fff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/176, 0xb0}, 0x40000000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000280)={{{@in=@multicast1, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000380)=0xffffffffffffff14) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r3) mount$fuseblk(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240), 0x8022, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64000030303030343030303134303030302c757365720600643d", @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=0xee00, @ANYBLOB=',allow_other,obj_type=,smackfshat=&,subj_role=vfat\x00,euid<', @ANYRESDEC=r3, @ANYBLOB="2c686173682c6673757569643d62626563623832632d653437622d6563a2572d323435392d66353163653463382c7063723d30303030303030303030303030303030303031362c736d61636b66736465663d76666174002c00"]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r0, 0x8008f512, &(0x7f00000000c0)) ioctl$TIOCSPTLCK(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)=0x1) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000040)="eb3c906d6b66732e666174000203010002", 0x11}, {0x0, 0x0, 0x600}], 0x8703, &(0x7f0000000140)=ANY=[@ANYBLOB]) r4 = dup2(r2, r2) setsockopt$inet6_MRT6_ADD_MFC(r4, 0x29, 0xcc, &(0x7f0000000500)={{0xa, 0x4e24, 0x200, @private1, 0x15eb}, {0xa, 0x4e23, 0x7fff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x8ed}, 0x100, [0x9599, 0x0, 0x7, 0x2, 0x0, 0x7ff, 0xeb54, 0x10000]}, 0x5c) 17:16:28 executing program 5: flock(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:28 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/176, 0xb0}, 0x40000000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:29 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 4: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 4: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:29 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/176, 0xb0}, 0x40000000) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:30 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 4: r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:30 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 4: flock(0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000500), 0x0, &(0x7f0000000580)=""/176, 0xb0}, 0x40000000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:31 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:31 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) chown(&(0x7f0000000000)='./control\x00', 0xee00, r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 5: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000240)=0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x4e141, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000047c0)={0x2020}, 0xfffffdb1) lstat(&(0x7f0000002600)='./file0\x00', 0x0) getresgid(0x0, &(0x7f0000004740), &(0x7f0000006800)) read$FUSE(0xffffffffffffffff, &(0x7f0000006b00)={0x2020}, 0x2020) getgid() syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000002700)="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", 0x2000, 0x0) getresuid(&(0x7f0000002680), &(0x7f00000026c0), &(0x7f0000002700)) newfstatat(0xffffffffffffff9c, &(0x7f0000002740)='./file0\x00', &(0x7f0000002780), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0xc1, 0xfa, 0xff, 0x8, 0x0, 0x1, 0x48000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10001, 0x0, @perf_bp={&(0x7f0000000140), 0xa}, 0x0, 0x8131, 0x401, 0x1, 0x2, 0x7, 0x5, 0x0, 0xfff, 0x0, 0x3ff}, 0x0, 0x5, 0xffffffffffffffff, 0xa) sendfile(r1, r2, 0x0, 0x401ffc000) open(&(0x7f00000000c0)='./file0\x00', 0x410f80, 0x28) fallocate(r0, 0x100000011, 0x0, 0x80019e) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) socket(0x10, 0x2, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = socket(0x10, 0x2, 0x0) setxattr(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)=@known='trusted.overlay.upper\x00', &(0x7f00000000c0)='/\x03-+*\x00', 0x6, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f0000000240)=0xc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x800000808d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000000000006, 0x0) write$binfmt_aout(r3, &(0x7f0000000240)=ANY=[], 0xfffffd2d) fcntl$setpipe(r2, 0x407, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000780)="1eca340a183c1f48c9310bae92db3bdf15f8a9febb32cec6841c7b97056ccaaaa9", 0x21}], 0x1, 0x0) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYRES64, @ANYRES16=0x0, @ANYBLOB="9e0927bd7000fcdbdf255e00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990001000080740000000800a00000000000050018011d000000080026006c090000"], 0x40}, 0x1, 0x0, 0x0, 0x40040}, 0x4000004) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x1, 0x10000011, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) mkdir(&(0x7f00000007c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x92) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) open(&(0x7f00000002c0)='./file0/file0\x00', 0x20c980, 0x0) write$binfmt_script(r4, &(0x7f0000000400)={'#! ', '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/', [{0x20, '/dev/ptmx\x00'}, {0x20, '/dev/ptmx\x00'}, {0x20, '/dev/ptmx\x00'}], 