1, &(0x7f0000003640)=ANY=[@ANYBLOB="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"], 0x50, 0x40040}, {0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000340)="a8734cef007d3abbb8ac3e5a20c83a48f87e68de190e6162cff69d6aa78162675e2c5c2c857dd3741300ef1129439fa70d", 0x31}, {&(0x7f0000000580)="3a017d0464534e8e6aaabf6b99d352b6faa9b8a3a4c0a2de0b6909467338e39e015b4181d9687397f9b6135437ea394f25c4d17e71a50db6210b42519faacac644cc00354534cc030cfa320dac8dd5734f5d76805a594226eb54d6ec60733c2128e83a53b466cfebc7b1c8c8d68e33deaa8d", 0x72}, {&(0x7f0000000880)="f9b08c81d7812fa3a21a74ce1b137bd610726a52b8f24b952e1e9dfd", 0x1c}, {&(0x7f00000008c0)="d90c0c48ba589529bfdb17717c5eda638ac4844e421a57d5a3fff3c0ee9499e140db555e656caf91c3c8e15547e252892e2d6f41b76adcc2f2f926e24aa69f15", 0x40}, {&(0x7f0000000900)="bb7dc3090691fe6e2ecb1da56a465f722ef808d13ddcd23ff99d38d7068a9eb201b9d20141740fe1b410131ecebba68f19a8222961e9d0716a6882e941019e46e902ff260e6ec9c86e3f863459ad9bb6db2cf6c33f901d52e5e4bf3b29fc19d513f12a48b85922f2629848070ec5137f7cf925cde290b516709b72169dfc463ccc752b2f2297920defbd62251885d91e4c988b120c79fa627eb4fa124f007cdd84b6999680c979f5d1f10b946b88af84dae53d5f7999d1f6874db16a2667d5960d01f50e728cbb379728526127ed550e965d426a9e531bcf5206c5f3ac5836f08e", 0xe1}, {&(0x7f0000000a00)="8a39bd49309a9a5fd77f6ceb6aaa848a49e14a880e35db1f40a1fa7b1167cc56b8ea2b953ffd2888a91c126142d29de731444c154caf7b3d62c3dc141740b54cbc4892ca7d7a7970cf48814a19dcf4c26dc8ff63ca531e04a6d739824c56f4b34debeb8f38810b15a9c6446e5305b530cf82bab9c9eb7942ec05ecf5d6a3673ebcbdf8fb6cf446220a1f99837d945491a6e5b54f78df6bbd1a0eb525a8bf98ccdabdc027507118777bf04bd5a6763497c8f6e94907987605cad828b72ab5a2d186455c9864d9f57cebb87313d73aca", 0xcf}, {&(0x7f0000000b00)="02c91a96c38906119566a5e5278ffe2364983a534ee7b05b34d9a2083302baff622f87f59ed3bb80307cfaeb342fcb11903df73a4018a7132822b74033f0a5196c9cf3bd730a7cd02ff86c422bb42eebfbbe562a4856f5501365cec95917ece709c993ab996962b6285a", 0x6a}, {&(0x7f0000000b80)="c6a60d5cbe91ab8adfc727472a5632988bf0bc3b52b912145bb0ab9ddfaf868c858635aa54aaaca5a833d4467a3ab732b6a54712ced9df2020ed00a8ffec160fbcc2cdf0e984e691e4884c771aeedf75a51b8efcf198a4cc4caca9d29b3d50969606b5c6695f8cfe", 0x68}, {&(0x7f0000000c00)="9dcfcdcae9fab6ab2f2b8fd35b5a79193635d7a69d430592be57888dcccfb3658f03e42179e162a397417c23141e78058e870501828347f05d6561639dd14f1990115fcbb20a1fb33ad433ac6aebe4f697004ece3756994d0d51ece91ab758959f7c1585fd40a8c5730ef1f24d901923f1acd950d7b4ba1f0e3e8eff51df932c550adeaaa1a54effe1820c08956ebdcbe62166c3d8cca4a71ea0f1e60cc057b8c5bfb75e05061ac2dcafc5569e3738fe17d6967f0123c4ad056bed5471ebda1c96", 0xc1}], 0x9, 0x0, 0x0, 0x80}, {0x0, 0x0, &(0x7f0000000fc0)=[{&(0x7f0000000dc0)="e2060deba1d1dd51cc0268ca3dff62ead289fe40010fe23d990024f4a764608f5ba32b31eead59796c12149b942df3ec783112035f051990bd7d90a511b344ea25c17e36e6a23a67ad9be90421bd888a3a8dd76cc5c04b87", 0x58}, {&(0x7f0000000e40)="b9d4a05b65a74c5f369e5b9e0436c2461f3e11880b1b59932968fd3fd544cc21b7e0053e39d1f8988dc7e0da8a464c24e5dc2fcb3d778365ff4c829614e962efe58f814cca32b7578486045dd7e8e76e39488d37c8e7a33ea41ebde829d4518857f02892fbef06399fc8b3981bd65aef45c9f1a5892999c593cc06d7a6958fb9c8418734bfaaeb8dd017aa00d3ea056f464a6021cf17ca70a73c3149f928615eedbb0a15024ab6e83fc0628f15e4d2dcc1355d921e223c1efad2aa9a70fc656cca80665a7e853b4fa54d5dcd74e823", 0xcf}, {&(0x7f0000000f40)="ef8fb7c1f42e1bed2900138b806ec546320da37204b79839095ac4", 0x1b}, {&(0x7f0000000f80)="c379572d7ea15778247ef8701347cdbbd604c9bd74a14949993ab6a9d06ed4e658054cbb49", 0x25}], 0x4, &(0x7f0000001000)=[@assoc={0x18, 0x117, 0x4, 0x1f}], 0x18, 0x24000000}, {0x0, 