0000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:05 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 188.150524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 188.157798] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:05 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 2 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 188.554182] FAULT_INJECTION: forcing a failure. [ 188.554182] name failslab, interval 1, probability 0, space 0, times 0 22:56:06 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 188.662183] CPU: 0 PID: 8081 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 188.670047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 188.679414] Call Trace: [ 188.682023] dump_stack+0x142/0x197 [ 188.685683] should_fail.cold+0x10f/0x159 [ 188.689869] should_failslab+0xdb/0x130 [ 188.693896] kmem_cache_alloc_node_trace+0x280/0x770 [ 188.699024] ? kasan_unpoison_shadow+0x35/0x50 [ 188.703632] __kmalloc_node+0x3d/0x80 [ 188.707448] kvmalloc_node+0x4e/0xe0 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 188.711181] alloc_fdtable+0x13b/0x280 [ 188.715087] dup_fd+0x693/0xa40 [ 188.718404] copy_process.part.0+0x1b5a/0x6a70 [ 188.723018] ? perf_trace_lock+0x30d/0x500 [ 188.727269] ? perf_trace_run_bpf_submit+0x113/0x170 [ 188.732389] ? save_trace+0x290/0x290 [ 188.736209] ? SOFTIRQ_verbose+0x10/0x10 [ 188.740274] ? perf_trace_lock+0x30d/0x500 [ 188.740307] ? __cleanup_sighand+0x50/0x50 [ 188.740320] ? lock_downgrade+0x740/0x740 [ 188.748782] _do_fork+0x19e/0xce0 [ 188.756360] ? fork_idle+0x280/0x280 [ 188.760096] ? fput+0xd4/0x150 [ 188.763318] ? SyS_write+0x15e/0x230 [ 188.767051] SyS_clone+0x37/0x50 [ 188.770424] ? sys_vfork+0x30/0x30 [ 188.773999] do_syscall_64+0x1e8/0x640 [ 188.777894] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 188.782759] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 188.787958] RIP: 0033:0x45a6f9 [ 188.791159] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 188.798881] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 188.806149] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 188.813414] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 188.813422] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 188.813428] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:06 executing program 2 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 188.964466] FAULT_INJECTION: forcing a failure. [ 188.964466] name failslab, interval 1, probability 0, space 0, times 0 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.057936] CPU: 1 PID: 8117 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 189.065786] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.075145] Call Trace: [ 189.077744] dump_stack+0x142/0x197 [ 189.081390] should_fail.cold+0x10f/0x159 [ 189.085561] should_failslab+0xdb/0x130 [ 189.089547] kmem_cache_alloc+0x2d7/0x780 [ 189.093703] ? dup_fd+0x533/0xa40 [ 189.097168] copy_fs_struct+0x43/0x2d0 [ 189.101063] copy_process.part.0+0x3974/0x6a70 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.105653] ? debug_smp_processor_id+0x1c/0x20 [ 189.110325] ? perf_trace_lock+0x109/0x500 [ 189.114560] ? check_preemption_disabled+0x3c/0x250 [ 189.119580] ? save_trace+0x290/0x290 [ 189.123385] ? SOFTIRQ_verbose+0x10/0x10 [ 189.127445] ? debug_smp_processor_id+0x1c/0x20 [ 189.132135] ? __cleanup_sighand+0x50/0x50 [ 189.136373] ? lock_downgrade+0x740/0x740 [ 189.140529] _do_fork+0x19e/0xce0 [ 189.143984] ? fork_idle+0x280/0x280 [ 189.147704] ? fput+0xd4/0x150 [ 189.150898] ? SyS_write+0x15e/0x230 [ 189.154706] SyS_clone+0x37/0x50 22:56:06 executing program 3: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.158075] ? sys_vfork+0x30/0x30 [ 189.161621] do_syscall_64+0x1e8/0x640 [ 189.165513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.170454] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.175644] RIP: 0033:0x45a6f9 [ 189.178831] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 189.186546] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 189.193815] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 189.209939] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.217219] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 189.224495] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:06 executing program 2 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:06 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.329957] FAULT_INJECTION: forcing a failure. [ 189.329957] name failslab, interval 1, probability 0, space 0, times 0 22:56:07 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.427500] CPU: 1 PID: 8143 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 189.435343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.444702] Call Trace: [ 189.447298] dump_stack+0x142/0x197 [ 189.450943] should_fail.cold+0x10f/0x159 [ 189.455103] should_failslab+0xdb/0x130 [ 189.459081] kmem_cache_alloc+0x2d7/0x780 [ 189.463232] ? do_raw_spin_unlock+0x16b/0x260 [ 189.467727] ? _raw_spin_unlock+0x2d/0x50 [ 189.471881] copy_process.part.0+0x39d7/0x6a70 22:56:07 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.476472] ? debug_smp_processor_id+0x1c/0x20 [ 189.481142] ? perf_trace_lock+0x109/0x500 [ 189.485378] ? check_preemption_disabled+0x3c/0x250 [ 189.490400] ? save_trace+0x290/0x290 [ 189.494206] ? SOFTIRQ_verbose+0x10/0x10 [ 189.498268] ? debug_smp_processor_id+0x1c/0x20 [ 189.503039] ? __cleanup_sighand+0x50/0x50 [ 189.507285] ? lock_downgrade+0x740/0x740 [ 189.511456] _do_fork+0x19e/0xce0 [ 189.514917] ? fork_idle+0x280/0x280 [ 189.518637] ? fput+0xd4/0x150 [ 189.521830] ? SyS_write+0x15e/0x230 [ 189.521844] SyS_clone+0x37/0x50 [ 189.521851] ? sys_vfork+0x30/0x30 [ 189.521864] do_syscall_64+0x1e8/0x640 [ 189.521873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.521890] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.521897] RIP: 0033:0x45a6f9 [ 189.521904] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 189.557239] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 189.564513] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.571782] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.571789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 189.571795] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:07 executing program 2 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:07 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.702757] FAULT_INJECTION: forcing a failure. [ 189.702757] name failslab, interval 1, probability 0, space 0, times 0 22:56:07 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getpgid(0x0) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.798606] CPU: 1 PID: 8180 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 189.806457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 189.815979] Call Trace: [ 189.815998] dump_stack+0x142/0x197 [ 189.816018] should_fail.cold+0x10f/0x159 [ 189.816035] should_failslab+0xdb/0x130 [ 189.816046] kmem_cache_alloc+0x2d7/0x780 [ 189.834479] ? do_raw_spin_unlock+0x16b/0x260 [ 189.838983] ? _raw_spin_unlock+0x2d/0x50 [ 189.843143] copy_process.part.0+0x39d7/0x6a70 [ 189.847732] ? debug_smp_processor_id+0x1c/0x20 [ 189.852403] ? perf_trace_lock+0x109/0x500 [ 189.856645] ? check_preemption_disabled+0x3c/0x250 [ 189.861669] ? save_trace+0x290/0x290 [ 189.865477] ? SOFTIRQ_verbose+0x10/0x10 [ 189.869546] ? debug_smp_processor_id+0x1c/0x20 [ 189.874234] ? __cleanup_sighand+0x50/0x50 [ 189.878477] ? lock_downgrade+0x740/0x740 [ 189.882638] _do_fork+0x19e/0xce0 [ 189.886096] ? fork_idle+0x280/0x280 [ 189.889816] ? fput+0xd4/0x150 [ 189.893011] ? SyS_write+0x15e/0x230 22:56:07 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.896733] SyS_clone+0x37/0x50 [ 189.900096] ? sys_vfork+0x30/0x30 [ 189.903645] do_syscall_64+0x1e8/0x640 [ 189.907536] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 189.912386] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 189.917578] RIP: 0033:0x45a6f9 [ 189.920764] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 189.928465] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 189.928472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 189.928478] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 189.928483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 189.928491] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:07 executing program 2 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:07 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.137557] FAULT_INJECTION: forcing a failure. [ 190.137557] name failslab, interval 1, probability 0, space 0, times 0 [ 190.187059] CPU: 0 PID: 8214 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 190.194911] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.204288] Call Trace: [ 190.206899] dump_stack+0x142/0x197 [ 190.210562] should_fail.cold+0x10f/0x159 [ 190.214739] should_failslab+0xdb/0x130 [ 190.218735] kmem_cache_alloc+0x2d7/0x780 [ 190.222896] ? do_raw_spin_unlock+0x16b/0x260 [ 190.227410] ? _raw_spin_unlock+0x2d/0x50 [ 190.231580] copy_process.part.0+0x39d7/0x6a70 22:56:07 executing program 3: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.236189] ? perf_trace_lock+0x30d/0x500 [ 190.240438] ? perf_trace_run_bpf_submit+0x113/0x170 [ 190.245552] ? save_trace+0x290/0x290 [ 190.249360] ? SOFTIRQ_verbose+0x10/0x10 [ 190.253425] ? perf_trace_lock+0x30d/0x500 [ 190.257877] ? __cleanup_sighand+0x50/0x50 [ 190.262121] ? lock_downgrade+0x740/0x740 [ 190.266294] _do_fork+0x19e/0xce0 [ 190.269765] ? fork_idle+0x280/0x280 [ 190.273495] ? fput+0xd4/0x150 [ 190.276699] ? SyS_write+0x15e/0x230 [ 190.280438] SyS_clone+0x37/0x50 [ 190.283818] ? sys_vfork+0x30/0x30 22:56:07 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:07 executing program 3: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.287372] do_syscall_64+0x1e8/0x640 [ 190.291270] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.296135] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.301335] RIP: 0033:0x45a6f9 [ 190.304533] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 190.312689] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 190.319972] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 190.327260] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:07 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.334544] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 190.341832] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 190.408880] kauditd_printk_skb: 96 callbacks suppressed [ 190.408889] audit: type=1804 audit(1575759367.995:204): pid=8233 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/46/file0" dev="sda1" ino=16697 res=1 22:56:08 executing program 2 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:08 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r4, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) [ 190.488405] audit: type=1804 audit(1575759368.015:205): pid=8236 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/48/file0" dev="sda1" ino=16714 res=1 [ 190.552444] FAULT_INJECTION: forcing a failure. [ 190.552444] name failslab, interval 1, probability 0, space 0, times 0 [ 190.560407] audit: type=1804 audit(1575759368.155:206): pid=8245 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/49/file0" dev="sda1" ino=16715 res=1 22:56:08 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.616932] CPU: 1 PID: 8250 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 190.624770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 190.634136] Call Trace: [ 190.636738] dump_stack+0x142/0x197 [ 190.640389] should_fail.cold+0x10f/0x159 [ 190.644553] should_failslab+0xdb/0x130 [ 190.648543] kmem_cache_alloc_trace+0x2e9/0x790 [ 190.653237] ? retire_userns_sysctls+0x90/0x90 [ 190.657833] alloc_mnt_ns+0xde/0x450 [ 190.661563] copy_mnt_ns+0x95/0x8c0 22:56:08 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.665192] ? kmem_cache_alloc+0x611/0x780 [ 190.669523] ? selinux_capable+0x36/0x40 [ 190.673686] create_new_namespaces+0xc9/0x720 [ 190.678192] ? ns_capable_common+0x12c/0x160 [ 190.683308] copy_namespaces+0x284/0x310 [ 190.687376] copy_process.part.0+0x2603/0x6a70 [ 190.691960] ? debug_smp_processor_id+0x1c/0x20 [ 190.696632] ? perf_trace_lock+0x109/0x500 22:56:08 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r3, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.699645] audit: type=1804 audit(1575759368.155:207): pid=8248 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/56/file0" dev="sda1" ino=16716 res=1 [ 190.700868] ? check_preemption_disabled+0x3c/0x250 [ 190.700880] ? debug_smp_processor_id+0x1c/0x20 [ 190.700902] ? __cleanup_sighand+0x50/0x50 [ 190.700915] ? lock_downgrade+0x740/0x740 [ 190.700930] _do_fork+0x19e/0xce0 [ 190.700944] ? fork_idle+0x280/0x280 [ 190.753207] ? fput+0xd4/0x150 [ 190.756411] ? SyS_write+0x15e/0x230 [ 190.760133] SyS_clone+0x37/0x50 [ 190.763500] ? sys_vfork+0x30/0x30 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.767049] do_syscall_64+0x1e8/0x640 [ 190.770945] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 190.775796] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 190.780983] RIP: 0033:0x45a6f9 [ 190.784172] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 190.791880] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 190.799151] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 190.806418] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 190.813697] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 190.820960] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 190.856981] audit: type=1804 audit(1575759368.155:208): pid=8249 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/47/file0" dev="sda1" ino=16718 res=1 22:56:08 executing program 2 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:08 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 22:56:08 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 190.940535] audit: type=1804 audit(1575759368.195:209): pid=8246 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/86/file0" dev="sda1" ino=16717 res=1 [ 191.029310] FAULT_INJECTION: forcing a failure. [ 191.029310] name failslab, interval 1, probability 0, space 0, times 0 [ 191.044669] audit: type=1804 audit(1575759368.255:210): pid=8253 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/48/file0" dev="sda1" ino=16718 res=1 22:56:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.076702] CPU: 1 PID: 8284 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 191.084531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.093898] Call Trace: [ 191.096495] dump_stack+0x142/0x197 [ 191.100141] should_fail.cold+0x10f/0x159 [ 191.104306] should_failslab+0xdb/0x130 [ 191.108294] kmem_cache_alloc_trace+0x2e9/0x790 [ 191.112976] ? retire_userns_sysctls+0x90/0x90 [ 191.117566] alloc_mnt_ns+0xde/0x450 [ 191.121283] copy_mnt_ns+0x95/0x8c0 [ 191.124910] ? kmem_cache_alloc+0x611/0x780 [ 191.129240] ? selinux_capable+0x36/0x40 [ 191.133309] create_new_namespaces+0xc9/0x720 [ 191.137809] ? ns_capable_common+0x12c/0x160 [ 191.142230] copy_namespaces+0x284/0x310 [ 191.146305] copy_process.part.0+0x2603/0x6a70 [ 191.150896] ? debug_smp_processor_id+0x1c/0x20 [ 191.155569] ? perf_trace_lock+0x109/0x500 [ 191.159803] ? check_preemption_disabled+0x3c/0x250 [ 191.164852] ? debug_smp_processor_id+0x1c/0x20 [ 191.169543] ? __cleanup_sighand+0x50/0x50 [ 191.173785] ? lock_downgrade+0x740/0x740 22:56:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.177948] _do_fork+0x19e/0xce0 [ 191.181410] ? fork_idle+0x280/0x280 [ 191.185135] ? fput+0xd4/0x150 [ 191.188340] ? SyS_write+0x15e/0x230 [ 191.192073] SyS_clone+0x37/0x50 [ 191.195527] ? sys_vfork+0x30/0x30 [ 191.199083] do_syscall_64+0x1e8/0x640 [ 191.202989] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.207848] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.213045] RIP: 0033:0x45a6f9 [ 191.216234] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 22:56:08 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.223947] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 191.227650] audit: type=1804 audit(1575759368.285:211): pid=8256 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/50/file0" dev="sda1" ino=16693 res=1 [ 191.231218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 191.231224] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.231231] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 191.231237] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:08 executing program 2 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 22:56:08 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.354424] audit: type=1804 audit(1575759368.335:212): pid=8257 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/87/file0" dev="sda1" ino=16694 res=1 22:56:09 executing program 5: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.467437] FAULT_INJECTION: forcing a failure. [ 191.467437] name failslab, interval 1, probability 0, space 0, times 0 [ 191.497145] CPU: 0 PID: 8313 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 191.504993] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.514364] Call Trace: [ 191.516978] dump_stack+0x142/0x197 [ 191.520644] should_fail.cold+0x10f/0x159 [ 191.524828] should_failslab+0xdb/0x130 [ 191.528829] kmem_cache_alloc+0x2d7/0x780 [ 191.533001] ? lock_downgrade+0x740/0x740 [ 191.537169] alloc_vfsmnt+0x28/0x7d0 [ 191.540905] clone_mnt+0x70/0xee0 [ 191.544373] ? is_subdir+0x222/0x389 [ 191.548099] copy_tree+0x33b/0x8a0 [ 191.551678] copy_mnt_ns+0x11c/0x8c0 [ 191.555398] ? kmem_cache_alloc+0x611/0x780 [ 191.559735] ? selinux_capable+0x36/0x40 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.563833] create_new_namespaces+0xc9/0x720 [ 191.568349] ? ns_capable_common+0x12c/0x160 [ 191.572788] copy_namespaces+0x284/0x310 [ 191.576888] copy_process.part.0+0x2603/0x6a70 [ 191.581494] ? perf_trace_lock+0x30d/0x500 [ 191.585753] ? perf_trace_run_bpf_submit+0x113/0x170 [ 191.590885] ? perf_trace_lock+0x30d/0x500 [ 191.595156] ? __cleanup_sighand+0x50/0x50 [ 191.599412] ? lock_downgrade+0x740/0x740 [ 191.603585] _do_fork+0x19e/0xce0 [ 191.607054] ? fork_idle+0x280/0x280 [ 191.610814] ? fput+0xd4/0x150 [ 191.614008] ? SyS_write+0x15e/0x230 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.614031] SyS_clone+0x37/0x50 [ 191.621079] ? sys_vfork+0x30/0x30 [ 191.621099] do_syscall_64+0x1e8/0x640 [ 191.621110] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 191.621136] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 191.621147] RIP: 0033:0x45a6f9 [ 191.621156] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 191.649475] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 191.656756] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.664150] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 191.671442] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 191.678718] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:09 executing program 5: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.718444] audit: type=1804 audit(1575759368.375:213): pid=8259 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/49/file0" dev="sda1" ino=16718 res=1 22:56:09 executing program 2 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:09 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 191.884937] FAULT_INJECTION: forcing a failure. [ 191.884937] name failslab, interval 1, probability 0, space 0, times 0 22:56:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) [ 191.947430] CPU: 1 PID: 8347 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 191.955294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 191.964665] Call Trace: [ 191.967267] dump_stack+0x142/0x197 [ 191.970916] should_fail.cold+0x10f/0x159 [ 191.975088] should_failslab+0xdb/0x130 [ 191.979062] __kmalloc_track_caller+0x2ec/0x790 [ 191.979082] ? kstrdup_const+0x48/0x60 [ 191.979098] kstrdup+0x3a/0x70 [ 191.979109] kstrdup_const+0x48/0x60 [ 191.979120] alloc_vfsmnt+0xe5/0x7d0 [ 191.994569] clone_mnt+0x70/0xee0 [ 192.001708] ? is_subdir+0x222/0x389 [ 192.005432] copy_tree+0x33b/0x8a0 [ 192.008984] copy_mnt_ns+0x11c/0x8c0 [ 192.012701] ? kmem_cache_alloc+0x611/0x780 [ 192.017040] ? selinux_capable+0x36/0x40 [ 192.021112] create_new_namespaces+0xc9/0x720 [ 192.025610] ? ns_capable_common+0x12c/0x160 [ 192.030025] copy_namespaces+0x284/0x310 [ 192.034095] copy_process.part.0+0x2603/0x6a70 [ 192.038682] ? debug_smp_processor_id+0x1c/0x20 [ 192.043354] ? perf_trace_lock+0x109/0x500 22:56:09 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.047594] ? check_preemption_disabled+0x3c/0x250 [ 192.052612] ? debug_smp_processor_id+0x1c/0x20 [ 192.057302] ? __cleanup_sighand+0x50/0x50 [ 192.061548] ? lock_downgrade+0x740/0x740 [ 192.065708] _do_fork+0x19e/0xce0 [ 