0xa, "e9fc690fbaa3fc97800a5899e44e728a060c13511d70ee1862ade48d615582756e453d14504c801c33e50cad1d58df3760350b3d6f23a1579ef11346d1417e99e44d403bb19f4efb14de26e41bc907b2003276711a8138d0ce5e93bc25fe51a71243807c36239fb67eff7d43f8e6"}, 0xe0) symlink(&(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x0, 0x7fff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000380)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000040)='./file0\x00') 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:32 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 3: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) preadv(r1, &(0x7f00000004c0)=[{&(0x7f0000000500)=""/228, 0xe4}, {&(0x7f00000003c0)=""/79, 0x4f}, {&(0x7f0000000440)=""/68, 0x44}, {&(0x7f0000000100)=""/55, 0x37}], 0x4, 0xd9f, 0x0) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r1, 0x40189429, &(0x7f00000000c0)={0x1, 0x7f, 0x8000}) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) r2 = getpgid(0x0) fsetxattr(r1, &(0x7f0000002a40)=ANY=[@ANYBLOB="6f73322e2f63cceac2ba91c3d95d494765cc3df806be5c5676686f73742d76736f636b00"], &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x11, 0x5) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xfc, 0x0, 0x0, 0x3, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50000, 0x1}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(r1, 0xf, &(0x7f0000000000)={0x0, r2}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x2000, 0x4) r5 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r5, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(r5, &(0x7f0000000340)=[{&(0x7f00000002c0)=""/91, 0x5b}, {&(0x7f0000000600)=""/144, 0x90}], 0x2, &(0x7f00000029c0)=[{&(0x7f0000000380)=""/19, 0x13}, {&(0x7f00000006c0)=""/152, 0x98}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000001780)=""/4096, 0x1000}, {&(0x7f0000002780)=""/53, 0x35}, {&(0x7f00000027c0)=""/248, 0xf8}, {&(0x7f00000028c0)=""/33, 0x21}, {&(0x7f0000002900)=""/174, 0xae}], 0x8, 0x0) connect$vsock_stream(r3, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r3, 0x0) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 3: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 3: chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 4: sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:33 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 17:16:33 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:33 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) 17:16:34 executing program 2 (fault-call:4 fault-nth:0): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 104.823987][ T1683] FAULT_INJECTION: forcing a failure. [ 104.823987][ T1683] name failslab, interval 1, probability 0, space 0, times 1 [ 104.846880][ T1683] CPU: 0 PID: 1683 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 104.857078][ T1683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 104.867131][ T1683] Call Trace: [ 104.870432][ T1683] dump_stack+0x1d8/0x24e [ 104.874759][ T1683] ? devkmsg_release+0x11c/0x11c [ 104.879705][ T1683] ? check_preemption_disabled+0x9e/0x330 [ 104.885427][ T1683] ? show_regs_print_info+0x12/0x12 [ 104.890642][ T1683] ? debug_smp_processor_id+0x20/0x20 [ 104.896009][ T1683] ? __fsnotify_parent+0x310/0x310 [ 104.901116][ T1683] should_fail+0x6f6/0x860 [ 104.905530][ T1683] ? setup_fault_attr+0x3d0/0x3d0 [ 104.910813][ T1683] ? vfs_write+0x422/0x4e0 [ 104.915221][ T1683] ? getname_flags+0xba/0x640 [ 104.919889][ T1683] should_failslab+0x5/0x20 [ 104.924423][ T1683] kmem_cache_alloc+0x36/0x290 [ 104.929187][ T1683] ? debug_smp_processor_id+0x20/0x20 [ 104.934552][ T1683] getname_flags+0xba/0x640 [ 104.939058][ T1683] __x64_sys_execveat+0xb6/0xe0 [ 104.943931][ T1683] do_syscall_64+0xcb/0x1e0 [ 104.948431][ T1683] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 104.952617][ T1711] FAULT_INJECTION: forcing a failure. [ 104.952617][ T1711] name failslab, interval 1, probability 0, space 0, times 1 [ 104.954315][ T1683] RIP: 0033:0x4665d9 [ 104.954324][ T1683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 0: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 0 (fault-call:4 fault-nth:0): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 104.954329][ T1683] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 104.954337][ T1683] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 104.954350][ T1683] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 105.014798][ T1683] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 105.022758][ T1683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.030733][ T1683] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 105.038730][ T1711] CPU: 1 PID: 1711 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 105.048873][ T1711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.058955][ T1711] Call Trace: [ 105.062250][ T1711] dump_stack+0x1d8/0x24e [ 105.066579][ T1711] ? devkmsg_release+0x11c/0x11c [ 105.071513][ T1711] ? show_regs_print_info+0x12/0x12 [ 105.076708][ T1711] ? debug_smp_processor_id+0x20/0x20 [ 105.082075][ T1711] ? __fsnotify_parent+0x310/0x310 [ 105.087535][ T1711] should_fail+0x6f6/0x860 [ 105.091982][ T1711] ? setup_fault_attr+0x3d0/0x3d0 