0x0, &(0x7f00000010c0)=[{&(0x7f0000001040)="9e6143069a787ed40b04bbf34e38f60c6a5ea1a69dff1264a3e414c66b920ada1fa2b632a34b1e8530ebac98ba281e46dafbfd06e63ed7143dca6a2786947c224a8d7222d771813af2c6a21059520288ccc84045d33c60f2f35860ef5fe0d957c38fb047125de0", 0x67}], 0x1, &(0x7f0000003fc0)=ANY=[@ANYBLOB="5000000000000000170100000200000036000000968bb9f2c63896896a3c0dfb1fee7e2ac74b6fd7f87a40f1191114f3aceb5b363fa2e49b1e7940998c1c7ef8e1fb08c2a1f14b8c56080000000000afa200180000000000000017010000040000007a4fd2c30000000018000000000000001701000004000000ab00000000000000180000000000000017010000030000000000000000000000180000000000000017010000040000000500000000000000180000000000000017010000030010000100000000000000f8000000000000001701000002000000dd0000003b97b683d91e69f7c3e44a08476ef1c9b01085af4319f65b4a3c16af98f8d667b48ffd9f894aa81cf442d192c88ebc66db16ed704ee0281e15b94abc9ea320bcfd25f86eb44f9ff8bf241cf2e8174dbd68f9cd82f1daf1725eb90547a6c75b879d9e31bb818c2bdd911d2171700643a6842c7d4be23715c7227d9d411d44f8c7e22f965e948f83d4516716ae2a02dcb0bb0ceb5f30d83a2d8dce18ec262103089e6977bd603be277ee41267f95d693aaaa36019d2cb33bf463a1d93471de16a104f59f5e939de7b074442980d2311aac0c04f9e68b24ead7bdbbf50ebf00000000000000180000000000000017010000030000000000000000000000effe56244cc918cbcb253ec9721534c06049290bcd09b000957505ae99fd7fa539e7ce138ccca25fc2032b461be321"], 0x1d8, 0x8025}, {0x0, 0x0, &(0x7f0000002340)=[{&(0x7f0000001300)="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", 0x1000}, {&(0x7f0000002300)}], 0x2, 0x0, 0x0, 0x1}, {0x0, 0x0, &(0x7f00000033c0)=[{&(0x7f0000002380)="3c75c713274b0729e058f1a2a88e676c58c9af6cfe49d860d2f93ef4d0cf515b8464d738d3", 0x25}, {&(0x7f00000023c0)="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", 0x1000}], 0x2, &(0x7f0000003400)=[@iv={0x50, 0x117, 0x2, 0x35, "c9abff420bf231b5533007390094ce6dbb0be21ba4f54ef946e6f2f12d5d58597bb759339418a08425da7b3da1fb4868b8cbeea7f2"}], 0x50, 0x64009005}], 0x7, 0x2004c040) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x81) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000003780)) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="5c431b5d30080643c34d591d9b3963c316b19b3d6e79ea550e335c43369b6d77485fcbaac7a61026b04109696d9b42d231d2bedd456620a0a67637f010cdd9af3beccc549ee0ba7733c44b0b0ecadba5e691dc8d33f8ec2fa455870267066b9f575b2e63b1d479d4ca3d0cd8515bac62a366349e6c9087385b00d9041aa6a417a62805746c17ef1b55fb44ec88d4a026db957770fb015b8cc428bb29f3a91b0974d35711741fa46efd3a90247bc516a59674c738c067b9bebd31117d8d27152bfe91ed1eeb5dfa9d53e6129f0dc881cad90cfdc82fb939aa1a0d92aeb6d2b8b70c5bd879c64fcf45b4e6161f541e9b9c0c8ded3196228398b15360c727c2bfb766642f3400a724bf056cb809365a05aea70d4d0870a6519b334a9733fe0512f3d43936f91a4d36b27cc505bce73167e43c26d2d867b6a255ae9a1746a57869e85fa852966499f65f45d08f3ca83430d684d017af5027dc7b089400592b184e5cc91f07f9581235b9d6bf1a345610a65571ce4eeba84db23fdafbb19d94134fabdec0748c2229057e0fb8f3f664beadee22aa9105cb39411a8d269e81cf9e5776548abf6c8a8325ec94fd90ebb3a3a89090dbc258f438d1834575e563d7b77165abaeef2a9e95dea08934725b5cc43fb7cf6fdbbe52c5bcb334be7df76e2f347dbc2e74941c25cb93ea22416128d64658d808d1104e7be8bc29c81e36ff95a3f384f4a5e866c2401f3768b3d6ab9a03953e565cc42554944dc76083a1a0c8676ee3feef5bb3bd18521b3dab062403aa84430e5744ee61f5b982eabd353a22f6662fa18f3538a81ecfb6a7e11b3194c147f9fcc7371c00"/621], 0x50f) connect$bt_sco(r2, &(0x7f0000000040)={0x1f, {0x4, 0x5, 0x40, 0x3, 0xff, 0x95}}, 0x8) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') getsockopt$bt_sco_SCO_CONNINFO(r4, 0x11, 0x2, &(0x7f0000001180)=""/104, &(0x7f0000001200)=0x68) r6 = syz_open_dev$ptys(0xc, 