192.069172] ? fork_idle+0x280/0x280 [ 192.072894] ? fput+0xd4/0x150 [ 192.076088] ? SyS_write+0x15e/0x230 [ 192.079810] SyS_clone+0x37/0x50 [ 192.083175] ? sys_vfork+0x30/0x30 [ 192.086722] do_syscall_64+0x1e8/0x640 [ 192.090603] ? trace_hardirqs_off_thunk+0x1a/0x1c 22:56:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) 22:56:09 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.095446] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.095455] RIP: 0033:0x45a6f9 [ 192.095461] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 192.095472] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 192.095479] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 192.126061] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.133332] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 192.140601] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:09 executing program 2 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:09 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:09 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 5: r0 = syz_open_dev$loop(0x0, 0x0, 0x3) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.405586] FAULT_INJECTION: forcing a failure. [ 192.405586] name failslab, interval 1, probability 0, space 0, times 0 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.497503] CPU: 1 PID: 8391 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 192.505373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.515170] Call Trace: [ 192.517776] dump_stack+0x142/0x197 [ 192.521431] should_fail.cold+0x10f/0x159 [ 192.525595] should_failslab+0xdb/0x130 [ 192.529581] __kmalloc_track_caller+0x2ec/0x790 [ 192.534785] ? kstrdup_const+0x48/0x60 [ 192.538681] kstrdup+0x3a/0x70 [ 192.541879] kstrdup_const+0x48/0x60 [ 192.545598] alloc_vfsmnt+0xe5/0x7d0 [ 192.549321] clone_mnt+0x70/0xee0 [ 192.552780] ? is_subdir+0x222/0x389 [ 192.556534] copy_tree+0x33b/0x8a0 [ 192.560086] copy_mnt_ns+0x11c/0x8c0 [ 192.563805] ? kmem_cache_alloc+0x611/0x780 [ 192.568135] ? selinux_capable+0x36/0x40 [ 192.572208] create_new_namespaces+0xc9/0x720 [ 192.576713] ? ns_capable_common+0x12c/0x160 [ 192.581130] copy_namespaces+0x284/0x310 [ 192.585284] copy_process.part.0+0x2603/0x6a70 [ 192.589962] ? debug_smp_processor_id+0x1c/0x20 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.594636] ? perf_trace_lock+0x109/0x500 [ 192.598893] ? check_preemption_disabled+0x3c/0x250 [ 192.603917] ? debug_smp_processor_id+0x1c/0x20 [ 192.608601] ? __cleanup_sighand+0x50/0x50 [ 192.612841] ? lock_downgrade+0x740/0x740 [ 192.616994] _do_fork+0x19e/0xce0 [ 192.620460] ? fork_idle+0x280/0x280 [ 192.624182] ? fput+0xd4/0x150 [ 192.627379] ? SyS_write+0x15e/0x230 [ 192.631100] SyS_clone+0x37/0x50 [ 192.634470] ? sys_vfork+0x30/0x30 [ 192.638020] do_syscall_64+0x1e8/0x640 [ 192.641936] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 192.646794] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 192.651983] RIP: 0033:0x45a6f9 [ 192.655171] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 192.663517] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 192.670789] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 192.678054] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 192.685327] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 192.692596] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:10 executing program 2 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:10 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.837140] FAULT_INJECTION: forcing a failure. [ 192.837140] name failslab, interval 1, probability 0, space 0, times 0 22:56:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 192.928131] CPU: 1 PID: 8425 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 192.935975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 192.945352] Call Trace: [ 192.947951] dump_stack+0x142/0x197 [ 192.951594] should_fail.cold+0x10f/0x159 [ 192.955758] should_failslab+0xdb/0x130 [ 192.959743] __kmalloc_track_caller+0x2ec/0x790 [ 192.964422] ? kstrdup_const+0x48/0x60 [ 192.968318] kstrdup+0x3a/0x70 [ 192.971511] kstrdup_const+0x48/0x60 [ 192.971524] alloc_vfsmnt+0xe5/0x7d0 [ 192.971538] clone_mnt+0x70/0xee0 [ 192.978945] ? is_subdir+0x222/0x389 [ 192.978961] copy_tree+0x33b/0x8a0 [ 192.978982] copy_mnt_ns+0x11c/0x8c0 [ 192.978989] ? kmem_cache_alloc+0x611/0x780 [ 192.979002] ? selinux_capable+0x36/0x40 [ 193.001729] create_new_namespaces+0xc9/0x720 [ 193.006235] ? ns_capable_common+0x12c/0x160 [ 193.010656] copy_namespaces+0x284/0x310 [ 193.014726] copy_process.part.0+0x2603/0x6a70 [ 193.019314] ? debug_smp_processor_id+0x1c/0x20 [ 193.023987] ? perf_trace_lock+0x109/0x500 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.028225] ? check_preemption_disabled+0x3c/0x250 [ 193.033244] ? debug_smp_processor_id+0x1c/0x20 [ 193.037926] ? __cleanup_sighand+0x50/0x50 [ 193.042256] ? lock_downgrade+0x740/0x740 [ 193.046409] _do_fork+0x19e/0xce0 [ 193.046423] ? fork_idle+0x280/0x280 [ 193.053570] ? fput+0xd4/0x150 [ 193.053579] ? SyS_write+0x15e/0x230 [ 193.053593] SyS_clone+0x37/0x50 [ 193.053600] ? sys_vfork+0x30/0x30 [ 193.053613] do_syscall_64+0x1e8/0x640 [ 193.053623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.053643] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.053651] RIP: 0033:0x45a6f9 [ 193.053657] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 193.092188] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 193.099468] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 193.106846] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.114133] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 193.121416] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:10 executing program 2 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:10 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 5: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.245404] FAULT_INJECTION: forcing a failure. [ 193.245404] name failslab, interval 1, probability 0, space 0, times 0 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:10 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.328918] CPU: 0 PID: 8462 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 193.336768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.346135] Call Trace: [ 193.348740] dump_stack+0x142/0x197 [ 193.352406] should_fail.cold+0x10f/0x159 [ 193.356584] should_failslab+0xdb/0x130 [ 193.360578] kmem_cache_alloc+0x2d7/0x780 [ 193.364748] ? find_held_lock+0x35/0x130 [ 193.368826] ? copy_tree+0x4a2/0x8a0 [ 193.372561] alloc_vfsmnt+0x28/0x7d0 22:56:10 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.376289] clone_mnt+0x70/0xee0 [ 193.379755] ? lock_downgrade+0x740/0x740 [ 193.383918] ? do_raw_spin_unlock+0x16b/0x260 [ 193.388436] copy_tree+0x33b/0x8a0 [ 193.392004] copy_mnt_ns+0x11c/0x8c0 [ 193.395730] ? kmem_cache_alloc+0x611/0x780 [ 193.400179] ? selinux_capable+0x36/0x40 [ 193.404267] create_new_namespaces+0xc9/0x720 [ 193.408778] ? ns_capable_common+0x12c/0x160 [ 193.413204] copy_namespaces+0x284/0x310 [ 193.417287] copy_process.part.0+0x2603/0x6a70 [ 193.422160] ? perf_trace_lock+0x30d/0x500 22:56:11 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.426412] ? perf_trace_run_bpf_submit+0x113/0x170 [ 193.431535] ? perf_trace_lock+0x30d/0x500 [ 193.435809] ? __cleanup_sighand+0x50/0x50 [ 193.440063] ? lock_downgrade+0x740/0x740 [ 193.444238] _do_fork+0x19e/0xce0 [ 193.447708] ? fork_idle+0x280/0x280 [ 193.451439] ? fput+0xd4/0x150 [ 193.454647] ? SyS_write+0x15e/0x230 [ 193.458372] SyS_clone+0x37/0x50 [ 193.461740] ? sys_vfork+0x30/0x30 [ 193.465294] do_syscall_64+0x1e8/0x640 [ 193.469203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.474067] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.479261] RIP: 0033:0x45a6f9 [ 193.482457] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 193.490180] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 193.497463] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 193.504742] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.512024] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 193.519305] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:11 executing program 2 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:11 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 5: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.640772] FAULT_INJECTION: forcing a failure. [ 193.640772] name failslab, interval 1, probability 0, space 0, times 0 [ 193.662560] CPU: 1 PID: 8495 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 193.670391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 193.679751] Call Trace: [ 193.682353] dump_stack+0x142/0x197 [ 193.686000] should_fail.cold+0x10f/0x159 22:56:11 executing program 5: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 193.690161] should_failslab+0xdb/0x130 [ 193.694144] __kmalloc_track_caller+0x2ec/0x790 [ 193.698824] ? kstrdup_const+0x48/0x60 [ 193.702714] kstrdup+0x3a/0x70 [ 193.705996] kstrdup_const+0x48/0x60 [ 193.709713] alloc_vfsmnt+0xe5/0x7d0 [ 193.713430] clone_mnt+0x70/0xee0 [ 193.716887] ? lock_downgrade+0x740/0x740 [ 193.721034] ? do_raw_spin_unlock+0x16b/0x260 [ 193.725522] copy_tree+0x33b/0x8a0 [ 193.729075] copy_mnt_ns+0x11c/0x8c0 [ 193.732788] ? kmem_cache_alloc+0x611/0x780 [ 193.737113] ? selinux_capable+0x36/0x40 22:56:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) [ 193.741189] create_new_namespaces+0xc9/0x720 [ 193.745685] ? ns_capable_common+0x12c/0x160 [ 193.750095] copy_namespaces+0x284/0x310 [ 193.754159] copy_process.part.0+0x2603/0x6a70 [ 193.758745] ? debug_smp_processor_id+0x1c/0x20 [ 193.763415] ? perf_trace_lock+0x109/0x500 [ 193.767656] ? check_preemption_disabled+0x3c/0x250 [ 193.772686] ? debug_smp_processor_id+0x1c/0x20 [ 193.777367] ? __cleanup_sighand+0x50/0x50 [ 193.781608] ? lock_downgrade+0x740/0x740 [ 193.785771] _do_fork+0x19e/0xce0 [ 193.789228] ? fork_idle+0x280/0x280 [ 193.792937] ? fput+0xd4/0x150 [ 193.796112] ? SyS_write+0x15e/0x230 [ 193.799825] SyS_clone+0x37/0x50 [ 193.803175] ? sys_vfork+0x30/0x30 [ 193.806722] do_syscall_64+0x1e8/0x640 [ 193.810597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 193.815442] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 193.820629] RIP: 0033:0x45a6f9 [ 193.823802] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 193.831497] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 193.838753] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 193.846012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 193.853263] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 193.860517] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:11 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 22:56:11 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 2 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, 0x0) 22:56:11 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 194.206402] FAULT_INJECTION: forcing a failure. [ 194.206402] name failslab, interval 1, probability 0, space 0, times 0 [ 194.249183] CPU: 1 PID: 8528 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 194.257021] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.266366] Call Trace: [ 194.266385] dump_stack+0x142/0x197 [ 194.266404] should_fail.cold+0x10f/0x159 [ 194.266421] should_failslab+0xdb/0x130 [ 194.266432] kmem_cache_alloc+0x2d7/0x780 [ 194.266445] ? find_held_lock+0x35/0x130 [ 194.266459] ? copy_tree+0x4a2/0x8a0 [ 194.266473] alloc_vfsmnt+0x28/0x7d0 22:56:11 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:11 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 194.266485] clone_mnt+0x70/0xee0 [ 194.266493] ? lock_downgrade+0x740/0x740 [ 194.266503] ? do_raw_spin_unlock+0x16b/0x260 [ 194.266517] copy_tree+0x33b/0x8a0 [ 194.312133] copy_mnt_ns+0x11c/0x8c0 [ 194.315852] ? kmem_cache_alloc+0x611/0x780 [ 194.320196] ? selinux_capable+0x36/0x40 [ 194.324267] create_new_namespaces+0xc9/0x720 [ 194.329290] ? ns_capable_common+0x12c/0x160 [ 194.333721] copy_namespaces+0x284/0x310 [ 194.337798] copy_process.part.0+0x2603/0x6a70 [ 194.342388] ? debug_smp_processor_id+0x1c/0x20 22:56:11 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) [ 194.347060] ? perf_trace_lock+0x109/0x500 [ 194.351297] ? check_preemption_disabled+0x3c/0x250 [ 194.356320] ? debug_smp_processor_id+0x1c/0x20 [ 194.361005] ? __cleanup_sighand+0x50/0x50 [ 194.365246] ? lock_downgrade+0x740/0x740 [ 194.369411] _do_fork+0x19e/0xce0 [ 194.372884] ? fork_idle+0x280/0x280 [ 194.376616] ? fput+0xd4/0x150 [ 194.379813] ? SyS_write+0x15e/0x230 [ 194.379830] SyS_clone+0x37/0x50 [ 194.379837] ? sys_vfork+0x30/0x30 [ 194.379851] do_syscall_64+0x1e8/0x640 [ 194.394424] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.399276] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.399285] RIP: 0033:0x45a6f9 [ 194.399292] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 194.415533] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 194.422807] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 194.430076] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.437353] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 194.444618] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x0, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 2 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:12 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 194.603302] FAULT_INJECTION: forcing a failure. [ 194.603302] name failslab, interval 1, probability 0, space 0, times 0 [ 194.633192] CPU: 1 PID: 8556 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 194.641033] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 194.641038] Call Trace: [ 194.641055] dump_stack+0x142/0x197 [ 194.641074] should_fail.cold+0x10f/0x159 [ 194.641092] should_failslab+0xdb/0x130 [ 194.641104] __kmalloc_track_caller+0x2ec/0x790 [ 194.641120] ? kstrdup_const+0x48/0x60 [ 194.641132] kstrdup+0x3a/0x70 [ 194.641143] kstrdup_const+0x48/0x60 [ 194.680215] alloc_vfsmnt+0xe5/0x7d0 [ 194.683935] clone_mnt+0x70/0xee0 [ 194.687391] ? lock_downgrade+0x740/0x740 [ 194.691535] ? do_raw_spin_unlock+0x16b/0x260 [ 194.691549] copy_tree+0x33b/0x8a0 [ 194.691568] copy_mnt_ns+0x11c/0x8c0 [ 194.691578] ? kmem_cache_alloc+0x611/0x780 [ 194.691590] ? selinux_capable+0x36/0x40 [ 194.691606] create_new_namespaces+0xc9/0x720 [ 194.691617] ? ns_capable_common+0x12c/0x160 [ 194.691629] copy_namespaces+0x284/0x310 [ 194.724607] copy_process.part.0+0x2603/0x6a70 [ 194.724622] ? debug_smp_processor_id+0x1c/0x20 [ 194.733937] ? perf_trace_lock+0x109/0x500 [ 194.738176] ? check_preemption_disabled+0x3c/0x250 [ 194.743197] ? debug_smp_processor_id+0x1c/0x20 [ 194.747883] ? __cleanup_sighand+0x50/0x50 [ 194.752125] ? lock_downgrade+0x740/0x740 [ 194.756278] _do_fork+0x19e/0xce0 [ 194.759735] ? fork_idle+0x280/0x280 [ 194.763457] ? fput+0xd4/0x150 [ 194.766836] ? SyS_write+0x15e/0x230 [ 194.770554] SyS_clone+0x37/0x50 [ 194.773923] ? sys_vfork+0x30/0x30 [ 194.777472] do_syscall_64+0x1e8/0x640 [ 194.781445] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 194.786298] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 194.791485] RIP: 0033:0x45a6f9 [ 194.794691] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 22:56:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) 22:56:12 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) [ 194.802392] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 194.802397] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 194.802403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 194.802408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 194.802413] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:12 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 2 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:12 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(0xffffffffffffffff, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.045624] FAULT_INJECTION: forcing a failure. [ 195.045624] name failslab, interval 1, probability 0, space 0, times 0 22:56:12 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0}) 22:56:12 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:12 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r9, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.117108] CPU: 1 PID: 8590 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 195.124944] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.134299] Call Trace: [ 195.136895] dump_stack+0x142/0x197 [ 195.140535] should_fail.cold+0x10f/0x159 [ 195.144694] should_failslab+0xdb/0x130 [ 195.148674] __kmalloc_track_caller+0x2ec/0x790 [ 195.153354] ? kstrdup_const+0x48/0x60 [ 195.157248] kstrdup+0x3a/0x70 [ 195.160447] kstrdup_const+0x48/0x60 [ 195.164167] alloc_vfsmnt+0xe5/0x7d0 [ 195.167886] clone_mnt+0x70/0xee0 [ 195.171341] ? lock_downgrade+0x740/0x740 [ 195.175499] ? do_raw_spin_unlock+0x16b/0x260 [ 195.180006] copy_tree+0x33b/0x8a0 [ 195.183559] copy_mnt_ns+0x11c/0x8c0 [ 195.187281] ? kmem_cache_alloc+0x611/0x780 [ 195.191612] ? selinux_capable+0x36/0x40 [ 195.195683] create_new_namespaces+0xc9/0x720 [ 195.200263] ? ns_capable_common+0x12c/0x160 [ 195.204680] copy_namespaces+0x284/0x310 [ 195.208745] copy_process.part.0+0x2603/0x6a70 22:56:12 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.213331] ? debug_smp_processor_id+0x1c/0x20 [ 195.218001] ? perf_trace_lock+0x109/0x500 [ 195.222234] ? check_preemption_disabled+0x3c/0x250 [ 195.227254] ? debug_smp_processor_id+0x1c/0x20 [ 195.231937] ? __cleanup_sighand+0x50/0x50 [ 195.236176] ? lock_downgrade+0x740/0x740 [ 195.240356] _do_fork+0x19e/0xce0 [ 195.243829] ? fork_idle+0x280/0x280 [ 195.247550] ? fput+0xd4/0x150 [ 195.250748] ? SyS_write+0x15e/0x230 [ 195.254473] SyS_clone+0x37/0x50 [ 195.257837] ? sys_vfork+0x30/0x30 [ 195.261385] do_syscall_64+0x1e8/0x640 22:56:12 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.265282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.270144] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.275329] RIP: 0033:0x45a6f9 [ 195.278516] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 195.286227] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 195.293499] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 195.300774] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.308319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 195.316047] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:12 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 2 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:13 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r9, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.488550] kauditd_printk_skb: 73 callbacks suppressed [ 195.488560] audit: type=1804 audit(1575759373.075:287): pid=8615 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/75/file0" dev="sda1" ino=16735 res=1 [ 195.581810] FAULT_INJECTION: forcing a failure. [ 195.581810] name failslab, interval 1, probability 0, space 0, times 0 [ 195.594569] audit: type=1804 audit(1575759373.185:288): pid=8626 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/110/file0" dev="sda1" ino=16747 res=1 22:56:13 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.690598] CPU: 1 PID: 8631 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 195.698434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 195.707879] Call Trace: [ 195.710484] dump_stack+0x142/0x197 [ 195.714144] should_fail.cold+0x10f/0x159 [ 195.718307] should_failslab+0xdb/0x130 [ 195.722298] __kmalloc_track_caller+0x2ec/0x790 [ 195.726986] ? kstrdup_const+0x48/0x60 [ 195.730883] kstrdup+0x3a/0x70 [ 195.734083] kstrdup_const+0x48/0x60 [ 195.737818] alloc_vfsmnt+0xe5/0x7d0 [ 195.741545] clone_mnt+0x70/0xee0 [ 195.745004] ? lock_downgrade+0x740/0x740 [ 195.749169] ? do_raw_spin_unlock+0x16b/0x260 [ 195.753678] copy_tree+0x33b/0x8a0 [ 195.757234] copy_mnt_ns+0x11c/0x8c0 [ 195.760956] ? kmem_cache_alloc+0x611/0x780 [ 195.765283] ? selinux_capable+0x36/0x40 [ 195.769352] create_new_namespaces+0xc9/0x720 [ 195.773859] ? ns_capable_common+0x12c/0x160 [ 195.776889] audit: type=1804 audit(1575759373.185:289): pid=8628 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/76/file0" dev="sda1" ino=16749 res=1 [ 195.778271] copy_namespaces+0x284/0x310 [ 195.778287] copy_process.part.0+0x2603/0x6a70 [ 195.809336] audit: type=1804 audit(1575759373.185:290): pid=8630 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.5" name="/root/syzkaller-testdir664862308/syzkaller.5j1SQU/76/file0" dev="sda1" ino=16751 res=1 22:56:13 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) 22:56:13 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r8, r8, &(0x7f0000000180)=0x74000000, 0x0) r9 