0x3, 0x0) fchdir(r6) sendmsg$TIPC_CMD_SET_LINK_TOL(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000002c0)={0x68, r5, 0x100, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @media='ib\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40011}, 0x8000) ioctl$PPPIOCSNPMODE(0xffffffffffffffff, 0x4008744b, &(0x7f0000000540)={0xc023, 0x2}) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x1d, &(0x7f000025e000)={0x1, [0x0]}, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x7a, &(0x7f000059aff8)={r8}, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000001100)={0x5, 0x2, 0x401, 0x9, r8}, &(0x7f0000001140)=0x10) sendmsg$TIPC_CMD_GET_NETID(r4, &(0x7f0000000500)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r5, 0x200, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x20000000) [ 267.450168] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 267.450176] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 267.633197] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 267.639899] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 267.659665] kobject: 'loop5' (00000000b6f9cfc9): kobject_uevent_env [ 267.668429] kobject: 'loop5' (00000000b6f9cfc9): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 267.680057] kobject: 'loop0' (0000000094cdd153): kobject_uevent_env [ 267.695246] kobject: 'loop0' (0000000094cdd153): fill_kobj_path: path = '/devices/virtual/block/loop0' 19:47:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KVM_ASSIGN_DEV_IRQ(r1, 0x4040ae70, &(0x7f00000000c0)={0x5, 0x209, 0x4, 0x101}) 19:47:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='0dev/sequencer2\x00', 0x2000000084003, 0x0) 19:47:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$selinux_user(r3, &(0x7f0000000140)=ANY=[@ANYPTR64, @ANYRES32=r1], 0xffffffffffffff91) 19:47:59 executing program 0 (fault-call:2 fault-nth:20): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5408, &(0x7f0000000000)={0x0, 0x400003}) 19:47:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@window={0x3, 0x247e}, @mss={0x2, 0x40}, @timestamp, @timestamp], 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KDFONTOP_SET_DEF(r1, 0x4b72, &(0x7f0000000080)={0x2, 0x1, 0x18, 0x11, 0xde, &(0x7f0000000880)="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"}) prctl$PR_GET_TSC(0x19, &(0x7f0000000140)) r4 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r4, &(0x7f0000000c80)=ANY=[@ANYBLOB="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"], 0x50f) r5 = syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$sock_timeval(r5, 0x1, 0x14, &(0x7f00000000c0), &(0x7f0000000100)=0x10) 19:47:59 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x5409, &(0x7f0000000000)={0x0, 0x400003}) [ 267.778163] FAULT_INJECTION: forcing a failure. [ 267.778163] name failslab, interval 1, probability 0, space 0, times 0 [ 267.792837] kobject: 'loop4' (0000000066c0039c): kobject_uevent_env [ 267.802369] kobject: 'loop4' (0000000066c0039c): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:47:59 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000140)=0x14, 0xa3a2ea6de66e477f) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsu\x00', 0x100, 0x0) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f00000000c0)=0x400) write$cgroup_int(r3, &(0x7f0000000040), 0x12) 19:47:59 executing program 2: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x18) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xb, 0x810, r1, 0x56997000) write$apparmor_exec(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x50f) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000240)) [ 