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r9, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r6, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 195.809416] ? debug_smp_processor_id+0x1c/0x20 [ 195.814070] audit: type=1804 audit(1575759373.195:291): pid=8627 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir392968819/syzkaller.zM4p6h/83/file0" dev="sda1" ino=16750 res=1 [ 195.841042] ? perf_trace_lock+0x109/0x500 [ 195.841054] ? check_preemption_disabled+0x3c/0x250 [ 195.841065] ? debug_smp_processor_id+0x1c/0x20 [ 195.841085] ? __cleanup_sighand+0x50/0x50 [ 195.841094] ? lock_downgrade+0x740/0x740 [ 195.841109] _do_fork+0x19e/0xce0 [ 195.841122] ? fork_idle+0x280/0x280 [ 195.841136] ? fput+0xd4/0x150 [ 195.841146] ? SyS_write+0x15e/0x230 [ 195.841159] SyS_clone+0x37/0x50 [ 195.841165] ? sys_vfork+0x30/0x30 [ 195.841177] do_syscall_64+0x1e8/0x640 [ 195.841186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 195.841201] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 195.841210] RIP: 0033:0x45a6f9 [ 195.841215] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 195.841225] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 195.841230] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 195.841235] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 195.841240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 195.841246] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 195.878156] audit: type=1804 audit(1575759373.225:292): pid=8629 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/73/file0" dev="sda1" ino=16748 res=1 [ 195.933423] audit: type=1804 audit(1575759373.295:293): pid=8636 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/77/file0" dev="sda1" ino=16734 res=1 [ 196.039952] audit: type=1804 audit(1575759373.325:294): pid=8637 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/111/file0" dev="sda1" ino=16749 res=1 [ 196.067761] audit: type=1804 audit(1575759373.505:295): pid=8642 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/74/file0" dev="sda1" ino=16740 res=1 [ 196.109288] audit: type=1804 audit(1575759373.505:296): pid=8643 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/78/file0" dev="sda1" ino=16741 res=1 22:56:13 executing program 2 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:13 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') 22:56:13 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.275989] FAULT_INJECTION: forcing a failure. [ 196.275989] name failslab, interval 1, probability 0, space 0, times 0 22:56:13 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:13 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r7, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:13 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.346558] CPU: 1 PID: 8668 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 196.354402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.364894] Call Trace: [ 196.367506] dump_stack+0x142/0x197 [ 196.371132] should_fail.cold+0x10f/0x159 [ 196.371149] should_failslab+0xdb/0x130 [ 196.371160] kmem_cache_alloc+0x2d7/0x780 [ 196.371175] ? find_held_lock+0x35/0x130 [ 196.371185] ? copy_tree+0x4a2/0x8a0 [ 196.371197] alloc_vfsmnt+0x28/0x7d0 [ 196.371207] clone_mnt+0x70/0xee0 [ 196.371219] ? lock_downgrade+0x740/0x740 [ 196.402693] ? do_raw_spin_unlock+0x16b/0x260 [ 196.407207] copy_tree+0x33b/0x8a0 [ 196.410770] copy_mnt_ns+0x11c/0x8c0 [ 196.414493] ? kmem_cache_alloc+0x611/0x780 [ 196.418821] ? selinux_capable+0x36/0x40 [ 196.422895] create_new_namespaces+0xc9/0x720 [ 196.427400] ? ns_capable_common+0x12c/0x160 [ 196.431817] copy_namespaces+0x284/0x310 [ 196.435888] copy_process.part.0+0x2603/0x6a70 [ 196.440478] ? debug_smp_processor_id+0x1c/0x20 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 196.445150] ? perf_trace_lock+0x109/0x500 [ 196.449389] ? check_preemption_disabled+0x3c/0x250 [ 196.454412] ? debug_smp_processor_id+0x1c/0x20 [ 196.459210] ? __cleanup_sighand+0x50/0x50 [ 196.463538] ? lock_downgrade+0x740/0x740 [ 196.467801] _do_fork+0x19e/0xce0 [ 196.471262] ? fork_idle+0x280/0x280 [ 196.474992] ? fput+0xd4/0x150 [ 196.478190] ? SyS_write+0x15e/0x230 [ 196.481912] SyS_clone+0x37/0x50 [ 196.481920] ? sys_vfork+0x30/0x30 [ 196.481933] do_syscall_64+0x1e8/0x640 22:56:14 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, 0x0, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.488805] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.488825] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.502690] RIP: 0033:0x45a6f9 [ 196.505890] RSP: 002b:00007f52fe266c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 196.513610] RAX: ffffffffffffffda RBX: 00007f52fe266c90 RCX: 000000000045a6f9 [ 196.520895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 196.529036] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 196.536309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2676d4 [ 196.543581] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:14 executing program 2 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:14 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.712175] FAULT_INJECTION: forcing a failure. [ 196.712175] name failslab, interval 1, probability 0, space 0, times 0 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:14 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.767057] CPU: 1 PID: 8702 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 196.776451] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 196.785807] Call Trace: [ 196.788403] dump_stack+0x142/0x197 [ 196.792048] should_fail.cold+0x10f/0x159 [ 196.796214] should_failslab+0xdb/0x130 [ 196.800195] __kmalloc_track_caller+0x2ec/0x790 [ 196.804874] ? kstrdup_const+0x48/0x60 [ 196.808772] kstrdup+0x3a/0x70 [ 196.811965] kstrdup_const+0x48/0x60 22:56:14 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.815683] alloc_vfsmnt+0xe5/0x7d0 [ 196.819401] clone_mnt+0x70/0xee0 [ 196.822855] ? lock_downgrade+0x740/0x740 [ 196.827006] ? do_raw_spin_unlock+0x16b/0x260 [ 196.831519] copy_tree+0x33b/0x8a0 [ 196.835070] copy_mnt_ns+0x11c/0x8c0 [ 196.838787] ? kmem_cache_alloc+0x611/0x780 [ 196.843114] ? selinux_capable+0x36/0x40 [ 196.847184] create_new_namespaces+0xc9/0x720 [ 196.851684] ? ns_capable_common+0x12c/0x160 [ 196.856118] copy_namespaces+0x284/0x310 [ 196.860189] copy_process.part.0+0x2603/0x6a70 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 196.864775] ? debug_smp_processor_id+0x1c/0x20 [ 196.869448] ? perf_trace_lock+0x109/0x500 [ 196.873686] ? check_preemption_disabled+0x3c/0x250 [ 196.878708] ? debug_smp_processor_id+0x1c/0x20 [ 196.883389] ? __cleanup_sighand+0x50/0x50 [ 196.887629] ? lock_downgrade+0x740/0x740 [ 196.891782] _do_fork+0x19e/0xce0 [ 196.895242] ? fork_idle+0x280/0x280 [ 196.898966] ? fput+0xd4/0x150 [ 196.902161] ? SyS_write+0x15e/0x230 [ 196.905884] SyS_clone+0x37/0x50 [ 196.909253] ? sys_vfork+0x30/0x30 [ 196.912800] do_syscall_64+0x1e8/0x640 22:56:14 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 196.916693] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 196.921547] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 196.926734] RIP: 0033:0x45a6f9 [ 196.929918] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 196.937629] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 196.944904] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 196.952178] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 196.959546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 196.966997] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:14 executing program 2 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:14 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 4: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:14 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 4: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 197.170438] FAULT_INJECTION: forcing a failure. [ 197.170438] name failslab, interval 1, probability 0, space 0, times 0 [ 197.246461] CPU: 1 PID: 8737 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 197.254308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.263672] Call Trace: [ 197.266275] dump_stack+0x142/0x197 [ 197.269926] should_fail.cold+0x10f/0x159 [ 197.274104] should_failslab+0xdb/0x130 [ 197.278103] __kmalloc_track_caller+0x2ec/0x790 [ 197.282786] ? kstrdup_const+0x48/0x60 [ 197.286703] kstrdup+0x3a/0x70 [ 197.286716] kstrdup_const+0x48/0x60 22:56:14 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 197.286726] alloc_vfsmnt+0xe5/0x7d0 [ 197.286737] clone_mnt+0x70/0xee0 [ 197.294759] ? lock_downgrade+0x740/0x740 [ 197.294771] ? do_raw_spin_unlock+0x16b/0x260 [ 197.294783] copy_tree+0x33b/0x8a0 [ 197.294801] copy_mnt_ns+0x11c/0x8c0 [ 197.318924] ? kmem_cache_alloc+0x611/0x780 [ 197.323258] ? selinux_capable+0x36/0x40 [ 197.327339] create_new_namespaces+0xc9/0x720 [ 197.331858] ? ns_capable_common+0x12c/0x160 [ 197.336277] copy_namespaces+0x284/0x310 [ 197.340344] copy_process.part.0+0x2603/0x6a70 22:56:14 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r3 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getpgid(0x0) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{0x0, r4}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r5, 0x81}) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 197.344935] ? debug_smp_processor_id+0x1c/0x20 [ 197.349609] ? perf_trace_lock+0x109/0x500 [ 197.353930] ? check_preemption_disabled+0x3c/0x250 [ 197.358950] ? debug_smp_processor_id+0x1c/0x20 [ 197.363632] ? __cleanup_sighand+0x50/0x50 [ 197.367867] ? lock_downgrade+0x740/0x740 [ 197.372034] _do_fork+0x19e/0xce0 [ 197.372047] ? fork_idle+0x280/0x280 [ 197.372061] ? fput+0xd4/0x150 [ 197.372071] ? SyS_write+0x15e/0x230 [ 197.372083] SyS_clone+0x37/0x50 [ 197.372090] ? sys_vfork+0x30/0x30 [ 197.372101] do_syscall_64+0x1e8/0x640 [ 197.372113] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.401746] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.406946] RIP: 0033:0x45a6f9 [ 197.410154] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 197.417869] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 197.425140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 197.432411] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.439685] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 22:56:15 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 197.446964] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:15 executing program 2 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:15 executing program 4: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) getpgid(0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 197.612344] FAULT_INJECTION: forcing a failure. [ 197.612344] name failslab, interval 1, probability 0, space 0, times 0 22:56:15 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 197.693281] CPU: 0 PID: 8772 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 197.701141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 197.710507] Call Trace: [ 197.710528] dump_stack+0x142/0x197 [ 197.710552] should_fail.cold+0x10f/0x159 [ 197.717276] should_failslab+0xdb/0x130 [ 197.725380] __kmalloc_track_caller+0x2ec/0x790 [ 197.730090] ? kstrdup_const+0x48/0x60 [ 197.734001] kstrdup+0x3a/0x70 [ 197.737210] kstrdup_const+0x48/0x60 [ 197.740944] alloc_vfsmnt+0xe5/0x7d0 [ 197.744677] clone_mnt+0x70/0xee0 [ 197.748145] ? lock_downgrade+0x740/0x740 [ 197.752313] ? do_raw_spin_unlock+0x16b/0x260 [ 197.756827] copy_tree+0x33b/0x8a0 [ 197.760398] copy_mnt_ns+0x11c/0x8c0 [ 197.764125] ? kmem_cache_alloc+0x611/0x780 [ 197.768461] ? selinux_capable+0x36/0x40 [ 197.772548] create_new_namespaces+0xc9/0x720 [ 197.777058] ? ns_capable_common+0x12c/0x160 [ 197.781495] copy_namespaces+0x284/0x310 [ 197.785735] copy_process.part.0+0x2603/0x6a70 22:56:15 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 197.790599] ? perf_trace_lock+0x30d/0x500 [ 197.794845] ? perf_trace_run_bpf_submit+0x113/0x170 [ 197.799969] ? perf_trace_lock+0x30d/0x500 [ 197.804245] ? __cleanup_sighand+0x50/0x50 [ 197.808503] ? lock_downgrade+0x740/0x740 [ 197.812767] _do_fork+0x19e/0xce0 [ 197.816233] ? fork_idle+0x280/0x280 [ 197.819973] ? fput+0xd4/0x150 [ 197.823177] ? SyS_write+0x15e/0x230 [ 197.826903] SyS_clone+0x37/0x50 [ 197.830276] ? sys_vfork+0x30/0x30 [ 197.833843] do_syscall_64+0x1e8/0x640 [ 197.837741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 197.842608] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 197.847808] RIP: 0033:0x45a6f9 [ 197.851007] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 197.858758] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 197.866046] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 197.873500] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 197.880783] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 197.888059] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:15 executing program 2 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:15 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:15 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 198.074990] FAULT_INJECTION: forcing a failure. [ 198.074990] name failslab, interval 1, probability 0, space 0, times 0 [ 198.091182] CPU: 1 PID: 8810 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 198.099016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.108378] Call Trace: [ 198.110987] dump_stack+0x142/0x197 [ 198.114773] should_fail.cold+0x10f/0x159 [ 198.118936] should_failslab+0xdb/0x130 [ 198.122922] __kmalloc_track_caller+0x2ec/0x790 [ 198.127609] ? kstrdup_const+0x48/0x60 [ 198.131517] kstrdup+0x3a/0x70 [ 198.134714] kstrdup_const+0x48/0x60 [ 198.138432] alloc_vfsmnt+0xe5/0x7d0 [ 198.142153] clone_mnt+0x70/0xee0 [ 198.145611] ? lock_downgrade+0x740/0x740 [ 198.149852] ? do_raw_spin_unlock+0x16b/0x260 [ 198.154359] copy_tree+0x33b/0x8a0 [ 198.157916] copy_mnt_ns+0x11c/0x8c0 [ 198.161635] ? kmem_cache_alloc+0x611/0x780 [ 198.165977] ? selinux_capable+0x36/0x40 [ 198.170051] create_new_namespaces+0xc9/0x720 [ 198.174563] ? ns_capable_common+0x12c/0x160 [ 198.179977] copy_namespaces+0x284/0x310 [ 198.184064] copy_process.part.0+0x2603/0x6a70 [ 198.189624] ? debug_smp_processor_id+0x1c/0x20 [ 198.194314] ? perf_trace_lock+0x109/0x500 [ 198.198564] ? check_preemption_disabled+0x3c/0x250 [ 198.203654] ? debug_smp_processor_id+0x1c/0x20 [ 198.208348] ? __cleanup_sighand+0x50/0x50 [ 198.212600] ? lock_downgrade+0x740/0x740 [ 198.216774] _do_fork+0x19e/0xce0 [ 198.220247] ? fork_idle+0x280/0x280 [ 198.223971] ? fput+0xd4/0x150 [ 198.227170] ? SyS_write+0x15e/0x230 [ 198.230997] SyS_clone+0x37/0x50 [ 198.234363] ? sys_vfork+0x30/0x30 [ 198.237909] do_syscall_64+0x1e8/0x640 [ 198.241807] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.246659] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.251972] RIP: 0033:0x45a6f9 [ 198.255791] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 198.263516] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 22:56:15 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:15 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 198.270816] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 198.278193] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.285465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 198.292739] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:15 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 2 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:16 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:16 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x0) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 198.613250] FAULT_INJECTION: forcing a failure. [ 198.613250] name failslab, interval 1, probability 0, space 0, times 0 [ 198.670751] CPU: 1 PID: 8848 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 198.678582] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 198.678588] Call Trace: [ 198.678605] dump_stack+0x142/0x197 [ 198.678624] should_fail.cold+0x10f/0x159 [ 198.698410] should_failslab+0xdb/0x130 [ 198.702392] __kmalloc_track_caller+0x2ec/0x790 [ 198.707073] ? kstrdup_const+0x48/0x60 [ 198.710967] kstrdup+0x3a/0x70 [ 198.714176] kstrdup_const+0x48/0x60 [ 198.717891] alloc_vfsmnt+0xe5/0x7d0 [ 198.721610] clone_mnt+0x70/0xee0 [ 198.725069] ? lock_downgrade+0x740/0x740 [ 198.729220] ? do_raw_spin_unlock+0x16b/0x260 [ 198.733724] copy_tree+0x33b/0x8a0 [ 198.737284] copy_mnt_ns+0x11c/0x8c0 [ 198.741003] ? kmem_cache_alloc+0x611/0x780 [ 198.745331] ? selinux_capable+0x36/0x40 [ 198.749407] create_new_namespaces+0xc9/0x720 [ 198.753905] ? ns_capable_common+0x12c/0x160 [ 198.758321] copy_namespaces+0x284/0x310 [ 198.762382] copy_process.part.0+0x2603/0x6a70 [ 198.762395] ? debug_smp_processor_id+0x1c/0x20 [ 198.762407] ? perf_trace_lock+0x109/0x500 [ 198.762416] ? check_preemption_disabled+0x3c/0x250 [ 198.762430] ? debug_smp_processor_id+0x1c/0x20 [ 198.762452] ? __cleanup_sighand+0x50/0x50 [ 198.762465] ? lock_downgrade+0x740/0x740 [ 198.793942] _do_fork+0x19e/0xce0 [ 198.797392] ? fork_idle+0x280/0x280 [ 198.797407] ? fput+0xd4/0x150 [ 198.797418] ? SyS_write+0x15e/0x230 [ 198.797433] SyS_clone+0x37/0x50 [ 198.797440] ? sys_vfork+0x30/0x30 [ 198.797453] do_syscall_64+0x1e8/0x640 22:56:16 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:16 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 198.818795] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 198.823671] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 198.828862] RIP: 0033:0x45a6f9 [ 198.832048] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 198.839844] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 198.847115] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 198.854405] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 198.861677] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 198.868949] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:16 executing program 2 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:16 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:16 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 199.059566] FAULT_INJECTION: forcing a failure. [ 199.059566] name failslab, interval 1, probability 0, space 0, times 0 [ 199.113459] CPU: 1 PID: 8880 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 199.121301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.130655] Call Trace: [ 199.130674] dump_stack+0x142/0x197 [ 199.130692] should_fail.cold+0x10f/0x159 [ 199.130708] should_failslab+0xdb/0x130 [ 199.130718] kmem_cache_alloc+0x2d7/0x780 [ 199.130734] ? find_held_lock+0x35/0x130 [ 199.153259] ? copy_tree+0x4a2/0x8a0 [ 199.156977] alloc_vfsmnt+0x28/0x7d0 [ 199.160699] clone_mnt+0x70/0xee0 [ 199.164154] ? lock_downgrade+0x740/0x740 [ 199.168308] ? do_raw_spin_unlock+0x16b/0x260 [ 199.168323] copy_tree+0x33b/0x8a0 [ 199.168341] copy_mnt_ns+0x11c/0x8c0 [ 199.176357] ? kmem_cache_alloc+0x611/0x780 [ 199.176372] ? selinux_capable+0x36/0x40 [ 199.176387] create_new_namespaces+0xc9/0x720 [ 199.176399] ? ns_capable_common+0x12c/0x160 [ 199.188510] copy_namespaces+0x284/0x310 [ 199.188525] copy_process.part.0+0x2603/0x6a70 [ 199.188538] ? debug_smp_processor_id+0x1c/0x20 22:56:16 executing program 5: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 199.211111] ? perf_trace_lock+0x109/0x500 [ 199.215350] ? check_preemption_disabled+0x3c/0x250 [ 199.220378] ? debug_smp_processor_id+0x1c/0x20 [ 199.225063] ? __cleanup_sighand+0x50/0x50 [ 199.229316] ? lock_downgrade+0x740/0x740 [ 199.233475] _do_fork+0x19e/0xce0 [ 199.237532] ? fork_idle+0x280/0x280 [ 199.241250] ? fput+0xd4/0x150 [ 199.245052] ? SyS_write+0x15e/0x230 [ 199.249214] SyS_clone+0x37/0x50 [ 199.252581] ? sys_vfork+0x30/0x30 [ 199.256146] do_syscall_64+0x1e8/0x640 [ 199.260037] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 199.264888] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.270338] RIP: 0033:0x45a6f9 [ 199.273526] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 199.281262] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 199.288532] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 199.295816] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.303077] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:16 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 199.303083] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:17 executing program 2 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 5: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:17 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 199.525372] FAULT_INJECTION: forcing a failure. [ 199.525372] name failslab, interval 1, probability 0, space 0, times 0 [ 199.567020] CPU: 0 PID: 8916 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 199.574881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 199.584254] Call Trace: [ 199.586864] dump_stack+0x142/0x197 [ 199.590526] should_fail.cold+0x10f/0x159 [ 199.594880] should_failslab+0xdb/0x130 [ 199.598874] kmem_cache_alloc+0x2d7/0x780 [ 199.603037] ? find_held_lock+0x35/0x130 [ 199.607115] ? copy_tree+0x4a2/0x8a0 [ 199.610848] alloc_vfsmnt+0x28/0x7d0 [ 199.614582] clone_mnt+0x70/0xee0 [ 199.618046] ? lock_downgrade+0x740/0x740 [ 199.622210] ? do_raw_spin_unlock+0x16b/0x260 [ 199.626725] copy_tree+0x33b/0x8a0 [ 199.630301] copy_mnt_ns+0x11c/0x8c0 [ 199.634021] ? kmem_cache_alloc+0x611/0x780 [ 199.638354] ? selinux_capable+0x36/0x40 [ 199.642443] create_new_namespaces+0xc9/0x720 [ 199.648691] ? ns_capable_common+0x12c/0x160 [ 199.653153] copy_namespaces+0x284/0x310 [ 199.657237] copy_process.part.0+0x2603/0x6a70 [ 199.662013] ? perf_trace_lock+0x30d/0x500 [ 199.666263] ? perf_trace_run_bpf_submit+0x113/0x170 [ 199.671436] ? perf_trace_lock+0x30d/0x500 [ 199.675707] ? __cleanup_sighand+0x50/0x50 [ 199.679957] ? lock_downgrade+0x740/0x740 [ 199.684139] _do_fork+0x19e/0xce0 [ 199.687623] ? fork_idle+0x280/0x280 [ 199.691360] ? fput+0xd4/0x150 [ 199.694575] ? SyS_write+0x15e/0x230 [ 199.698315] SyS_clone+0x37/0x50 [ 199.701690] ? sys_vfork+0x30/0x30 [ 199.705348] do_syscall_64+0x1e8/0x640 [ 199.709248] ? trace_hardirqs_off_thunk+0x1a/0x1c 22:56:17 executing program 5: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:17 executing program 0: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 0: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 199.714114] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 199.719335] RIP: 0033:0x45a6f9 [ 199.722536] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 199.730260] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 199.737634] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 199.744919] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 199.752195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 199.759481] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:17 executing program 2 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:17 executing program 0: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 5: request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:17 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.020264] FAULT_INJECTION: forcing a failure. [ 200.020264] name failslab, interval 1, probability 0, space 0, times 0 [ 200.037810] CPU: 1 PID: 8956 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 200.045660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.055019] Call Trace: [ 200.057616] dump_stack+0x142/0x197 [ 200.061265] should_fail.cold+0x10f/0x159 [ 200.065427] should_failslab+0xdb/0x130 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.069410] kmem_cache_alloc+0x2d7/0x780 [ 200.073572] ? find_held_lock+0x35/0x130 [ 200.077640] ? copy_tree+0x4a2/0x8a0 [ 200.081368] alloc_vfsmnt+0x28/0x7d0 [ 200.085110] clone_mnt+0x70/0xee0 [ 200.088573] ? lock_downgrade+0x740/0x740 [ 200.092761] ? do_raw_spin_unlock+0x16b/0x260 [ 200.097268] copy_tree+0x33b/0x8a0 [ 200.100809] copy_mnt_ns+0x11c/0x8c0 [ 200.100819] ? kmem_cache_alloc+0x611/0x780 [ 200.100831] ? selinux_capable+0x36/0x40 [ 200.100846] create_new_namespaces+0xc9/0x720 [ 200.100858] ? ns_capable_common+0x12c/0x160 [ 200.100870] copy_namespaces+0x284/0x310 [ 200.100885] copy_process.part.0+0x2603/0x6a70 [ 200.117439] ? debug_smp_processor_id+0x1c/0x20 [ 200.117452] ? perf_trace_lock+0x109/0x500 [ 200.117461] ? check_preemption_disabled+0x3c/0x250 [ 200.144650] ? debug_smp_processor_id+0x1c/0x20 [ 200.149343] ? __cleanup_sighand+0x50/0x50 [ 200.153583] ? lock_downgrade+0x740/0x740 [ 200.157745] _do_fork+0x19e/0xce0 [ 200.161206] ? fork_idle+0x280/0x280 [ 200.164930] ? fput+0xd4/0x150 [ 200.168122] ? SyS_write+0x15e/0x230 [ 200.171846] SyS_clone+0x37/0x50 [ 200.175209] ? sys_vfork+0x30/0x30 [ 200.178757] do_syscall_64+0x1e8/0x640 [ 200.182645] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.187499] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.192693] RIP: 0033:0x45a6f9 [ 200.195883] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 200.204307] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 200.211573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 5: request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:17 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.211579] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.211584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 200.211589] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:17 executing program 2 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:17 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:17 executing program 5: request_key(0x0, &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:18 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.405979] FAULT_INJECTION: forcing a failure. [ 200.405979] name failslab, interval 1, probability 0, space 0, times 0 22:56:18 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.482873] CPU: 1 PID: 8979 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 200.490712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 200.500069] Call Trace: [ 200.502673] dump_stack+0x142/0x197 [ 200.506319] should_fail.cold+0x10f/0x159 [ 200.509442] kauditd_printk_skb: 75 callbacks suppressed [ 200.509451] audit: type=1804 audit(1575759378.095:372): pid=8993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/94/file0" dev="sda1" ino=16760 res=1 [ 200.510513] should_failslab+0xdb/0x130 [ 200.510527] kmem_cache_alloc+0x2d7/0x780 [ 200.510543] ? find_held_lock+0x35/0x130 [ 200.510556] ? copy_tree+0x4a2/0x8a0 [ 200.510570] alloc_vfsmnt+0x28/0x7d0 [ 200.510583] clone_mnt+0x70/0xee0 [ 200.510592] ? lock_downgrade+0x740/0x740 [ 200.510602] ? do_raw_spin_unlock+0x16b/0x260 [ 200.510616] copy_tree+0x33b/0x8a0 [ 200.563032] audit: type=1804 audit(1575759378.155:373): pid=8985 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/98/file0" dev="sda1" ino=16688 res=1 [ 200.563168] copy_mnt_ns+0x11c/0x8c0 [ 200.609664] ? kmem_cache_alloc+0x611/0x780 [ 200.614016] ? selinux_capable+0x36/0x40 [ 200.618093] create_new_namespaces+0xc9/0x720 [ 200.622604] ? ns_capable_common+0x12c/0x160 [ 200.627030] copy_namespaces+0x284/0x310 22:56:18 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.628882] audit: type=1804 audit(1575759378.215:374): pid=8994 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.3" name="/root/syzkaller-testdir392968819/syzkaller.zM4p6h/106/file0" dev="sda1" ino=16767 res=1 [ 200.631113] copy_process.part.0+0x2603/0x6a70 [ 200.631129] ? perf_trace_lock+0x30d/0x500 [ 200.631141] ? perf_trace_run_bpf_submit+0x113/0x170 [ 200.631155] ? perf_trace_lock+0x30d/0x500 [ 200.631174] ? __cleanup_sighand+0x50/0x50 [ 200.631184] ? lock_downgrade+0x740/0x740 [ 200.631199] _do_fork+0x19e/0xce0 [ 200.631212] ? fork_idle+0x280/0x280 [ 200.631226] ? fput+0xd4/0x150 [ 200.631234] ? SyS_write+0x15e/0x230 [ 200.631247] SyS_clone+0x37/0x50 [ 200.631253] ? sys_vfork+0x30/0x30 [ 200.631266] do_syscall_64+0x1e8/0x640 [ 200.709799] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 200.714655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 200.719850] RIP: 0033:0x45a6f9 [ 200.723038] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 22:56:18 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 5: request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffff9) 22:56:18 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.730756] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 200.738028] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 200.745308] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 200.752591] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 200.759866] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 200.834555] audit: type=1804 audit(1575759378.425:375): pid=9004 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/99/file0" dev="sda1" ino=16743 res=1 22:56:18 executing program 2 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:18 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 5: request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffff9) 22:56:18 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 200.897965] audit: type=1804 audit(1575759378.465:376): pid=9006 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/133/file0" dev="sda1" ino=16688 res=1 [ 201.010323] audit: type=1804 audit(1575759378.595:377): pid=9019 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/134/file0" dev="sda1" ino=16765 res=1 [ 201.020840] FAULT_INJECTION: forcing a failure. [ 201.020840] name failslab, interval 1, probability 0, space 0, times 0 22:56:18 executing program 5: request_key(&(0x7f00000001c0)='dns_resolver\x00', 0x0, 0x0, 0xfffffffffffffff9) 22:56:18 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.069254] audit: type=1804 audit(1575759378.655:378): pid=9021 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/95/file0" dev="sda1" ino=16766 res=1 22:56:18 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:18 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.149887] CPU: 1 PID: 9022 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 201.157735] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.167197] Call Trace: [ 201.169795] dump_stack+0x142/0x197 [ 201.173527] should_fail.cold+0x10f/0x159 [ 201.177688] should_failslab+0xdb/0x130 [ 201.181670] __kmalloc_track_caller+0x2ec/0x790 [ 201.186457] ? kstrdup_const+0x48/0x60 [ 201.190440] kstrdup+0x3a/0x70 [ 201.194160] kstrdup_const+0x48/0x60 22:56:18 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.197883] alloc_vfsmnt+0xe5/0x7d0 [ 201.201602] clone_mnt+0x70/0xee0 [ 201.205062] ? lock_downgrade+0x740/0x740 [ 201.209513] ? do_raw_spin_unlock+0x16b/0x260 [ 201.214022] copy_tree+0x33b/0x8a0 [ 201.217603] copy_mnt_ns+0x11c/0x8c0 [ 201.221322] ? kmem_cache_alloc+0x611/0x780 [ 201.225649] ? selinux_capable+0x36/0x40 [ 201.229723] create_new_namespaces+0xc9/0x720 [ 201.234233] ? ns_capable_common+0x12c/0x160 [ 201.238655] copy_namespaces+0x284/0x310 [ 201.243008] copy_process.part.0+0x2603/0x6a70 22:56:18 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.247624] ? perf_trace_lock+0x30d/0x500 [ 201.251869] ? perf_trace_run_bpf_submit+0x113/0x170 [ 201.256991] ? perf_trace_lock+0x30d/0x500 [ 201.261936] ? __cleanup_sighand+0x50/0x50 [ 201.266182] ? lock_downgrade+0x740/0x740 [ 201.270342] _do_fork+0x19e/0xce0 [ 201.273826] ? fork_idle+0x280/0x280 [ 201.275113] audit: type=1804 audit(1575759378.655:379): pid=9023 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/100/file0" dev="sda1" ino=16767 res=1 [ 201.277540] ? fput+0xd4/0x150 [ 201.277552] ? SyS_write+0x15e/0x230 [ 201.277567] SyS_clone+0x37/0x50 [ 201.277575] ? sys_vfork+0x30/0x30 [ 201.277589] do_syscall_64+0x1e8/0x640 [ 201.322389] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.327252] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.332477] RIP: 0033:0x45a6f9 [ 201.335689] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 201.343410] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 201.350688] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 201.357970] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.365277] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 201.372587] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 201.453613] audit: type=1804 audit(1575759378.795:380): pid=9031 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/101/file0" dev="sda1" ino=16760 res=1 22:56:19 executing program 2 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:19 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.484796] audit: type=1804 audit(1575759378.815:381): pid=9032 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/135/file0" dev="sda1" ino=16767 res=1 [ 201.569150] FAULT_INJECTION: forcing a failure. [ 201.569150] name failslab, interval 1, probability 0, space 0, times 0 [ 201.585463] CPU: 1 PID: 9055 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 201.593294] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 201.602782] Call Trace: [ 201.605382] dump_stack+0x142/0x197 [ 201.609036] should_fail.cold+0x10f/0x159 [ 201.613197] should_failslab+0xdb/0x130 [ 201.617181] __kmalloc_track_caller+0x2ec/0x790 [ 201.621864] ? kstrdup_const+0x48/0x60 [ 201.625759] kstrdup+0x3a/0x70 [ 201.628956] kstrdup_const+0x48/0x60 [ 201.632673] alloc_vfsmnt+0xe5/0x7d0 [ 201.636398] clone_mnt+0x70/0xee0 [ 201.639855] ? lock_downgrade+0x740/0x740 [ 201.644009] ? do_raw_spin_unlock+0x16b/0x260 [ 201.644024] copy_tree+0x33b/0x8a0 [ 201.644042] copy_mnt_ns+0x11c/0x8c0 [ 201.652054] ? kmem_cache_alloc+0x611/0x780 [ 201.652068] ? selinux_capable+0x36/0x40 [ 201.652085] create_new_namespaces+0xc9/0x720 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.652095] ? ns_capable_common+0x12c/0x160 [ 201.652108] copy_namespaces+0x284/0x310 [ 201.652121] copy_process.part.0+0x2603/0x6a70 [ 201.652133] ? debug_smp_processor_id+0x1c/0x20 [ 201.652145] ? perf_trace_lock+0x109/0x500 [ 201.652153] ? check_preemption_disabled+0x3c/0x250 [ 201.652165] ? debug_smp_processor_id+0x1c/0x20 [ 201.652185] ? __cleanup_sighand+0x50/0x50 [ 201.704797] ? lock_downgrade+0x740/0x740 [ 201.708961] _do_fork+0x19e/0xce0 [ 201.712428] ? fork_idle+0x280/0x280 [ 201.716185] ? fput+0xd4/0x150 [ 201.719415] ? SyS_write+0x15e/0x230 [ 201.723141] SyS_clone+0x37/0x50 [ 201.726510] ? sys_vfork+0x30/0x30 [ 201.730055] do_syscall_64+0x1e8/0x640 [ 201.733947] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 201.738810] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 201.744005] RIP: 0033:0x45a6f9 [ 201.747219] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 201.754957] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 201.762231] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:19 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 201.769504] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 201.776780] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 201.784060] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 2 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:19 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) ftruncate(0xffffffffffffffff, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.040273] FAULT_INJECTION: forcing a failure. [ 202.040273] name failslab, interval 1, probability 0, space 0, times 0 [ 202.052223] CPU: 0 PID: 9086 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 202.060315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.069677] Call Trace: [ 202.069700] dump_stack+0x142/0x197 [ 202.069727] should_fail.cold+0x10f/0x159 [ 202.080083] should_failslab+0xdb/0x130 [ 202.080099] __kmalloc_track_caller+0x2ec/0x790 [ 202.080120] ? kstrdup_const+0x48/0x60 [ 202.093256] kstrdup+0x3a/0x70 [ 202.096473] kstrdup_const+0x48/0x60 [ 202.100196] alloc_vfsmnt+0xe5/0x7d0 [ 202.100212] clone_mnt+0x70/0xee0 [ 202.100226] ? lock_downgrade+0x740/0x740 [ 202.111542] ? do_raw_spin_unlock+0x16b/0x260 [ 202.116093] copy_tree+0x33b/0x8a0 [ 202.119669] copy_mnt_ns+0x11c/0x8c0 [ 202.123418] ? kmem_cache_alloc+0x611/0x780 [ 202.128110] ? selinux_capable+0x36/0x40 [ 202.132203] create_new_namespaces+0xc9/0x720 [ 202.136720] ? ns_capable_common+0x12c/0x160 [ 202.141152] copy_namespaces+0x284/0x310 [ 202.145242] copy_process.part.0+0x2603/0x6a70 [ 202.149849] ? perf_trace_lock+0x30d/0x500 [ 202.154101] ? perf_trace_run_bpf_submit+0x113/0x170 [ 202.159225] ? perf_trace_lock+0x30d/0x500 [ 202.163501] ? __cleanup_sighand+0x50/0x50 [ 202.167753] ? lock_downgrade+0x740/0x740 [ 202.171930] _do_fork+0x19e/0xce0 [ 202.175407] ? fork_idle+0x280/0x280 [ 202.179144] ? fput+0xd4/0x150 [ 202.182350] ? SyS_write+0x15e/0x230 [ 202.182372] SyS_clone+0x37/0x50 22:56:19 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.182384] ? sys_vfork+0x30/0x30 [ 202.193000] do_syscall_64+0x1e8/0x640 [ 202.196911] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.201783] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.207000] RIP: 0033:0x45a6f9 [ 202.207008] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 202.207024] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 202.207033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 202.207041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.207048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 202.207057] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:19 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:19 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 2 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:20 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.538320] FAULT_INJECTION: forcing a failure. [ 202.538320] name failslab, interval 1, probability 0, space 0, times 0 [ 202.559571] CPU: 0 PID: 9126 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 202.568319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 202.577716] Call Trace: [ 202.580454] dump_stack+0x142/0x197 [ 202.584117] should_fail.cold+0x10f/0x159 [ 202.588301] should_failslab+0xdb/0x130 [ 202.592299] __kmalloc_track_caller+0x2ec/0x790 [ 202.596993] ? kstrdup_const+0x48/0x60 [ 202.600923] kstrdup+0x3a/0x70 [ 202.604138] kstrdup_const+0x48/0x60 [ 202.607865] alloc_vfsmnt+0xe5/0x7d0 [ 202.611596] clone_mnt+0x70/0xee0 [ 202.615062] ? lock_downgrade+0x740/0x740 [ 202.619230] ? do_raw_spin_unlock+0x16b/0x260 [ 202.623772] copy_tree+0x33b/0x8a0 [ 202.627354] copy_mnt_ns+0x11c/0x8c0 [ 202.631077] ? kmem_cache_alloc+0x611/0x780 [ 202.635418] ? selinux_capable+0x36/0x40 [ 202.639512] create_new_namespaces+0xc9/0x720 [ 202.644034] ? ns_capable_common+0x12c/0x160 [ 202.648468] copy_namespaces+0x284/0x310 [ 202.652553] copy_process.part.0+0x2603/0x6a70 [ 202.657156] ? debug_smp_processor_id+0x1c/0x20 [ 202.661873] ? perf_trace_lock+0x109/0x500 [ 202.666123] ? check_preemption_disabled+0x3c/0x250 [ 202.671161] ? debug_smp_processor_id+0x1c/0x20 [ 202.671194] ? __cleanup_sighand+0x50/0x50 [ 202.671212] ? lock_downgrade+0x740/0x740 [ 202.684289] _do_fork+0x19e/0xce0 22:56:20 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.687767] ? fork_idle+0x280/0x280 [ 202.691490] ? fput+0xd4/0x150 [ 202.691505] ? SyS_write+0x15e/0x230 [ 202.691527] SyS_clone+0x37/0x50 [ 202.702656] ? sys_vfork+0x30/0x30 [ 202.706221] do_syscall_64+0x1e8/0x640 [ 202.710128] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 202.715011] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 202.720309] RIP: 0033:0x45a6f9 [ 202.723513] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 202.731568] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 22:56:20 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.738955] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 202.746539] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 202.754303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 202.761586] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:20 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 2 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:20 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 202.951437] FAULT_INJECTION: forcing a failure. [ 202.951437] name failslab, interval 1, probability 0, space 0, times 0 22:56:20 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 203.019938] CPU: 0 PID: 9150 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 203.027817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.037541] Call Trace: [ 203.040155] dump_stack+0x142/0x197 [ 203.043824] should_fail.cold+0x10f/0x159 [ 203.047999] should_failslab+0xdb/0x130 [ 203.052084] __kmalloc_track_caller+0x2ec/0x790 [ 203.056789] ? kstrdup_const+0x48/0x60 [ 203.060702] kstrdup+0x3a/0x70 [ 203.063942] kstrdup_const+0x48/0x60 [ 203.067677] alloc_vfsmnt+0xe5/0x7d0 [ 203.071416] clone_mnt+0x70/0xee0 [ 203.074887] ? lock_downgrade+0x740/0x740 [ 203.079055] ? do_raw_spin_unlock+0x16b/0x260 [ 203.083570] copy_tree+0x33b/0x8a0 [ 203.087139] copy_mnt_ns+0x11c/0x8c0 [ 203.090862] ? kmem_cache_alloc+0x611/0x780 [ 203.095203] ? selinux_capable+0x36/0x40 [ 203.099287] create_new_namespaces+0xc9/0x720 [ 203.103801] ? ns_capable_common+0x12c/0x160 [ 203.108233] copy_namespaces+0x284/0x310 [ 203.112316] copy_process.part.0+0x2603/0x6a70 [ 203.116915] ? perf_trace_lock+0x30d/0x500 [ 203.121171] ? perf_trace_run_bpf_submit+0x113/0x170 [ 203.126300] ? perf_trace_lock+0x30d/0x500 [ 203.130568] ? __cleanup_sighand+0x50/0x50 [ 203.134812] ? lock_downgrade+0x740/0x740 [ 203.138997] _do_fork+0x19e/0xce0 [ 203.142469] ? fork_idle+0x280/0x280 [ 203.146203] ? fput+0xd4/0x150 [ 203.149413] ? SyS_write+0x15e/0x230 [ 203.153167] SyS_clone+0x37/0x50 [ 203.156547] ? sys_vfork+0x30/0x30 [ 203.160107] do_syscall_64+0x1e8/0x640 [ 