267.840508] kobject: 'loop1' (00000000cab50506): kobject_uevent_env [ 267.849893] CPU: 1 PID: 10466 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 267.857714] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.867072] Call Trace: [ 267.869675] dump_stack+0x197/0x210 [ 267.873342] should_fail.cold+0xa/0x1b [ 267.877255] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 267.877273] ? lock_downgrade+0x880/0x880 19:47:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/#ev/sequencer2\x00', 0x2000000084003, 0x0) [ 267.877290] ? set_page_refcounted+0x100/0x100 [ 267.877309] __should_failslab+0x121/0x190 [ 267.877323] should_failslab+0x9/0x14 [ 267.877336] kmem_cache_alloc+0x2ae/0x700 [ 267.877351] ? selinux_socket_create+0x2ab/0x610 [ 267.877367] ? sock_destroy_inode+0x60/0x60 [ 267.877381] sock_alloc_inode+0x1d/0x260 [ 267.877393] alloc_inode+0x64/0x190 [ 267.877407] new_inode_pseudo+0x19/0xf0 [ 267.877420] sock_alloc+0x41/0x270 [ 267.877434] __sock_create+0xc2/0x730 [ 267.877451] __sys_socketpair+0x272/0x5d0 [ 267.877465] ? __ia32_sys_socket+0xb0/0xb0 [ 267.877480] ? __ia32_sys_read+0xb0/0xb0 [ 267.877497] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.877512] __x64_sys_socketpair+0x97/0xf0 [ 267.877528] do_syscall_64+0xfd/0x620 [ 267.877543] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.877553] RIP: 0033:0x45a909 [ 267.877567] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:47:59 executing program 2: openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x800, 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x3, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$nV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\xc6\x96Y\xf7\xd3`\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/376) write$apparmor_exec(r0, &(0x7f0000000600)={'\\C\x1b]0\b\x06C\xc3MY\x1d\x9b9c\xc3\x16\xb1\x9b=ny\xeaU\x0e3\\C6\x9bmwH_\xcb\xaa\xc7\xa6\x10&\xb0A\tim\x9bB\xd21\xd2\xbe\xddEf \xa0\xa6v\xf7\xe7\x89\xec\xbf\xc8\x97\xb37\xf0\x10\xcd\xd9\xaf;\xec\xccT\x9e\xe0\xbaw3\xc4K\v\x0e\xca\xdb\xa5\xe6\x91\xdc\x8d3\xf8\xec/\xa4U\x87\x02g\x06k\x9fW[.c\xb1\xd4y\xd4\xca=\f\xd8Q[\xacb\xa3f4\x9el\x90\x878[\x00\xd9\x04\x1a\xa6\xa4\x17\xa6(\x05tl\x17\xef\x1bU\xfbD\xec\x88\xd4\xa0&\xdb\x95wp\xfb\x01[\x8c\xc4(\xbb)\xf3\xa9\x1b\tt\xd3W\x11t\x1f\xa4n\xfd:\x90${\xc5\x16\xa5\x96\x88\xc78\xc0g\xb9\xbe\xbd1\x11}\x8d\'\x15+\xfe\x91\xed\x1e\xeb]\xfa\x9dS\xe6\x12\x9f\r\xc8\x81\xca\xd9\f\xfd\xc8/\xb99\xaa\x1a\r\x92\xae\xb6\xd2\xb8\xb7\f[\xd8y\xc6O\xcfE\xb4\xe6\x16\x1fT\x1e\x9b\x9c\f\x8d\xed1\x96\"\x83\x98\xb1S`\xc7\'\xc2\xbf\xb7', 'fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x9b3J\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'}, 0x50f) [ 267.877574] RSP: 002b:00007f02833a3c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 267.877588] RAX: ffffffffffffffda RBX: 00007f02833a3c90 RCX: 000000000045a909 [ 267.877595] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 000000000000001d [ 267.877603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 267.877612] R10: 0000000020000040 R11: 0000000000000246 R12: 00007f02833a46d4 [ 267.877620] R13: 00000000004caab3 R14: 00000000004e3d90 R15: 0000000000000004 [ 267.881324] kobject: 'loop1' (00000000cab50506): fill_kobj_path: path = '/devices/virtual/block/loop1' 19:47:59 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/%ev/sequencer2\x00', 0x2000000084003, 0x0) [ 268.034633] audit: type=1400 audit(1576180079.806:69): avc: denied { map } for pid=10487 comm="syz-executor.2" path="/dev/kvm" dev="devtmpfs" ino=4273 