203.163999] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.168859] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.174061] RIP: 0033:0x45a6f9 [ 203.177261] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 203.185081] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 203.185090] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 203.185096] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.185102] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 22:56:20 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 203.185109] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:20 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) socket$inet(0x2, 0x1, 0x0) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:20 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 2 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:21 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 3: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 5: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 203.536896] FAULT_INJECTION: forcing a failure. [ 203.536896] name failslab, interval 1, probability 0, space 0, times 0 22:56:21 executing program 3 (fault-call:0 fault-nth:0): request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 203.609558] CPU: 0 PID: 9195 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 203.617431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.626813] Call Trace: [ 203.629430] dump_stack+0x142/0x197 [ 203.633108] should_fail.cold+0x10f/0x159 [ 203.637296] should_failslab+0xdb/0x130 [ 203.641309] __kmalloc_track_caller+0x2ec/0x790 [ 203.646009] ? kstrdup_const+0x48/0x60 [ 203.647463] FAULT_INJECTION: forcing a failure. [ 203.647463] name failslab, interval 1, probability 0, space 0, times 0 [ 203.649926] kstrdup+0x3a/0x70 [ 203.649947] kstrdup_const+0x48/0x60 [ 203.668026] alloc_vfsmnt+0xe5/0x7d0 [ 203.671750] clone_mnt+0x70/0xee0 [ 203.675195] ? lock_downgrade+0x740/0x740 [ 203.679333] ? do_raw_spin_unlock+0x16b/0x260 [ 203.683923] copy_tree+0x33b/0x8a0 [ 203.687584] copy_mnt_ns+0x11c/0x8c0 [ 203.691293] ? kmem_cache_alloc+0x611/0x780 [ 203.695617] ? selinux_capable+0x36/0x40 [ 203.699702] create_new_namespaces+0xc9/0x720 [ 203.704214] ? ns_capable_common+0x12c/0x160 [ 203.708706] copy_namespaces+0x284/0x310 [ 203.712763] copy_process.part.0+0x2603/0x6a70 [ 203.717347] ? perf_trace_lock+0x30d/0x500 [ 203.721582] ? perf_trace_run_bpf_submit+0x113/0x170 [ 203.726692] ? perf_trace_lock+0x30d/0x500 [ 203.730948] ? __cleanup_sighand+0x50/0x50 [ 203.735187] ? lock_downgrade+0x740/0x740 [ 203.739332] _do_fork+0x19e/0xce0 [ 203.742779] ? fork_idle+0x280/0x280 [ 203.746486] ? fput+0xd4/0x150 [ 203.749668] ? SyS_write+0x15e/0x230 [ 203.753399] SyS_clone+0x37/0x50 [ 203.756753] ? sys_vfork+0x30/0x30 [ 203.760289] do_syscall_64+0x1e8/0x640 [ 203.764166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.769004] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.774182] RIP: 0033:0x45a6f9 [ 203.777356] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 203.785316] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 203.792573] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 203.799829] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.807088] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 203.814344] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 203.821671] CPU: 1 PID: 9200 Comm: syz-executor.3 Not tainted 4.14.158-syzkaller #0 [ 203.829482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 203.838840] Call Trace: [ 203.841431] dump_stack+0x142/0x197 [ 203.845067] should_fail.cold+0x10f/0x159 [ 203.849227] should_failslab+0xdb/0x130 [ 203.853210] __kmalloc_track_caller+0x2ec/0x790 22:56:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 5 (fault-call:2 fault-nth:0): r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 3 (fault-call:0 fault-nth:1): request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 203.857886] ? __check_object_size+0x13b/0x2ac [ 203.862472] ? strndup_user+0x62/0xf0 [ 203.866272] memdup_user+0x26/0xa0 [ 203.869821] strndup_user+0x62/0xf0 [ 203.873460] SyS_request_key+0x8c/0x2c0 [ 203.873471] ? SyS_add_key+0x350/0x350 [ 203.873484] ? SyS_add_key+0x350/0x350 [ 203.881325] do_syscall_64+0x1e8/0x640 [ 203.881334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 203.881351] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 203.881359] RIP: 0033:0x45a6f9 [ 203.881364] RSP: 002b:00007f7c63703c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 22:56:21 executing program 2 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:21 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 203.881375] RAX: ffffffffffffffda RBX: 00007f7c63703c90 RCX: 000000000045a6f9 [ 203.881380] RDX: 0000000000000000 RSI: 00000000200003c0 RDI: 00000000200001c0 [ 203.881386] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 203.881392] R10: fffffffffffffff9 R11: 0000000000000246 R12: 00007f7c637046d4 [ 203.881398] R13: 00000000004c8e25 R14: 00000000004e0818 R15: 0000000000000003 22:56:21 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x7, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000000)) [ 204.023458] FAULT_INJECTION: forcing a failure. [ 204.023458] name failslab, interval 1, probability 0, space 0, times 0 [ 204.059237] CPU: 0 PID: 9214 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 204.067095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.076461] Call Trace: [ 204.079094] dump_stack+0x142/0x197 [ 204.082754] should_fail.cold+0x10f/0x159 [ 204.086939] should_failslab+0xdb/0x130 [ 204.090932] kmem_cache_alloc+0x2d7/0x780 [ 204.095102] ? find_held_lock+0x35/0x130 [ 204.099183] ? copy_tree+0x4a2/0x8a0 [ 204.102921] alloc_vfsmnt+0x28/0x7d0 [ 204.106653] clone_mnt+0x70/0xee0 [ 204.110115] ? lock_downgrade+0x740/0x740 [ 204.114274] ? do_raw_spin_unlock+0x16b/0x260 [ 204.118785] copy_tree+0x33b/0x8a0 22:56:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000340)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce003d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x2c5, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000000)="1d", 0x1, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r3 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000640)="f4e53b250dbde00370499386e7fb84cb87161f10b1081f574a288e133b52b3cd83c21314990e9cac890cf2310ba35e546b45fa994ed4ad849ac1736e0bce06f6f6157a92ed8250dacba5552a6bbddddc279d69bd090fb56bdd4ba39c5482ff02bbf5ed47fd88ebab449c00659d177c13f7f010f138e7f0923cb21dbb0ff0f6c7082624bc85df928e45765d", 0x8b, r2) r4 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r4, 0xc08c5335, &(0x7f0000000040)={0x0, 0x0, 0x0, 'queue0\x00'}) keyctl$dh_compute(0x17, &(0x7f0000000140)={r3, r0, r1}, &(0x7f0000000440)=""/243, 0xffffffffffffffa5, &(0x7f0000000240)={&(0x7f0000000600)={'sha3-224\x00'}}) sendto$netrom(r4, &(0x7f0000000300)="2b92788022cce34b6cc5b64509259c2f006dab860718f41eac7e2b150bdc5aa39f89d2657cac1eef31091db3ef0eefd3", 0x30, 0x2545a0ee552d4566, &(0x7f0000000540)={{0x3, @bcast, 0x5}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @null, @default, @default, @default, @null]}, 0x48) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) r6 = syz_open_procfs(r5, &(0x7f0000000400)='net/rt_cache\x00') r7 = socket$inet6_sctp(0xa, 0x5, 0x84) r8 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000000)=0x80f806766c7df7b9) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f00000002c0)={r9}, 0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000700)={r9, 0x8000}, &(0x7f0000000740)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r6, 0x84, 0x22, &(0x7f0000000780)={0x8, 0x8002, 0x8, 0x81, r10}, 0x10) write$vhci(0xffffffffffffffff, &(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, "90403e3088f0eb29926e67cb983472406229be3fe6c76fdba825c51aa21e23e98a28bf35c97204fff1e9c17c1607eda073cc9acdc8c575744a19a3ce768bfd421b487b2830e4b4bf7c41699866bb8e351ced39565b181569475b64f012eef9506e2d7fd6265d02cd94e3a20215be78aac28efbf5ea046154a7a14c632d3d0151b6e781b6c7afb34be991aa7478c21e7c07771989c3958e57f9f4071a2f03d0f34ed3c0be8361c999163a0bc3e3d0010404f0a1e091445573ea1347eddee8415ba92b55cd7b6521291d2631500a25"}, 0xcf) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0x0) 22:56:21 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x9, 0xa5, 0x7, 0x200, 0x1, 0x1, [], 0x0, 0xffffffffffffffff, 0x4, 0x5}, 0x3c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) socket$inet(0x2, 0x4, 0x20) [ 204.122356] copy_mnt_ns+0x11c/0x8c0 [ 204.126080] ? kmem_cache_alloc+0x611/0x780 [ 204.130416] ? selinux_capable+0x36/0x40 [ 204.134500] create_new_namespaces+0xc9/0x720 [ 204.139007] ? ns_capable_common+0x12c/0x160 [ 204.143441] copy_namespaces+0x284/0x310 [ 204.147610] copy_process.part.0+0x2603/0x6a70 [ 204.152212] ? perf_trace_lock+0x30d/0x500 [ 204.156460] ? perf_trace_run_bpf_submit+0x113/0x170 [ 204.161580] ? perf_trace_lock+0x30d/0x500 [ 204.165860] ? __cleanup_sighand+0x50/0x50 [ 204.170115] ? lock_downgrade+0x740/0x740 [ 204.174281] _do_fork+0x19e/0xce0 [ 204.174303] ? fork_idle+0x280/0x280 [ 204.174322] ? fput+0xd4/0x150 [ 204.184653] ? SyS_write+0x15e/0x230 [ 204.184678] SyS_clone+0x37/0x50 [ 204.184691] ? sys_vfork+0x30/0x30 [ 204.191763] do_syscall_64+0x1e8/0x640 [ 204.191776] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.191802] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.191813] RIP: 0033:0x45a6f9 [ 204.191820] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 22:56:21 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 3: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x10, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="4caed551f81bdb72b11fc5df60791afb4a33937808c8bfc23cd333a6ebf5d732468e1fac0da84d33c6800e920259f35eeab8d81bf058ec5da8ef8b3d3474043f0afdf523e4f94a21fefea8364bb37419f09796c1c57c27eade21aed38bae3333c295413f13c900a02244430c001bb5d72eeae3ae44e4e50b184dd7a8686589dafb6d1c12eb696e218f43f8e7391908192aa78e68ea0e3d3dc7b81cacf8bfa165b01d2cfa6ccf81e0dffa34f2f950213a71b97aab09b602ce7bd98811302d553e2608abd74b2035c36e2ac0badd84277c1e3ba80f795f22a358b3c997ebbc41482172701e4ca362c44b72e9eac0da876a8ef1883c3801494543cfd83d", 0xfc, 0x6}, {&(0x7f0000000200)="fc99c613711b89e94b80cdb2266ddaa850ddcddb8f745c99c6a91bcb68643ffa04aff0aa6c58d93f4936f361cee105bf2f23d50ee49e573b28ca830753be9c13efaa752097ceeabca4ef04e34172038cf0ea2d57505cd38814413ddaceef129ce21c85ee", 0x64, 0x1000}], 0x10, &(0x7f0000000300)={[{@file_umask={'file_umask', 0x3d, 0x1}}, {@type={'type', 0x3d, "b448f72c"}}, {@file_umask={'file_umask', 0x3d, 0x80000001}}, {@uid={'uid', 0x3d, r0}}], [{@measure='measure'}, {@fsuuid={'fsuuid', 0x3d, {[0x5, 0x62, 0x66, 0x39, 0x30, 0x0, 0x0, 0x31], 0x2d, [0x35, 0x39, 0x32, 0x30], 0x2d, [0x61, 0x6, 0x35, 0x30], 0x2d, [0x36, 0x31, 0x35, 0xdb11e81398a47c83], 0x2d, [0x36, 0x65, 0x66, 0x31, 0x30, 0x38, 0x0, 0x62]}}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 204.199226] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 204.199234] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 204.199242] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.199250] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 204.199258] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:21 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:21 executing program 2 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) getsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000000), &(0x7f0000000040)=0xb) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 1: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 204.452344] FAULT_INJECTION: forcing a failure. [ 204.452344] name failslab, interval 1, probability 0, space 0, times 0 22:56:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) pipe(&(0x7f0000000000)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RAUTH(r3, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x1, 0x7}}, 0x14) [ 204.531897] hfs: type requires a 4 character value [ 204.549584] hfs: unable to parse mount options [ 204.571538] CPU: 1 PID: 9252 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 204.579555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 204.588919] Call Trace: [ 204.591510] dump_stack+0x142/0x197 [ 204.595149] should_fail.cold+0x10f/0x159 [ 204.599298] should_failslab+0xdb/0x130 [ 204.603264] kmem_cache_alloc+0x2d7/0x780 [ 204.607402] ? find_held_lock+0x35/0x130 [ 204.611456] ? copy_tree+0x4a2/0x8a0 [ 204.615157] alloc_vfsmnt+0x28/0x7d0 [ 204.618857] clone_mnt+0x70/0xee0 [ 204.622320] ? lock_downgrade+0x740/0x740 [ 204.626452] ? do_raw_spin_unlock+0x16b/0x260 [ 204.630935] copy_tree+0x33b/0x8a0 [ 204.634466] copy_mnt_ns+0x11c/0x8c0 [ 204.638159] ? kmem_cache_alloc+0x611/0x780 [ 204.642465] ? selinux_capable+0x36/0x40 [ 204.646513] create_new_namespaces+0xc9/0x720 [ 204.651361] ? ns_capable_common+0x12c/0x160 [ 204.655775] copy_namespaces+0x284/0x310 [ 204.659831] copy_process.part.0+0x2603/0x6a70 [ 204.664412] ? debug_smp_processor_id+0x1c/0x20 [ 204.669065] ? perf_trace_lock+0x109/0x500 [ 204.673282] ? check_preemption_disabled+0x3c/0x250 [ 204.678297] ? debug_smp_processor_id+0x1c/0x20 [ 204.682959] ? __cleanup_sighand+0x50/0x50 [ 204.687177] ? lock_downgrade+0x740/0x740 [ 204.691311] _do_fork+0x19e/0xce0 [ 204.694762] ? fork_idle+0x280/0x280 [ 204.698479] ? fput+0xd4/0x150 [ 204.701671] ? SyS_write+0x15e/0x230 [ 204.705394] SyS_clone+0x37/0x50 [ 204.708766] ? sys_vfork+0x30/0x30 [ 204.712298] do_syscall_64+0x1e8/0x640 [ 204.716186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 204.721040] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 204.726219] RIP: 0033:0x45a6f9 [ 204.729431] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 204.737132] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 204.744406] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 204.751662] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 204.758918] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 204.766169] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:22 executing program 1: r0 = open(0x0, 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 204.795776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=359 sclass=netlink_route_socket pig=9273 comm=syz-executor.5 22:56:22 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000080)=ANY=[@ANYBLOB="e00000020027c85723c096c901"], 0x10) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) r2 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000140)={0x3f, 0x8000, 0xc0000000, 0x200, 0x1b, 0x5, 0x3f, 0x45, 0xffffffc1, 0x10000, 0xcd, 0x1}) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000180)=ANY=[@ANYBLOB="e000bc02f525c857986fe21323f696010067ca00bf4de1a916"], 0x10) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000000c0)=0x800, 0x4) 22:56:22 executing program 3: request_key(&(0x7f0000000000)='dnsF\x03\x00\x00S\x04i\x99An\xce`\xfd\nU\x0e\x86\xfb\a\xf1_GT\x85\v\xc5\x9f\to!\xb3\xe8\x8d\\9$\x02\x82\x8b\xa5\xab\xdcH*o\xc1\xc50x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 2 (fault-call:1 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:22 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000000)={0x3, 0x0, @pic={0x3, 0xfa, 0xff, 0x81, 0x92, 0xfb, 0xfa, 0x6c, 0xad, 0x9, 0x1, 0x3, 0x6, 0xff, 0x8, 0x9}}) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:22 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_BT_DEFER_SETUP(r3, 0x112, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.059420] FAULT_INJECTION: forcing a failure. [ 205.059420] name failslab, interval 1, probability 0, space 0, times 0 22:56:22 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.136095] CPU: 1 PID: 9301 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 205.144990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.157068] Call Trace: [ 205.159956] dump_stack+0x142/0x197 [ 205.163602] should_fail.cold+0x10f/0x159 [ 205.168110] should_failslab+0xdb/0x130 [ 205.173668] __kmalloc_track_caller+0x2ec/0x790 [ 205.180526] ? kstrdup_const+0x48/0x60 [ 205.185038] kstrdup+0x3a/0x70 [ 205.189407] kstrdup_const+0x48/0x60 [ 205.193382] alloc_vfsmnt+0xe5/0x7d0 [ 205.197102] clone_mnt+0x70/0xee0 [ 205.200669] ? lock_downgrade+0x740/0x740 [ 205.204999] ? do_raw_spin_unlock+0x16b/0x260 [ 205.209500] copy_tree+0x33b/0x8a0 [ 205.213051] copy_mnt_ns+0x11c/0x8c0 [ 205.216882] ? kmem_cache_alloc+0x611/0x780 [ 205.221211] ? selinux_capable+0x36/0x40 [ 205.225544] create_new_namespaces+0xc9/0x720 [ 205.230052] ? ns_capable_common+0x12c/0x160 [ 205.235173] copy_namespaces+0x284/0x310 [ 205.241430] copy_process.part.0+0x2603/0x6a70 [ 205.246055] ? debug_smp_processor_id+0x1c/0x20 [ 205.250732] ? perf_trace_lock+0x109/0x500 [ 205.254971] ? check_preemption_disabled+0x3c/0x250 [ 205.260623] ? debug_smp_processor_id+0x1c/0x20 [ 205.265294] ? __cleanup_sighand+0x50/0x50 [ 205.269517] ? lock_downgrade+0x740/0x740 [ 205.274018] _do_fork+0x19e/0xce0 [ 205.277484] ? fork_idle+0x280/0x280 [ 205.281294] ? fput+0xd4/0x150 [ 205.284497] ? SyS_write+0x15e/0x230 [ 205.288396] SyS_clone+0x37/0x50 [ 205.291945] ? sys_vfork+0x30/0x30 [ 205.295488] do_syscall_64+0x1e8/0x640 [ 205.299381] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.304236] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.309434] RIP: 0033:0x45a6f9 [ 205.312615] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 205.320312] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 22:56:22 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 5: syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r0 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x3ff, 0x7, 0xaa, &(0x7f0000000040)="46b45fe41a8d2a480a2872c6b7a7ad5a33f41ee6e300fe4d5dba7a8c53dfdb94a36511a6a4ab1e23bc8188e4ee364202bd605ddd1f7f8ab2ea0d926a7e851dd0b0ec5605c78b643e169734dccf2c6ed94032d20f2c49491f0ae7287cf7a4663f496b165fbfd47ae0c2dfc0a19a5c1c77032296c5d3467c34140965001fd4a7df8669202be76fc96e7fde4cb16c449ba8a506679b2a7e00"/170}) 22:56:22 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:22 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 205.330874] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 205.338127] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.345383] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 205.352634] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:23 executing program 2 (fault-call:1 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = dup2(r4, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r5) recvmsg(r2, &(0x7f0000000180)={&(0x7f0000000040)=@nl=@proc, 0x80, &(0x7f0000000100)=[{&(0x7f00000000c0)}], 0x1, &(0x7f0000000140)=""/14, 0xe}, 0x142) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f0000000000)=0x478) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:23 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x88800) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) recvfrom$rxrpc(r2, &(0x7f0000000040)=""/131, 0x83, 0x20008101, &(0x7f0000000100)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @multicast1}}, 0x24) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r4, 0x111, 0x3, 0x0, 0x4) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:23 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.536642] FAULT_INJECTION: forcing a failure. [ 205.536642] name failslab, interval 1, probability 0, space 0, times 0 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.603860] CPU: 0 PID: 9332 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 205.611713] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 205.621078] Call Trace: [ 205.623683] dump_stack+0x142/0x197 [ 205.627352] should_fail.cold+0x10f/0x159 [ 205.631527] should_failslab+0xdb/0x130 [ 205.635606] kmem_cache_alloc+0x2d7/0x780 [ 205.639769] ? find_held_lock+0x35/0x130 [ 205.643847] ? copy_tree+0x4a2/0x8a0 [ 205.644838] kauditd_printk_skb: 54 callbacks suppressed 22:56:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f00000000c0)={'#! ', './file0', [{0x20, 'ppp1eth1-security/nodeveth0em1[]'}, {0x20, '$eth0'}, {0x20, '/dev/loop#\x00'}, {0x20, '/dev/loop#\x00'}, {0x20, 'wlan1'}, {0x20, '/dev/loop#\x00'}, {0x20, '/dev/loop#\x00'}], 0xa, "b5bcf7e80a47211b3638f0650c4321b8f9d6ff95809cf87f7868c4065755d9099c7e394765e359c0377c90757aa7d38e4d039d5fe11266117ca44d8c7444addd644d461d0567506f1a461759716015ce171cb5f7747b4215ed9781e3d8e5b3cd20a7d8a3eb495d8724669b3ad9df57494beb996844f6561b351107c92d768e7c4420ed1efca26f79d10e35979e2493ec8248f0fb26a714057624929003bbd2d2fab2197245d4f20ea934df89fe9ceec6f7ebe62e3dd1a7a01156055385"}, 0x125) sysinfo(&(0x7f00000007c0)=""/154) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000000)) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r3, 0xc0105303, &(0x7f0000000280)={0x1f, 0x4, 0x80}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r5, 0x1}, 