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:kvm_device_t:s0 tclass=chr_file permissive=1 [ 268.064600] socket: no more sockets 19:47:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0xfffffffffffffde3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r2 = gettid() r3 = gettid() sendmmsg$unix(r1, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x200000ae, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0xfd, 0x1, [r1]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}], 0x70}], 0xfd, 0x0) r4 = syz_open_procfs(r2, &(0x7f0000000140)='mounts\x00') ioctl$TIOCSISO7816(r4, 0xc0285443, &(0x7f0000000280)={0x40, 0x80000000, 0x4, 0x5395892d, 0x5}) r5 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f00000019c0)='GPLvmnet1*\x00') r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet_icmp_raw(0x2, 0x3, 0x1) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$netrom_NETROM_T1(r9, 0x103, 0x1, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r9, 0xc0305616, &(0x7f00000000c0)={0x0, {0x66f0, 0x6}}) write$capi20(r7, &(0x7f0000000080)={0x10, 0x9, 0x0, 0x82, 0x3f, 0x423c}, 0x10) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x109800, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r10, 0x402c5342, &(0x7f0000000200)={0x8b, 0x5e, 0x4, {}, 0x4, 0x1f}) 19:47:59 executing program 0 (fault-call:2 fault-nth:21): r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000040)) 19:47:59 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='cpu.weight.nice\x00', 0x2, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) connect(r3, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() r5 = gettid() sendmmsg$unix(r3, &(0x7f0000003f40)=[{&(0x7f0000000040)=@abs, 0x200000ae, 0x0, 0x0, &(0x7f0000001bc0)=[@rights={{0x14, 0xfd, 0x1, [r3]}}, @cred={{0x1c, 0x1, 0x2, {r4}}}, @rights={{0x14, 0x1, 0x1, [r2]}}, @cred={{0x1c, 0x1, 0x2, {r5}}}], 0x70}], 0xfd, 0x0) sched_setattr(r5, &(0x7f0000000080)={0x30, 0x0, 0x0, 0x9, 0x7c, 0x3f, 0x536, 0xff}, 0x0) getsockopt$bt_l2cap_L2CAP_LM(0xffffffffffffffff, 0x6, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x4) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 268.097812] kobject: 'loop3' (00000000f210c31b): kobject_uevent_env [ 268.109786] kobject: 'loop3' (00000000f210c31b): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 268.127873] kobject: 'loop2' (00000000a8500821): kobject_uevent_env [ 268.143699] FAULT_INJECTION: forcing a failure. 19:48:00 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f000055dff6)='/dev/ptmx\x00', 0x40101, 0x0) write(r0, &(0x7f0000f03f44)="09000000b36c5529a5534195cbffb4fffffff6091715f12f8f549f29496490f3f2afa9fd016f97ea68e0b7400fd558010287ce86ed8d843591ec4c782f85000000097f39147a2c89310932b0f6017ef5f00dfc01010000000000ffbf13", 0x5d) ioctl$TCSETS(r0, 0x540a, &(0x7f0000000000)={0x0, 0x400003}) 19:48:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, 'poQ\xff\a\x00\x00 \x00\x00\x00\x00\xfb,\xd4J\x00\v\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\x03\x00\x00\x00\xef\x00\x01\x03\\e\x00\x00\x00\x00\x00\x12\x00\x10\x00\x00\x00\x00\x00@\x01\x00\x06\x00', 0xc7, 0x10002}) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/*ev/sequencer2\x00', 0x2000000084003, 0x0) [ 268.143699] name failslab, interval 1, probability 0, space 0, times 0 [ 268.174712] kobject: 'loop2' (00000000a8500821): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 268.183797] CPU: 1 PID: 10501 Comm: syz-executor.0 Not tainted 4.19.88-syzkaller #0 [ 268.192031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.201389] Call Trace: [ 268.203999] dump_stac