0x14}}, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f0000000200)={0x1, 0x13, "f62cac907f0a8c8db8733b1c438471358a7722"}) 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.644846] audit: type=1804 audit(1575759383.195:436): pid=9346 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/122/file0" dev="sda1" ino=16803 res=1 [ 205.647569] alloc_vfsmnt+0x28/0x7d0 [ 205.647589] clone_mnt+0x70/0xee0 [ 205.647603] ? lock_downgrade+0x740/0x740 [ 205.647616] ? do_raw_spin_unlock+0x16b/0x260 [ 205.647633] copy_tree+0x33b/0x8a0 [ 205.699613] copy_mnt_ns+0x11c/0x8c0 [ 205.703353] ? kmem_cache_alloc+0x611/0x780 [ 205.705317] audit: type=1400 audit(1575759383.195:437): avc: denied { ioctl } for pid=9347 comm="syz-executor.5" path="socket:[38719]" dev="sockfs" ino=38719 ioctlcmd=0x6686 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 205.707715] ? selinux_capable+0x36/0x40 [ 205.707741] create_new_namespaces+0xc9/0x720 [ 205.707757] ? ns_capable_common+0x12c/0x160 [ 205.707776] copy_namespaces+0x284/0x310 22:56:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000040)) 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.754005] copy_process.part.0+0x2603/0x6a70 [ 205.758622] ? perf_trace_lock+0x30d/0x500 [ 205.762884] ? perf_trace_run_bpf_submit+0x113/0x170 [ 205.768013] ? perf_trace_lock+0x30d/0x500 [ 205.772294] ? __cleanup_sighand+0x50/0x50 [ 205.776554] ? lock_downgrade+0x740/0x740 [ 205.780737] _do_fork+0x19e/0xce0 [ 205.784320] ? fork_idle+0x280/0x280 [ 205.788060] ? fput+0xd4/0x150 [ 205.791269] ? SyS_write+0x15e/0x230 [ 205.795004] SyS_clone+0x37/0x50 [ 205.798378] ? sys_vfork+0x30/0x30 22:56:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x4000, 0x0) ioctl$IMSETDEVNAME(r1, 0x80184947, &(0x7f0000000040)={0x5, 'syz1\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r3, 0x1}, 0x14}}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000880)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x7f, 0x6, 0x3, 0x6, 0x2, 0x5, 0x8, 0x2a2, 0x40, 0x1c6, 0xd6b, 0x1000, 0x38, 0x1, 0x401, 0x4, 0x2}, [{0x60000000, 0xfffffffd, 0x7, 0x613, 0x2, 0x1, 0x8, 0x400}, {0x0, 0x54, 0x1000, 0x80000001, 0x0, 0x9, 0x3, 0x7fffffff}], "6f5be7c8c95654f047adb627be5fd3983fc19a38843060b1c5ea1f0474a10a70baaf380d7bf29cc467628aaf5610ce0fc29b69137b72132d6445c40c7331eaa401fe82489a4cb1b03e4fd05081560b646bbec30fcc0aeda4b56c0756c09feadbd9f1548e0082e050c670baf166a1ea13b905dd531e7cff39a48a99bfc66b09a94ce5a65f84f9a859d8cf30a064a18ab51effc1d36623bbe743ebd4a8be3ed799fd9d2e98d77dd116673fd012b525b8ed56c037c55df093abc7eabf839e723f066cde81980c9c61cee390aafc4dbb43931986bccf0f00e2b8b19b5eed04a00f27ab3f49de89d22837d2", [[], [], [], [], [], [], []]}, 0x899) [ 205.801942] do_syscall_64+0x1e8/0x640 [ 205.805840] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 205.806510] audit: type=1804 audit(1575759383.195:438): pid=9350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/123/file0" dev="sda1" ino=16803 res=1 [ 205.811131] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 205.811143] RIP: 0033:0x45a6f9 [ 205.811151] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 205.811166] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 205.811173] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 205.811180] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 205.811187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 205.811196] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 205.967166] audit: type=1804 audit(1575759383.195:439): pid=9355 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/124/file0" dev="sda1" ino=16780 res=1 22:56:23 executing program 2 (fault-call:1 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:23 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000000)="0a68f83201ff89b103bbd6595113e6b3a8694f4e06ec404fbf1a286aeea9283fa4df25b5edc663603eb0b3c7e22d97004872f4fbb43b2d6c9a54b5609610dcc00944c13be5763fa6af3f6ccdfc36d9d6a2f57d744a297a94de76dc40e3984b08eb6cf656c7deef51b1c57d831541fd3727869c4b254f93d65bdce77472ffcfe35ee84caceb23e36e8e71565cf0826ad373b777d20ed87643faa0032c82595926f6f1cf8c7eafd350b4903cf2d072e404c0f77f1f9d60dc6d6be03b50009f8fb84ba438d4e24b4913a5f4bc428f47d011b8c6c0614a9bc6ad3228157b2519f9d8", 0xe0}, 0x68) r0 = getpgid(0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000180)=0x9) 22:56:23 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:23 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/no\xeao#\x00', 0x0, 0x501a00) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x8}, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={[], 0x143c, 0x800, 0x7, 0x9, 0x800, r1}) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x2, 0xc5, 0x8f, &(0x7f00000000c0)="e4c7f12e23976fe1c197ddeb21fbd30514071a0b4c1f476e5c9db3a68bf2daa115ae45b40cd61c11a9b51b8e72d08c6bd6ba64cfc5df7b83b76589c0e89c36bf906654f15e550f4d6926618aaffd7b9ae9bbc6160d4eaecacfa4ba2f0d3647a475c010f1e9174d08434ccd46b2b09d722adbfae8494c4817e4597d2514a68b2e87f305deeed44a2738d4dd52294e97"}) 22:56:23 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 206.024783] audit: type=1804 audit(1575759383.525:440): pid=9359 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/152/file0" dev="sda1" ino=16801 res=1 22:56:23 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) connect$bt_sco(r2, &(0x7f0000000040)={0x1f, {0x3f, 0x2, 0x26, 0xfe, 0x80, 0x2}}, 0x8) 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 206.106040] FAULT_INJECTION: forcing a failure. [ 206.106040] name failslab, interval 1, probability 0, space 0, times 0 22:56:23 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:23 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 206.226611] CPU: 1 PID: 9379 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 206.234889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.244246] Call Trace: [ 206.246848] dump_stack+0x142/0x197 [ 206.250493] should_fail.cold+0x10f/0x159 [ 206.254654] should_failslab+0xdb/0x130 [ 206.258640] __kmalloc_track_caller+0x2ec/0x790 [ 206.263347] ? kstrdup_const+0x48/0x60 [ 206.267248] kstrdup+0x3a/0x70 [ 206.270449] kstrdup_const+0x48/0x60 [ 206.274166] alloc_vfsmnt+0xe5/0x7d0 [ 206.277886] clone_mnt+0x70/0xee0 [ 206.281345] ? lock_downgrade+0x740/0x740 [ 206.285495] ? do_raw_spin_unlock+0x16b/0x260 [ 206.289986] copy_tree+0x33b/0x8a0 [ 206.293535] copy_mnt_ns+0x11c/0x8c0 [ 206.297252] ? kmem_cache_alloc+0x611/0x780 [ 206.301576] ? selinux_capable+0x36/0x40 [ 206.305645] create_new_namespaces+0xc9/0x720 [ 206.310160] ? ns_capable_common+0x12c/0x160 [ 206.314580] copy_namespaces+0x284/0x310 [ 206.318646] copy_process.part.0+0x2603/0x6a70 22:56:23 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) ioctl$CAPI_GET_ERRCODE(0xffffffffffffffff, 0x80024321, &(0x7f0000000140)) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x0, 0x2) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)=@keyring={'key_or_keyring:', r1}) [ 206.323235] ? debug_smp_processor_id+0x1c/0x20 [ 206.327910] ? perf_trace_lock+0x109/0x500 [ 206.332146] ? check_preemption_disabled+0x3c/0x250 [ 206.337168] ? debug_smp_processor_id+0x1c/0x20 [ 206.341854] ? __cleanup_sighand+0x50/0x50 [ 206.346108] ? lock_downgrade+0x740/0x740 [ 206.350274] _do_fork+0x19e/0xce0 [ 206.353740] ? fork_idle+0x280/0x280 [ 206.357461] ? fput+0xd4/0x150 [ 206.360653] ? SyS_write+0x15e/0x230 [ 206.364371] SyS_clone+0x37/0x50 [ 206.367746] ? sys_vfork+0x30/0x30 [ 206.371291] do_syscall_64+0x1e8/0x640 22:56:23 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 206.375179] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.380030] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.380040] RIP: 0033:0x45a6f9 [ 206.380045] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 206.380056] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 206.380061] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 206.380066] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 206.380072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 206.380077] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 206.390672] audit: type=1804 audit(1575759383.575:441): pid=9363 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/125/file0" dev="sda1" ino=16763 res=1 [ 206.465501] audit: type=1804 audit(1575759383.675:442): pid=9371 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/126/file0" dev="sda1" ino=16801 res=1 [ 206.498080] audit: type=1804 audit(1575759383.685:443): pid=9375 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/114/file0" dev="sda1" ino=16806 res=1 [ 206.526641] audit: type=1804 audit(1575759383.715:444): pid=9378 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/153/file0" dev="sda1" ino=16807 res=1 [ 206.554958] audit: type=1804 audit(1575759383.805:445): pid=9389 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/115/file0" dev="sda1" ino=16784 res=1 22:56:24 executing program 2 (fault-call:1 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r4, 0x1}, 0x14}}, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r6, 0x1}, 0x14}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x120, 0x0, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xbb}]}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfc6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x161}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x8080}, 0xc040) sendmsg$TIPC_NL_BEARER_ENABLE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r8, 0x1}, 0x14}}, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x8890bb9bc1f2b91e) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/relabel\x00', 0x2, 0x0) r9 = openat$cgroup(r0, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) r10 = dup2(r9, r0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VT_WAITACTIVE(r10, 0x5607) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r1 = add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r0) keyctl$reject(0x13, r1, 0x2, 0x5, 0xffffffffffffffff) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = dup3(r2, r2, 0x80000) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000200)=0x4) r4 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000000)=0x80f806766c7df7b9) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f00000002c0)={r5}, 0x8) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000280)={r5, 0x6, 0x3, 0x4, 0x401, 0x9, 0x5, 0x3, {0x0, @in6={{0xa, 0x4e23, 0x2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x11}}}}, 0x6, 0x1ff, 0x3222, 0x2, 0x227}}, &(0x7f0000000080)=0xb0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000000c0)={r6, 0x36, "f076720f048859308fb37695d51545e6fc095dc9526194719dac976d22f6c577eb17d40244d69e3a9b7107c0b74e65a592e9b32def07"}, &(0x7f0000000140)=0x3e) [ 206.671418] FAULT_INJECTION: forcing a failure. [ 206.671418] name failslab, interval 1, probability 0, space 0, times 0 22:56:24 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 206.754281] CPU: 0 PID: 9415 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 206.762141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 206.771500] Call Trace: [ 206.774089] dump_stack+0x142/0x197 [ 206.777751] should_fail.cold+0x10f/0x159 [ 206.781948] should_failslab+0xdb/0x130 [ 206.785936] __kmalloc_track_caller+0x2ec/0x790 [ 206.790625] ? kstrdup_const+0x48/0x60 [ 206.794534] kstrdup+0x3a/0x70 [ 206.797744] kstrdup_const+0x48/0x60 [ 206.801472] alloc_vfsmnt+0xe5/0x7d0 [ 206.805199] clone_mnt+0x70/0xee0 [ 206.808659] ? lock_downgrade+0x740/0x740 [ 206.812829] ? do_raw_spin_unlock+0x16b/0x260 [ 206.817348] copy_tree+0x33b/0x8a0 [ 206.820917] copy_mnt_ns+0x11c/0x8c0 [ 206.824640] ? kmem_cache_alloc+0x611/0x780 [ 206.827157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9429 comm=syz-executor.5 [ 206.828970] ? selinux_capable+0x36/0x40 [ 206.828996] create_new_namespaces+0xc9/0x720 [ 206.829011] ? ns_capable_common+0x12c/0x160 [ 206.853924] copy_namespaces+0x284/0x310 [ 206.858002] copy_process.part.0+0x2603/0x6a70 [ 206.862595] ? perf_trace_lock+0x30d/0x500 [ 206.862611] ? perf_trace_run_bpf_submit+0x113/0x170 [ 206.862630] ? perf_trace_lock+0x30d/0x500 [ 206.862660] ? __cleanup_sighand+0x50/0x50 [ 206.880942] ? lock_downgrade+0x740/0x740 [ 206.885123] _do_fork+0x19e/0xce0 [ 206.888607] ? fork_idle+0x280/0x280 [ 206.892338] ? fput+0xd4/0x150 [ 206.895542] ? SyS_write+0x15e/0x230 [ 206.899281] SyS_clone+0x37/0x50 [ 206.902658] ? sys_vfork+0x30/0x30 [ 206.906211] do_syscall_64+0x1e8/0x640 [ 206.910094] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 206.910120] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 206.910130] RIP: 0033:0x45a6f9 [ 206.910138] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 206.931064] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 206.938355] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 206.945640] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:24 executing program 3: r0 = semget(0x3, 0x0, 0x40) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) ioctl$SNDRV_PCM_IOCTL_PREPARE(r1, 0x4140, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyprintk\x00', 0x10402, 0x0) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000000040)={0x0, 0xe72d, 0x8001, 0x86be, 0x8, 0x9, 0x0, 0x4, 0x7ff, 0x80000001, 0x101}) semctl$SEM_INFO(r0, 0xcc6138e279fdb3c, 0x13, &(0x7f0000000400)=""/4096) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r3 = open(&(0x7f0000005ac0)='./file0\x00', 0x100, 0x65de5e848a740869) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x68, r5, 0x5, 0x0, 0x0, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0x1f, @media='ib\x00'}}}}, 0x68}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r3, &(0x7f0000005bc0)={&(0x7f0000005b00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000005b80)={&(0x7f0000005b40)={0x2c, r5, 0x20, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz0\x00'}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x10040040}, 0x20008094) 22:56:24 executing program 5: syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r5, 0x1}, 0x14}}, 0x0) r6 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x5590, 0x8040) dup2(r4, r6) r7 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$uinput_user_dev(r7, &(0x7f0000000880)={'syz1\x00', {0x3, 0x8, 0xfff8, 0x101}, 0x53, [0x9, 0xb, 0x3f, 0x1, 0xea, 0x9, 0x8, 0x2, 0x20, 0x3, 0x80000000, 0x2, 0x1, 0x2, 0x340, 0xffff, 0x3, 0x1, 0xffffffc0, 0x5, 0x4, 0x2, 0xffffffff, 0x2, 0x40, 0x1, 0x6, 0x1, 0xff, 0x20, 0x80, 0x0, 0xffffffff, 0xff, 0x2, 0x7, 0x6, 0x8, 0x3, 0x10000, 0x80000001, 0x9a9, 0x7, 0x1, 0x1f, 0x1f, 0x9, 0x6d3, 0x20, 0x9, 0x20, 0x9, 0x1, 0x5, 0xffff0000, 0x0, 0xd3, 0x3, 0x51e, 0x0, 0x2, 0x10001, 0x6, 0x7], [0x4, 0xee, 0xfffffffa, 0xfffffff9, 0xa, 0xa4, 0xec, 0x7, 0x6, 0xb9e, 0xb5, 0x7f, 0x96d0, 0x5a9, 0x523, 0x1, 0x5, 0x4, 0x4, 0x7f0f, 0x40000000, 0x80001, 0x8, 0x1, 0x10001, 0x1, 0x7, 0x6, 0x3ff, 0x8000, 0x101, 0x7, 0x5d42, 0x2, 0x4, 0x0, 0x4, 0x1, 0x200, 0x80000001, 0x8, 0x3f, 0x0, 0x8, 0x3ff, 0x6, 0x9, 0x3, 0x4, 0x3, 0x7, 0x4, 0x5, 0x3, 0x8, 0x3, 0x8, 0x190, 0x6, 0x3, 0x3f, 0x10001, 0x0, 0x2], [0x7, 0x1ff, 0x2, 0xffff, 0x628, 0x6ff, 0x9, 0xa3, 0x9, 0x2, 0x20, 0x811, 0x20, 0x40, 0x0, 0x2, 0x1, 0x27b7b27c, 0x6, 0x9, 0x80, 0x9, 0x4, 0x11044404, 0x8, 0x1, 0x8, 0xfffffffa, 0x235b, 0xff, 0x0, 0x7ff, 0x9, 0x1, 0x10000, 0x7, 0xc00, 0xb1, 0xfffffffb, 0x3, 0xffffff81, 0x1ff, 0x81, 0xff, 0x2, 0x9, 0x4, 0x8e6, 0x5, 0x0, 0x1ff, 0x7, 0x7fff, 0x2, 0x3, 0x6, 0x7, 0x4, 0x380, 0x4, 0x0, 0x5, 0x9, 0x3ff], [0x0, 0x8388, 0x0, 0x8, 0x7, 0x3f, 0x7, 0x4, 0xbf, 0x6, 0x4, 0x7, 0x7, 0xffff, 0x1, 0x3, 0x1, 0x1, 0x3f, 0x6, 0xffff, 0x3, 0x0, 0x0, 0x8, 0x8, 0x1f, 0x401, 0x57b, 0x8, 0x80000001, 0x20, 0x1, 0x3f, 0x10000, 0x236, 0x6, 0x8, 0xffff, 0x3, 0x101, 0x7, 0x20, 0x8000, 0x8, 0x2, 0xd233, 0x81, 0xce, 0x2, 0x4, 0x5edf, 0x5ec, 0x8, 0x5e98, 0x4, 0x20, 0x2, 0x6, 0x100000, 0x80000001, 0x10000, 0x7, 0x1]}, 0x45c) r8 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000100)={0x1, 0x0, 0x164, &(0x7f0000000240)="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"}) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = socket$netlink(0x10, 0x3, 0x0) r11 = dup2(r10, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) bind$vsock_stream(r11, &(0x7f0000000040)={0x28, 0x0, 0x2711, @reserved}, 0x10) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) r13 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80400, 0x0) connect$vsock_stream(r13, &(0x7f00000000c0)={0x28, 0x0, 0xffffffff}, 0x10) r14 = socket$netlink(0x10, 0x3, 0x0) r15 = dup2(r14, r12) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$DRM_IOCTL_RM_CTX(r15, 0xc0086421, &(0x7f0000000000)) 22:56:24 executing program 3: r0 = syz_open_dev$vcsa(&(0x7f0000002780)='/dev/vcsa#\x00', 0x7f, 0x2122) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000002800)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f00000028c0)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000002880)={&(0x7f0000002840)={0x24, r1, 0x200, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x6}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc400}, 0xdea636e507466d44) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = accept4$x25(r4, &(0x7f0000000040)={0x9, @remote}, &(0x7f0000000080)=0x12, 0x1800) listen(r5, 0x57) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x9, 0x20) 22:56:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) socket$l2tp(0x18, 0x1, 0x1) 22:56:24 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_genetlink_get_family_id$devlink(&(0x7f0000000000)='devlink\x00') [ 206.952920] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 206.952929] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:24 executing program 2 (fault-call:1 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:24 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x3, 0x0, 0xd0, &(0x7f0000000000)="e806b390688a3269447beb9792adf5e83bd8a5cd5273485276266c978ecf30c610846e729a434f40b73abfb26157cbe9c4339c67b54c281fff50b3c0d7c3c8b8d7b55823c1e628c30caf9ec845b4a79365f989a656d10b2c66697547b0081a687b532c34336bd5ae6176cacdfa9b6a08896c8338c5eba44eba91b45a0d66ba31cb7269d08efc202da80e057ea50dd881e02f1b3a9d702d7d7b6828eb3929b13fcaa341dea464003d4098323527ce5aac3004e48aa8ca1bb4928b8537634eafef245fe777295735fbf979312f90eb9729"}) 22:56:24 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 3: r0 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r1 = add_key(&(0x7f00000000c0)='rxrpc_s\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, r0) timer_getoverrun(0x0) request_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='dns_resolver\x00', r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$PPPIOCSMRRU(r4, 0x4004743b, &(0x7f0000000180)=0x1000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r5) r8 = shmget$private(0x0, 0x4000, 0x40, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r8, 0x3, &(0x7f0000000200)=""/203) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_DEASSIGN_DEV_IRQ(r7, 0x4040ae75, &(0x7f0000000140)={0x8000, 0x800, 0x100, 0x100}) 22:56:24 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 207.158805] FAULT_INJECTION: forcing a failure. [ 207.158805] name failslab, interval 1, probability 0, space 0, times 0 [ 207.220138] CPU: 0 PID: 9459 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 207.227983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.237351] Call Trace: [ 207.239961] dump_stack+0x142/0x197 [ 207.243624] should_fail.cold+0x10f/0x159 [ 207.247799] should_failslab+0xdb/0x130 [ 207.251790] kmem_cache_alloc_trace+0x2e9/0x790 [ 207.256469] ? kmem_cache_alloc+0x611/0x780 [ 207.260818] copy_pid_ns+0x1f5/0xa50 [ 207.264556] create_new_namespaces+0x267/0x720 [ 207.269169] copy_namespaces+0x284/0x310 [ 207.273247] copy_process.part.0+0x2603/0x6a70 [ 207.277848] ? perf_trace_lock+0x30d/0x500 [ 207.282098] ? perf_trace_run_bpf_submit+0x113/0x170 [ 207.287236] ? perf_trace_lock+0x30d/0x500 [ 207.291500] ? __cleanup_sighand+0x50/0x50 [ 207.295751] ? lock_downgrade+0x740/0x740 [ 207.299929] _do_fork+0x19e/0xce0 [ 207.303396] ? fork_idle+0x280/0x280 [ 207.307124] ? fput+0xd4/0x150 [ 207.310335] ? SyS_write+0x15e/0x230 [ 207.314085] SyS_clone+0x37/0x50 [ 207.317469] ? sys_vfork+0x30/0x30 [ 207.321036] do_syscall_64+0x1e8/0x640 [ 207.324942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.329813] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.335013] RIP: 0033:0x45a6f9 [ 207.338212] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 207.345933] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 207.353213] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 207.360494] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:24 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:24 executing program 3: add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="a0cf3d1976b7567a70f0f31b7ae64a49fd6f4fe1932afae3ffb03a20cf016d555eee8b8ea3fda3134eb85c566e54d8cd22f0f867d1ebbe38f8fdc7bbd96f822bcd123045b2278aa2a52be4acf7154e99526c2d70671f4aa103a5853702b38d19870dc06f563712ebf26fe2bca93f7ef722f45bc7583634fb5e918bdce04dbe0e4169f01408f99e64883c408dfb1e9dd96c040a4476428a46760f9ad86018a758acf764816dc038796d0ae92907992ccadb6f62912d9549f733f07683d80c937445ff1be5", 0xc4, 0xfffffffffffffff8) r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) request_key(&(0x7f0000000340)='asy\x8emetric\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$bt_l2cap(r3, &(0x7f0000000140)={0x1f, 0x3, {0x9, 0x0, 0x0, 0x2, 0x7f, 0x1}, 0x69cd, 0x3}, 0xe) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r4, 0x894b, &(0x7f0000000040)) 22:56:24 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 207.367775] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 207.375059] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:25 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 2 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:25 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x106800) setsockopt$inet6_dccp_int(r0, 0x21, 0xc5fe1abd40484cb9, &(0x7f0000000040)=0x3, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_STATUS(r3, 0x80605414, &(0x7f0000000080)=""/166) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r6, &(0x7f00000001c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="14000000", @ANYRES16=r8, @ANYBLOB="2942000000000000000010000000f0bc3fec7191abc0568193f42fb5969c2d73ca44be61b5b853f1c8d7ca3db693dc2e8baa104cf7a533828caf647f0922f1b63842e531af3fbefb1cc5ce413f08c18594481a713de48eb05a7a6afcd3093445c854cf144aa7c18b7ef939352d06b838b6d78306406a0ab2f73f919edecad29aef14c5e47b7b4c53d2c4c38d2b85c97d57b83fe19b791a9e1abc81d5ba3ada8cfe25214ee98714778294327ee8a5bb5cfb385cc1f4f25fe14266d586f3cd57"], 0x3}}, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x38, r8, 0x1, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9c1e}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1000}]}]}, 0x38}, 0x1, 0x0, 0x0, 0xc008000}, 0x4) r9 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r9, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) request_key(&(0x7f0000000280)='.Wequest_key_auth\x00', &(0x7f00000003c0)={'\x00\b\x00', 0x2}, 0x0, r9) 22:56:25 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 207.619980] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=9487 comm=syz-executor.3 [ 207.638933] FAULT_INJECTION: forcing a failure. [ 207.638933] name failslab, interval 1, probability 0, space 0, times 0 [ 207.688636] CPU: 0 PID: 9491 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 207.696475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 207.696483] Call Trace: [ 207.696504] dump_stack+0x142/0x197 [ 207.696529] should_fail.cold+0x10f/0x159 [ 207.716342] should_failslab+0xdb/0x130 [ 207.720340] kmem_cache_alloc+0x2d7/0x780 [ 207.724506] ? lockdep_init_map+0x9/0x10 [ 207.728590] ? copy_pid_ns+0x4f/0xa50 [ 207.732411] alloc_pid+0x5d/0xc70 [ 207.735889] ? copy_thread_tls+0x3c8/0x7a0 [ 207.740146] copy_process.part.0+0x272f/0x6a70 [ 207.744749] ? perf_trace_lock+0x30d/0x500 [ 207.748990] ? perf_trace_run_bpf_submit+0x113/0x170 [ 207.749011] ? perf_trace_lock+0x30d/0x500 [ 207.758436] ? __cleanup_sighand+0x50/0x50 [ 207.762687] ? lock_downgrade+0x740/0x740 [ 207.766859] _do_fork+0x19e/0xce0 [ 207.770328] ? fork_idle+0x280/0x280 [ 207.774044] ? fput+0xd4/0x150 [ 207.774059] ? SyS_write+0x15e/0x230 [ 207.774082] SyS_clone+0x37/0x50 [ 207.774092] ? sys_vfork+0x30/0x30 [ 207.787877] do_syscall_64+0x1e8/0x640 [ 207.791810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 207.796683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 207.802160] RIP: 0033:0x45a6f9 [ 207.805366] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 207.813383] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 207.820840] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 207.828212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:25 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40801001) r1 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x1000) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r2, r1, 0x0, 0x0) getsockname$packet(r1, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 207.835599] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 207.835608] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 207.879199] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pig=9495 comm=syz-executor.3 22:56:25 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 3: chroot(&(0x7f0000000080)='./file0\x00') syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0xfffffffffffffffe, 0x1) request_key(&(0x7f00000000c0)='olver\x00\x83\x97x\x14\x8e\x18u\xa8B\xf4\x8f\xd0\x9b\xc5\xf1\xdc\x82\xdc(,l\xb7f\xab\xafh\x96\xbc', &(0x7f00000003c0)={'\xa0\x00', 0x1}, 0x0, 0xfffffffffffffff9) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x110400, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000040)) openat$random(0xffffffffffffff9c, &(0x7f0000000100)='/dev/urandom\x00', 0x280800, 0x0) 22:56:25 executing program 2 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:25 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'\x00\xea\x1f', 0x2}, 0x0, r0) [ 208.141449] FAULT_INJECTION: forcing a failure. [ 208.141449] name failslab, interval 1, probability 0, space 0, times 0 22:56:25 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:25 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000000)=0x8, 0x8) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 208.240279] CPU: 1 PID: 9526 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 208.248127] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.257488] Call Trace: [ 208.260085] dump_stack+0x142/0x197 [ 208.263717] should_fail.cold+0x10f/0x159 [ 208.268050] should_failslab+0xdb/0x130 [ 208.272033] kmem_cache_alloc+0x2d7/0x780 [ 208.276183] ? lockdep_init_map+0x9/0x10 [ 208.280247] ? copy_pid_ns+0x4f/0xa50 [ 208.284047] alloc_pid+0x5d/0xc70 [ 208.287504] ? copy_thread_tls+0x3c8/0x7a0 [ 208.291745] copy_process.part.0+0x272f/0x6a70 [ 208.296338] ? perf_trace_lock+0x30d/0x500 [ 208.300576] ? perf_trace_run_bpf_submit+0x113/0x170 [ 208.305685] ? perf_trace_lock+0x30d/0x500 [ 208.309939] ? __cleanup_sighand+0x50/0x50 [ 208.314182] ? lock_downgrade+0x740/0x740 [ 208.318412] _do_fork+0x19e/0xce0 [ 208.321885] ? fork_idle+0x280/0x280 [ 208.325696] ? fput+0xd4/0x150 [ 208.328893] ? SyS_write+0x15e/0x230 [ 208.332617] SyS_clone+0x37/0x50 [ 208.335997] ? sys_vfork+0x30/0x30 [ 208.339548] do_syscall_64+0x1e8/0x640 [ 208.343442] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.348294] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.353484] RIP: 0033:0x45a6f9 [ 208.356674] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 208.364476] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 208.371749] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 208.379023] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 208.386296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 208.393569] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', 0x0) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 2 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:26 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = dup2(r1, r0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$FUSE_BMAP(r6, &(0x7f0000000140)={0x18, 0xffffffffffffffda, 0x1, {0x100000001}}, 0x18) fcntl$setstatus(r3, 0x4, 0x44000) fallocate(r3, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r7, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r3, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') r10 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/enforce\x00', 0x101000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r10, 0x6, 0x13, &(0x7f0000000280), 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r9, 0x1}, 0x14}}, 0x0) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = dup2(r12, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) io_cancel(r7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0x5, r8, &(0x7f0000000400)="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", 0x1000, 0xc58, 0x0, 0x2, r13}, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000000)) 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 208.662294] FAULT_INJECTION: forcing a failure. [ 208.662294] name failslab, interval 1, probability 0, space 0, times 0 [ 208.677281] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pig=9562 comm=syz-executor.3 [ 208.708991] CPU: 1 PID: 9563 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 208.716836] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 208.726196] Call Trace: [ 208.728796] dump_stack+0x142/0x197 [ 208.732442] should_fail.cold+0x10f/0x159 [ 208.736611] should_failslab+0xdb/0x130 [ 208.740614] kmem_cache_alloc+0x2d7/0x780 [ 208.744776] ? check_preemption_disabled+0x3c/0x250 [ 208.749799] alloc_vfsmnt+0x28/0x7d0 [ 208.753524] vfs_kern_mount.part.0+0x2a/0x3d0 [ 208.758041] ? rcu_read_lock_sched_held+0x110/0x130 [ 208.763068] kern_mount_data+0x56/0xc0 [ 208.766969] pid_ns_prepare_proc+0x1e/0x90 [ 208.771214] alloc_pid+0x9f0/0xc70 [ 208.774774] copy_process.part.0+0x272f/0x6a70 [ 208.779363] ? debug_smp_processor_id+0x1c/0x20 [ 208.784211] ? perf_trace_lock+0x109/0x500 [ 208.788462] ? check_preemption_disabled+0x3c/0x250 [ 208.793490] ? debug_smp_processor_id+0x1c/0x20 [ 208.798175] ? __cleanup_sighand+0x50/0x50 [ 208.802428] ? lock_downgrade+0x740/0x740 [ 208.806588] _do_fork+0x19e/0xce0 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 208.810053] ? fork_idle+0x280/0x280 [ 208.813775] ? fput+0xd4/0x150 [ 208.816978] ? SyS_write+0x15e/0x230 [ 208.820704] SyS_clone+0x37/0x50 [ 208.824078] ? sys_vfork+0x30/0x30 [ 208.827624] do_syscall_64+0x1e8/0x640 [ 208.831518] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 208.836370] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 208.841549] RIP: 0033:0x45a6f9 [ 208.841555] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 208.841565] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 22:56:26 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', 0x0) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x0) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 208.841570] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 208.841575] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 208.841580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 208.841586] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', 0x0) r6 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 2 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 209.048062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pig=9562 comm=syz-executor.3 22:56:26 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:26 executing program 3: connect$netlink(0xffffffffffffffff, &(0x7f00000000c0)=@kern={0x10, 0x0, 0x0, 0x40000}, 0xc) r0 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='syz', r0) 22:56:26 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 209.171716] FAULT_INJECTION: forcing a failure. [ 209.171716] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.226706] CPU: 1 PID: 9596 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 209.234553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.243917] Call Trace: [ 209.246518] dump_stack+0x142/0x197 [ 209.250161] should_fail.cold+0x10f/0x159 [ 209.254314] ? __might_sleep+0x93/0xb0 [ 209.258216] __alloc_pages_nodemask+0x1d6/0x7a0 [ 209.262889] ? check_preemption_disabled+0x3c/0x250 [ 209.267915] ? __alloc_pages_slowpath+0x2930/0x2930 22:56:26 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 209.272933] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 209.278396] ? __alloc_pages_nodemask+0x639/0x7a0 [ 209.283245] alloc_pages_current+0xec/0x1e0 [ 209.287580] __get_free_pages+0xf/0x40 [ 209.291470] get_zeroed_page+0x11/0x20 [ 209.295364] selinux_sb_copy_data+0x2a/0x390 [ 209.299787] security_sb_copy_data+0x75/0xb0 [ 209.304203] mount_fs+0x1ec/0x2a1 [ 209.307663] vfs_kern_mount.part.0+0x5e/0x3d0 [ 209.312176] ? rcu_read_lock_sched_held+0x110/0x130 [ 209.317200] kern_mount_data+0x56/0xc0 [ 209.321098] pid_ns_prepare_proc+0x1e/0x90 [ 209.325333] alloc_pid+0x9f0/0xc70 [ 209.328891] copy_process.part.0+0x272f/0x6a70 [ 209.333479] ? debug_smp_processor_id+0x1c/0x20 [ 209.338164] ? perf_trace_lock+0x109/0x500 [ 209.342403] ? check_preemption_disabled+0x3c/0x250 [ 209.347428] ? debug_smp_processor_id+0x1c/0x20 [ 209.352114] ? __cleanup_sighand+0x50/0x50 [ 209.356372] ? lock_downgrade+0x740/0x740 [ 209.360536] _do_fork+0x19e/0xce0 [ 209.364000] ? fork_idle+0x280/0x280 [ 209.367725] ? fput+0xd4/0x150 [ 209.370927] ? SyS_write+0x15e/0x230 [ 209.374645] SyS_clone+0x37/0x50 [ 209.378015] ? sys_vfork+0x30/0x30 [ 209.381566] do_syscall_64+0x1e8/0x640 [ 209.385456] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 209.390313] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 209.395516] RIP: 0033:0x45a6f9 [ 209.398717] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 209.406573] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 209.413848] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:27 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 209.421123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 209.428401] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 209.435684] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(0x0, 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x801, 0x0) 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 2 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:27 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000000c0)={0x0, r4, 0x5}, 0x10) r5 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r5, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x2000)=nil, 0x2000}, 0x2}) r6 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r6) 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) shmctl$IPC_SET(r5, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 209.842898] FAULT_INJECTION: forcing a failure. [ 209.842898] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 209.901444] CPU: 0 PID: 9652 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 209.909560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 209.918925] Call Trace: [ 209.921515] dump_stack+0x142/0x197 [ 209.921543] should_fail.cold+0x10f/0x159 [ 209.921557] ? __might_sleep+0x93/0xb0 [ 209.921577] __alloc_pages_nodemask+0x1d6/0x7a0 [ 209.937887] ? check_preemption_disabled+0x3c/0x250 [ 209.942937] ? __alloc_pages_slowpath+0x2930/0x2930 [ 209.948048] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 209.948067] ? __alloc_pages_nodemask+0x639/0x7a0 [ 209.958351] alloc_pages_current+0xec/0x1e0 [ 209.962683] __get_free_pages+0xf/0x40 [ 209.962694] get_zeroed_page+0x11/0x20 [ 209.972020] selinux_sb_copy_data+0x2a/0x390 [ 209.976449] security_sb_copy_data+0x75/0xb0 [ 209.980880] mount_fs+0x1ec/0x2a1 [ 209.984369] vfs_kern_mount.part.0+0x5e/0x3d0 [ 209.988874] ? rcu_read_lock_sched_held+0x110/0x130 [ 209.993913] kern_mount_data+0x56/0xc0 [ 209.997817] pid_ns_prepare_proc+0x1e/0x90 [ 210.002066] alloc_pid+0x9f0/0xc70 [ 210.005646] copy_process.part.0+0x272f/0x6a70 [ 210.010249] ? perf_trace_lock+0x30d/0x500 [ 210.014502] ? perf_trace_run_bpf_submit+0x113/0x170 [ 210.019630] ? perf_trace_lock+0x30d/0x500 [ 210.023980] ? __cleanup_sighand+0x50/0x50 [ 210.028227] ? lock_downgrade+0x740/0x740 [ 210.032400] _do_fork+0x19e/0xce0 [ 210.035876] ? fork_idle+0x280/0x280 [ 210.039610] ? fput+0xd4/0x150 [ 210.042814] ? SyS_write+0x15e/0x230 [ 210.046546] SyS_clone+0x37/0x50 [ 210.049924] ? sys_vfork+0x30/0x30 [ 210.053479] do_syscall_64+0x1e8/0x640 [ 210.057388] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.062259] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.067461] RIP: 0033:0x45a6f9 [ 210.070663] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 210.078386] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 210.085665] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 210.092943] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) shmctl$IPC_SET(r5, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getpgid(0x0) shmctl$IPC_SET(r5, 0x1, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:27 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.100221] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 210.107502] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:27 executing program 3: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000600), &(0x7f0000000640)=0x4) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:27 executing program 2 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:27 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) ioctl$VIDIOC_S_AUDIO(0xffffffffffffffff, 0x40345622, &(0x7f0000000000)={0x4, "e8697a03434330023d1a8395ab94a72f0c9297fac5ec0edebcd1a35f62b2b768", 0x1}) 22:56:28 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.408613] FAULT_INJECTION: forcing a failure. [ 210.408613] name failslab, interval 1, probability 0, space 0, times 0 [ 210.453085] CPU: 1 PID: 9682 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 210.460931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 210.470421] Call Trace: [ 210.473023] dump_stack+0x142/0x197 [ 210.476672] should_fail.cold+0x10f/0x159 [ 210.480851] should_failslab+0xdb/0x130 [ 210.484832] kmem_cache_alloc_trace+0x2e9/0x790 [ 210.489522] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 210.495090] ? sget_userns+0xfe/0xc30 [ 210.498904] ? rcu_read_lock_sched_held+0x110/0x130 [ 210.503942] selinux_sb_alloc_security+0x46/0x220 [ 210.508894] security_sb_alloc+0x6d/0xa0 [ 210.512987] sget_userns+0x196/0xc30 [ 210.516711] ? set_anon_super+0x20/0x20 [ 210.520699] ? get_empty_filp.cold+0x3b/0x3b [ 210.525115] mount_ns+0x6d/0x190 [ 210.528485] ? proc_get_inode+0x620/0x620 [ 210.532643] proc_mount+0x6a/0xa0 [ 210.536103] mount_fs+0x97/0x2a1 [ 210.539650] vfs_kern_mount.part.0+0x5e/0x3d0 [ 210.544148] ? rcu_read_lock_sched_held+0x110/0x130 [ 210.549169] kern_mount_data+0x56/0xc0 [ 210.553059] pid_ns_prepare_proc+0x1e/0x90 [ 210.557404] alloc_pid+0x9f0/0xc70 [ 210.560970] copy_process.part.0+0x272f/0x6a70 [ 210.565560] ? debug_smp_processor_id+0x1c/0x20 [ 210.570232] ? perf_trace_lock+0x109/0x500 [ 210.574471] ? check_preemption_disabled+0x3c/0x250 [ 210.579493] ? debug_smp_processor_id+0x1c/0x20 [ 210.584165] ? __cleanup_sighand+0x50/0x50 [ 210.584179] ? lock_downgrade+0x740/0x740 [ 210.584195] _do_fork+0x19e/0xce0 [ 210.584210] ? fork_idle+0x280/0x280 [ 210.584225] ? fput+0xd4/0x150 [ 210.584233] ? SyS_write+0x15e/0x230 [ 210.584247] SyS_clone+0x37/0x50 [ 210.584254] ? sys_vfork+0x30/0x30 [ 210.584268] do_syscall_64+0x1e8/0x640 [ 210.584277] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 210.584296] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 210.584307] RIP: 0033:0x45a6f9 [ 210.592657] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 210.592669] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 210.592675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 22:56:28 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.592681] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 210.592688] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 210.592694] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 210.672150] kauditd_printk_skb: 56 callbacks suppressed 22:56:28 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.672159] audit: type=1804 audit(1575759388.215:502): pid=9693 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/149/file0" dev="sda1" ino=16831 res=1 22:56:28 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0x0, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.803401] audit: type=1804 audit(1575759388.235:503): pid=9694 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/136/file0" dev="sda1" ino=16841 res=1 22:56:28 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, 0x0, &(0x7f0000000140)) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, 0x0, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 210.906378] audit: type=1804 audit(1575759388.335:504): pid=9696 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/150/file0" dev="sda1" ino=16832 res=1 [ 211.001534] audit: type=1804 audit(1575759388.385:505): pid=9699 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/137/file0" dev="sda1" ino=16832 res=1 [ 211.107619] audit: type=1804 audit(1575759388.425:506): pid=9700 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/173/file0" dev="sda1" ino=16835 res=1 [ 211.172438] audit: type=1804 audit(1575759388.555:507): pid=9707 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/151/file0" dev="sda1" ino=16834 res=1 22:56:28 executing program 2 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:28 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0x0, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) fsetxattr(r0, &(0x7f0000000080)=@random={'os2.', '\x00'}, &(0x7f00000000c0)='syz', 0x3, 0x2) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = dup2(r6, r5) fcntl$setlease(r3, 0x400, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_procfs(0x0, &(0x7f0000000140)='ns\x00') openat(r8, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r9 = perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x200000000000}, 0x0, 0x81, 0x0, 0x0, 0x3b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_LOCK(r9, 0x4008642a, &(0x7f0000000140)={r10, 0x20}) r11 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ASHMEM_GET_SIZE(r11, 0x7704, 0x0) ioctl$DRM_IOCTL_GET_SAREA_CTX(r8, 0xc010641d, &(0x7f0000000600)={r10, 0x0}) ioctl$DRM_IOCTL_RM_CTX(r7, 0xc0086421, &(0x7f0000000140)={r10, 0x3}) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r4, 0x84, 0x21, &(0x7f0000000000), &(0x7f0000000040)=0x4) request_key(&(0x7f00000001c0)='id_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 211.227297] audit: type=1804 audit(1575759388.565:508): pid=9710 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/174/file0" dev="sda1" ino=16835 res=1 [ 211.309205] FAULT_INJECTION: forcing a failure. [ 211.309205] name failslab, interval 1, probability 0, space 0, times 0 22:56:28 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0x0, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:28 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 211.343167] audit: type=1804 audit(1575759388.635:509): pid=9712 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.1" name="/root/syzkaller-testdir484710862/syzkaller.rpjZCr/138/file0" dev="sda1" ino=16839 res=1 [ 211.381850] CPU: 1 PID: 9726 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 211.389809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.399285] Call Trace: [ 211.401894] dump_stack+0x142/0x197 [ 211.405544] should_fail.cold+0x10f/0x159 22:56:28 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 3: request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) [ 211.409710] should_failslab+0xdb/0x130 [ 211.413692] kmem_cache_alloc_trace+0x2e9/0x790 [ 211.418367] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 211.423827] ? sget_userns+0xfe/0xc30 [ 211.427638] ? rcu_read_lock_sched_held+0x110/0x130 [ 211.432700] selinux_sb_alloc_security+0x46/0x220 [ 211.437553] security_sb_alloc+0x6d/0xa0 [ 211.441622] sget_userns+0x196/0xc30 [ 211.445355] ? set_anon_super+0x20/0x20 [ 211.449340] ? get_empty_filp.cold+0x3b/0x3b [ 211.453760] mount_ns+0x6d/0x190 [ 211.457136] ? proc_get_inode+0x620/0x620 [ 211.461291] proc_mount+0x6a/0xa0 [ 211.464752] mount_fs+0x97/0x2a1 [ 211.468129] vfs_kern_mount.part.0+0x5e/0x3d0 [ 211.472629] ? rcu_read_lock_sched_held+0x110/0x130 [ 211.477652] kern_mount_data+0x56/0xc0 [ 211.481546] pid_ns_prepare_proc+0x1e/0x90 [ 211.485793] alloc_pid+0x9f0/0xc70 [ 211.489346] copy_process.part.0+0x272f/0x6a70 [ 211.493936] ? debug_smp_processor_id+0x1c/0x20 [ 211.498613] ? perf_trace_lock+0x109/0x500 [ 211.502852] ? check_preemption_disabled+0x3c/0x250 22:56:29 executing program 3: request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0xfffffffffffffff9) [ 211.507874] ? debug_smp_processor_id+0x1c/0x20 [ 211.512596] ? __cleanup_sighand+0x50/0x50 [ 211.516838] ? lock_downgrade+0x740/0x740 [ 211.520996] _do_fork+0x19e/0xce0 [ 211.524461] ? fork_idle+0x280/0x280 [ 211.528180] ? fput+0xd4/0x150 [ 211.531376] ? SyS_write+0x15e/0x230 [ 211.535094] SyS_clone+0x37/0x50 [ 211.538468] ? sys_vfork+0x30/0x30 [ 211.542013] do_syscall_64+0x1e8/0x640 [ 211.545913] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 211.550764] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 211.555963] RIP: 0033:0x45a6f9 22:56:29 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x0) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 211.559152] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 211.566872] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 211.574146] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 211.581419] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 211.588691] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 211.595965] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 211.651960] audit: type=1804 audit(1575759388.885:510): pid=9723 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.4" name="/root/syzkaller-testdir273390031/syzkaller.cqkjjx/152/file0" dev="sda1" ino=16837 res=1 22:56:29 executing program 2 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, &(0x7f0000000240)=@chain={'key_or_keyring:', 0x0, ':chain\x00'}) r1 = request_key(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000200)='\x00', r0) request_key(&(0x7f0000000100)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) listen(r2, 0x4) 22:56:29 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0x0, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 211.751462] audit: type=1804 audit(1575759388.885:511): pid=9725 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.0" name="/root/syzkaller-testdir048745276/syzkaller.54l7Sp/175/file0" dev="sda1" ino=16840 res=1 22:56:29 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000000)={'syz', 0x2}, 0x0, r0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) 22:56:29 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0x0, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 211.882340] FAULT_INJECTION: forcing a failure. [ 211.882340] name failslab, interval 1, probability 0, space 0, times 0 22:56:29 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r11, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 211.973858] CPU: 0 PID: 9761 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 211.981720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 211.991092] Call Trace: [ 211.993697] dump_stack+0x142/0x197 [ 211.997369] should_fail.cold+0x10f/0x159 [ 212.003019] should_failslab+0xdb/0x130 [ 212.007021] __kmalloc+0x2f0/0x7a0 [ 212.010582] ? __list_lru_init+0x6b/0x660 [ 212.014746] __list_lru_init+0x6b/0x660 [ 212.018742] sget_userns+0x500/0xc30 [ 212.022470] ? set_anon_super+0x20/0x20 [ 212.026462] ? get_empty_filp.cold+0x3b/0x3b [ 212.030891] mount_ns+0x6d/0x190 [ 212.034361] ? proc_get_inode+0x620/0x620 [ 212.038542] proc_mount+0x6a/0xa0 [ 212.042010] mount_fs+0x97/0x2a1 [ 212.045391] vfs_kern_mount.part.0+0x5e/0x3d0 [ 212.049896] ? rcu_read_lock_sched_held+0x110/0x130 [ 212.054935] kern_mount_data+0x56/0xc0 [ 212.058845] pid_ns_prepare_proc+0x1e/0x90 [ 212.063092] alloc_pid+0x9f0/0xc70 [ 212.066670] copy_process.part.0+0x272f/0x6a70 [ 212.071273] ? perf_trace_lock+0x30d/0x500 [ 212.075543] ? perf_trace_run_bpf_submit+0x113/0x170 [ 212.080668] ? perf_trace_lock+0x30d/0x500 [ 212.084949] ? __cleanup_sighand+0x50/0x50 [ 212.089187] ? lock_downgrade+0x740/0x740 [ 212.093343] _do_fork+0x19e/0xce0 [ 212.096831] ? fork_idle+0x280/0x280 [ 212.100561] ? fput+0xd4/0x150 [ 212.103768] ? SyS_write+0x15e/0x230 [ 212.107507] SyS_clone+0x37/0x50 [ 212.110890] ? sys_vfork+0x30/0x30 [ 212.114457] do_syscall_64+0x1e8/0x640 [ 212.118356] ? trace_hardirqs_off_thunk+0x1a/0x1c 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 212.123230] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.128438] RIP: 0033:0x45a6f9 [ 212.131632] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 212.139361] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 212.146641] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 212.153918] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 212.161203] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 22:56:29 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0x0, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 212.161211] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:29 executing program 2 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 22:56:29 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 3: request_key(&(0x7f00000000c0)='d\xee\xa3\x91\x97\xeb<\xea\x99\x9az^\x8c\xc9\x01[\xdd\x83S\x1e\x1f!\xb7\x05\x8am\xbfj\xb0\x87@t4Y\xb8\x8f\xd3\x1a\x83\x14\x9a\x9c\xed\xe2F\xdb\xea\x18r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x93\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x92\x9eo\xbf\xf0P\x81\xad\xc3\x17\xd7\x1f\xee\n\x95u\xfb\x9f(nom\xae\x95\x7fyU\x8c\xfd\xcaz@\v\x9f^q\xd1\xa4\xebrRoT~\xdf+4\xa5#\x1bN\xffYH\xa1W\x9eE\x9b\xb3\"\xde\xd5\xe7|(\xf0\t^\x17\x16\xd6t4b\xa2\x01v:\xd8$U\x13\fIi', &(0x7f0000000080)={',y\x03', 0x2}, 0x0, 0xfffffffffffffff9) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000500)={0x0, 0x4, &(0x7f00000004c0)={&(0x7f0000000140)={0x30, r3, 0x805, 0x0, 0x0, {{}, 0x0, 0x6, 0x0, {0x5}}}, 0x30}}, 0x0) r4 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x4060) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self\x00', 0x80000, 0x0) ioctl$FS_IOC_FSGETXATTR(r6, 0x801c581f, &(0x7f00000001c0)={0x0, 0x8, 0xc0800000, 0x3, 0x7}) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000040)={r5}) 22:56:29 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x0, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:29 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:30 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x0, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:30 executing program 3: request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000", @ANYRES16=r1, @ANYBLOB="010000000000000000004f3a0000b5c3a6a91c3adc32e097244c72d7bb855d6a0693941f02659b7ea2947463e99b0fd592ec8b9a6601ac7043187c1209135ef6a16f59e3cd4d6cd658e1b194327840629d5d66fc2638de54082efa3665574311024795fb9d0ad77c0f4a70c31f1ba944fdc5a8ac9948fc0a"], 0x14}}, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x0, &(0x7f0000000000), 0x4) [ 212.467502] FAULT_INJECTION: forcing a failure. [ 212.467502] name failslab, interval 1, probability 0, space 0, times 0 22:56:30 executing program 0: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 212.542019] CPU: 1 PID: 9801 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 212.549872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 212.560556] Call Trace: [ 212.563159] dump_stack+0x142/0x197 [ 212.566818] should_fail.cold+0x10f/0x159 [ 212.570980] should_failslab+0xdb/0x130 [ 212.574978] __kmalloc+0x2f0/0x7a0 [ 212.578532] ? lock_downgrade+0x740/0x740 [ 212.582694] ? register_shrinker+0xbd/0x220 [ 212.587033] register_shrinker+0xbd/0x220 [ 212.591186] sget_userns+0x9bf/0xc30 [ 212.595018] ? set_anon_super+0x20/0x20 [ 212.595031] ? get_empty_filp.cold+0x3b/0x3b [ 212.595043] mount_ns+0x6d/0x190 [ 212.606787] ? proc_get_inode+0x620/0x620 [ 212.610944] proc_mount+0x6a/0xa0 [ 212.614434] mount_fs+0x97/0x2a1 [ 212.617818] vfs_kern_mount.part.0+0x5e/0x3d0 [ 212.622316] ? rcu_read_lock_sched_held+0x110/0x130 [ 212.627345] kern_mount_data+0x56/0xc0 [ 212.631250] pid_ns_prepare_proc+0x1e/0x90 [ 212.635517] alloc_pid+0x9f0/0xc70 [ 212.639077] copy_process.part.0+0x272f/0x6a70 [ 212.643676] ? debug_smp_processor_id+0x1c/0x20 [ 212.648353] ? perf_trace_lock+0x109/0x500 [ 212.652594] ? check_preemption_disabled+0x3c/0x250 [ 212.657618] ? debug_smp_processor_id+0x1c/0x20 [ 212.662303] ? __cleanup_sighand+0x50/0x50 [ 212.666544] ? lock_downgrade+0x740/0x740 [ 212.670706] _do_fork+0x19e/0xce0 [ 212.674167] ? fork_idle+0x280/0x280 [ 212.677884] ? fput+0xd4/0x150 [ 212.681076] ? SyS_write+0x15e/0x230 [ 212.684799] SyS_clone+0x37/0x50 [ 212.688166] ? sys_vfork+0x30/0x30 [ 212.691716] do_syscall_64+0x1e8/0x640 [ 212.695606] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 212.700658] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 212.705858] RIP: 0033:0x45a6f9 [ 212.709055] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 212.716764] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 212.724033] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 212.731415] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 22:56:30 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 22:56:30 executing program 4: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r3, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r5 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0x0) shmctl$IPC_SET(r5, 0x1, &(0x7f0000000840)={{0x0, r6}, 0xb8fb, 0xffc, 0x0, 0x0, 0x0, r7, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r4, r6}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) r8 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r9, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) r10 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r10, r10, &(0x7f0000000180)=0x74000000, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r8, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 212.739120] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 212.746392] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 22:56:30 executing program 3: prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) 22:56:30 executing program 1: r0 = open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r1, r0, 0x0, 0x40801001) r2 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) ftruncate(r2, 0x1000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x0) getsockname$packet(r2, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r4 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getpgid(0x0) shmctl$IPC_SET(r4, 0x1, &(0x7f0000000840)={{0x0, r5}, 0xb8fb, 0xffc, 0x0, 0x8000, 0x0, r6, 0x81}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@loopback, @in6=@mcast1, 0x4e22, 0x5, 0x4e24, 0x0, 0xa, 0xe0, 0x180, 0x3b, r3, r5}, {0x1000, 0xc5, 0xffff, 0x400, 0x6, 0x2, 0xff, 0x80000000}, {0x1ce8, 0x3f, 0x6, 0xbe}, 0x8000, 0x6e6bbb, 0x0, 0x0, 0x3, 0x2}, {{@in6=@rand_addr="1cb02fbe63470d1a4fe282b959527435", 0x4d6}, 0xa, @in6=@mcast2, 0x3506, 0x2, 0x3, 0xff, 0x7fffffff, 0x5, 0x200}}, 0xe8) pipe(0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x3) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000280)={0x8, [0x6, 0xfff7, 0x2, 0x400, 0x6, 0xff7f, 0x9, 0x0]}, &(0x7f00000002c0)=0x14) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, 0x0, 0xfffffffffffffff9) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='mounts\x00') sendfile(r9, r9, &(0x7f0000000180)=0x74000000, 0x0) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(r10, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r7, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) [ 212.990676] ================================================================== [ 212.998284] BUG: KASAN: use-after-free in put_pid_ns+0x80/0x90 [ 213.004267] Read of size 8 at addr ffff8880911ef1d0 by task syz-executor.2/9801 [ 213.011820] [ 213.013459] CPU: 1 PID: 9801 Comm: syz-executor.2 Not tainted 4.14.158-syzkaller #0 [ 213.021251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.031397] Call Trace: [ 213.034003] dump_stack+0x142/0x197 [ 213.037641] ? put_pid_ns+0x80/0x90 [ 213.041279] print_address_description.cold+0x7c/0x1dc [ 213.046558] ? put_pid_ns+0x80/0x90 [ 213.050188] kasan_report.cold+0xa9/0x2af [ 213.054346] __asan_report_load8_noabort+0x14/0x20 [ 213.059275] put_pid_ns+0x80/0x90 [ 213.062736] free_nsproxy+0x104/0x200 [ 213.066539] switch_task_namespaces+0x98/0xb0 [ 213.071038] exit_task_namespaces+0x18/0x20 [ 213.075536] copy_process.part.0+0x3c67/0x6a70 [ 213.080127] ? debug_smp_processor_id+0x1c/0x20 [ 213.084802] ? perf_trace_lock+0x109/0x500 [ 213.089040] ? check_preemption_disabled+0x3c/0x250 [ 213.094061] ? debug_smp_processor_id+0x1c/0x20 [ 213.098744] ? __cleanup_sighand+0x50/0x50 [ 213.102984] ? lock_downgrade+0x740/0x740 [ 213.107137] _do_fork+0x19e/0xce0 [ 213.110594] ? fork_idle+0x280/0x280 [ 213.114314] ? fput+0xd4/0x150 [ 213.117508] ? SyS_write+0x15e/0x230 [ 213.121225] SyS_clone+0x37/0x50 [ 213.124596] ? sys_vfork+0x30/0x30 [ 213.128141] do_syscall_64+0x1e8/0x640 [ 213.132030] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.136881] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.142071] RIP: 0033:0x45a6f9 [ 213.145259] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 213.152977] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 213.160419] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 213.167708] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.174989] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 213.182264] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 213.189568] [ 213.191197] Allocated by task 9801: [ 213.194827] save_stack_trace+0x16/0x20 [ 213.198808] save_stack+0x45/0xd0 [ 213.202283] kasan_kmalloc+0xce/0xf0 [ 213.206007] kasan_slab_alloc+0xf/0x20 [ 213.209894] kmem_cache_alloc+0x12e/0x780 [ 213.214047] copy_pid_ns+0x1af/0xa50 [ 213.217769] create_new_namespaces+0x267/0x720 [ 213.222353] copy_namespaces+0x284/0x310 [ 213.226415] copy_process.part.0+0x2603/0x6a70 [ 213.230994] _do_fork+0x19e/0xce0 [ 213.234445] SyS_clone+0x37/0x50 [ 213.237812] do_syscall_64+0x1e8/0x640 [ 213.241702] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.246885] [ 213.248510] Freed by task 9827: [ 213.252309] save_stack_trace+0x16/0x20 [ 213.256281] save_stack+0x45/0xd0 [ 213.259735] kasan_slab_free+0x75/0xc0 [ 213.263621] kmem_cache_free+0x83/0x2b0 [ 213.267602] delayed_free_pidns+0x89/0xb0 [ 213.271749] rcu_process_callbacks+0x7b8/0x12b0 [ 213.276419] __do_softirq+0x244/0x9a0 [ 213.280213] [ 213.281836] The buggy address belongs to the object at ffff8880911ee998 [ 213.281836] which belongs to the cache pid_namespace of size 2264 [ 213.294774] The buggy address is located 2104 bytes inside of [ 213.294774] 2264-byte region [ffff8880911ee998, ffff8880911ef270) [ 213.306819] The buggy address belongs to the page: [ 213.311754] page:ffffea0002447b80 count:1 mapcount:0 mapping:ffff8880911ee040 index:0x0 compound_mapcount: 0 [ 213.321919] flags: 0xfffe0000008100(slab|head) [ 213.326510] raw: 00fffe0000008100 ffff8880911ee040 0000000000000000 0000000100000003 [ 213.334396] raw: ffffea00015f6a20 ffff8880a6511b48 ffff8882194ca200 0000000000000000 [ 213.342278] page dumped because: kasan: bad access detected [ 213.347991] [ 213.349619] Memory state around the buggy address: [ 213.354549] ffff8880911ef080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 213.361917] ffff8880911ef100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 213.369281] >ffff8880911ef180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 213.376644] ^ [ 213.382620] ffff8880911ef200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 213.390011] ffff8880911ef280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fb fb [ 213.397374] ================================================================== [ 213.404841] Disabling lock debugging due to kernel taint [ 213.418399] Kernel panic - not syncing: panic_on_warn set ... [ 213.418399] [ 213.425797] CPU: 1 PID: 9801 Comm: syz-executor.2 Tainted: G B 4.14.158-syzkaller #0 [ 213.434804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 213.444157] Call Trace: [ 213.447647] dump_stack+0x142/0x197 [ 213.451279] ? put_pid_ns+0x80/0x90 [ 213.454907] panic+0x1f9/0x42d [ 213.458103] ? add_taint.cold+0x16/0x16 [ 213.462077] ? ___preempt_schedule+0x16/0x18 [ 213.466488] kasan_end_report+0x47/0x4f [ 213.470463] kasan_report.cold+0x130/0x2af [ 213.474699] __asan_report_load8_noabort+0x14/0x20 [ 213.479627] put_pid_ns+0x80/0x90 [ 213.483089] free_nsproxy+0x104/0x200 [ 213.486886] switch_task_namespaces+0x98/0xb0 [ 213.491387] exit_task_namespaces+0x18/0x20 [ 213.496001] copy_process.part.0+0x3c67/0x6a70 [ 213.501366] ? debug_smp_processor_id+0x1c/0x20 [ 213.506039] ? perf_trace_lock+0x109/0x500 [ 213.510272] ? check_preemption_disabled+0x3c/0x250 [ 213.515288] ? debug_smp_processor_id+0x1c/0x20 [ 213.520053] ? __cleanup_sighand+0x50/0x50 [ 213.524297] ? lock_downgrade+0x740/0x740 [ 213.528540] _do_fork+0x19e/0xce0 [ 213.532001] ? fork_idle+0x280/0x280 [ 213.535716] ? fput+0xd4/0x150 [ 213.538909] ? SyS_write+0x15e/0x230 [ 213.542622] SyS_clone+0x37/0x50 [ 213.545985] ? sys_vfork+0x30/0x30 [ 213.549530] do_syscall_64+0x1e8/0x640 [ 213.553421] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 213.558271] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 213.563472] RIP: 0033:0x45a6f9 [ 213.566660] RSP: 002b:00007f52fe287c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 213.574368] RAX: ffffffffffffffda RBX: 00007f52fe287c90 RCX: 000000000045a6f9 [ 213.581772] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 213.589041] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 213.596312] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f52fe2886d4 [ 213.603587] R13: 00000000004c0df1 R14: 00000000004d4a88 R15: 0000000000000004 [ 213.612280] Kernel Offset: disabled [ 213.615908] Rebooting in 86400 seconds..