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, 0x0, 0x0, 0x0, 0x1100) [ 105.097093][ T1711] ? vfs_write+0x422/0x4e0 [ 105.101654][ T1711] ? getname_flags+0xba/0x640 [ 105.106330][ T1711] should_failslab+0x5/0x20 [ 105.110827][ T1711] kmem_cache_alloc+0x36/0x290 [ 105.115585][ T1711] ? debug_smp_processor_id+0x20/0x20 [ 105.120949][ T1711] getname_flags+0xba/0x640 [ 105.125448][ T1711] __x64_sys_execveat+0xb6/0xe0 [ 105.130297][ T1711] do_syscall_64+0xcb/0x1e0 [ 105.134797][ T1711] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.140682][ T1711] RIP: 0033:0x4665d9 [ 105.144571][ T1711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.164170][ T1711] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 105.172598][ T1711] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 105.180543][ T1711] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 105.188655][ T1711] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 17:16:34 executing program 2 (fault-call:4 fault-nth:1): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 3: mkdir(0x0, 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 105.196716][ T1711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.204667][ T1711] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={0x0, 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 105.254302][ T1738] FAULT_INJECTION: forcing a failure. [ 105.254302][ T1738] name failslab, interval 1, probability 0, space 0, times 0 [ 105.305390][ T1738] CPU: 0 PID: 1738 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 105.315577][ T1738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.325778][ T1738] Call Trace: [ 105.329166][ T1738] dump_stack+0x1d8/0x24e [ 105.333496][ T1738] ? devkmsg_release+0x11c/0x11c [ 105.338429][ T1738] ? show_regs_print_info+0x12/0x12 [ 105.343627][ T1738] should_fail+0x6f6/0x860 [ 105.348042][ T1738] ? setup_fault_attr+0x3d0/0x3d0 [ 105.353067][ T1738] ? dup_fd+0x6b/0xb60 [ 105.355730][ T1756] FAULT_INJECTION: forcing a failure. [ 105.355730][ T1756] name failslab, interval 1, probability 0, space 0, times 0 [ 105.357131][ T1738] should_failslab+0x5/0x20 [ 105.357142][ T1738] kmem_cache_alloc+0x36/0x290 [ 105.357157][ T1738] ? __kasan_kmalloc+0x1a3/0x1e0 [ 105.384017][ T1738] ? proc_fail_nth_read+0x1c0/0x1c0 [ 105.389256][ T1738] dup_fd+0x6b/0xb60 [ 105.393147][ T1738] unshare_files+0x11b/0x2d0 [ 105.397734][ T1738] ? __ia32_sys_unshare+0x40/0x40 [ 105.402746][ T1738] __do_execve_file+0x24d/0x17e0 [ 105.407684][ T1738] ? __virt_addr_valid+0x1fd/0x290 [ 105.412782][ T1738] ? do_execve_file+0x40/0x40 [ 105.417444][ T1738] ? getname_flags+0x1fe/0x640 [ 105.422192][ T1738] __x64_sys_execveat+0xcf/0xe0 [ 105.427033][ T1738] do_syscall_64+0xcb/0x1e0 [ 105.431523][ T1738] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.437431][ T1738] RIP: 0033:0x4665d9 [ 105.441323][ T1738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.461003][ T1738] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 105.469403][ T1738] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 105.477574][ T1738] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 105.485834][ T1738] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 105.493909][ T1738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:16:34 executing program 0 (fault-call:4 fault-nth:1): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 105.501882][ T1738] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 105.509880][ T1756] CPU: 1 PID: 1756 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 105.520040][ T1756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.530190][ T1756] Call Trace: [ 105.533486][ T1756] dump_stack+0x1d8/0x24e [ 105.538166][ T1756] ? devkmsg_release+0x11c/0x11c [ 105.543132][ T1756] ? show_regs_print_info+0x12/0x12 [ 105.548333][ T1756] should_fail+0x6f6/0x860 [ 105.552785][ T1756] ? setup_fault_attr+0x3d0/0x3d0 [ 105.557900][ T1756] ? dup_fd+0x6b/0xb60 [ 105.561978][ T1756] should_failslab+0x5/0x20 [ 105.566676][ T1756] kmem_cache_alloc+0x36/0x290 [ 105.571446][ T1756] ? __kasan_kmalloc+0x1a3/0x1e0 [ 105.576383][ T1756] ? proc_fail_nth_read+0x1c0/0x1c0 [ 105.581580][ T1756] dup_fd+0x6b/0xb60 [ 105.585479][ T1756] unshare_files+0x11b/0x2d0 [ 105.590061][ T1756] ? __ia32_sys_unshare+0x40/0x40 [ 105.595161][ T1756] __do_execve_file+0x24d/0x17e0 [ 105.600084][ T1756] ? __virt_addr_valid+0x1fd/0x290 [ 105.605180][ T1756] ? do_execve_file+0x40/0x40 [ 105.609828][ T1756] ? getname_flags+0x1fe/0x640 [ 105.614582][ T1756] __x64_sys_execveat+0xcf/0xe0 [ 105.619411][ T1756] do_syscall_64+0xcb/0x1e0 [ 105.623900][ T1756] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.629774][ T1756] RIP: 0033:0x4665d9 [ 105.633637][ T1756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:34 executing program 2 (fault-call:4 fault-nth:2): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={0x0, 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:34 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(0x0, 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:34 executing program 5 (fault-call:4 fault-nth:0): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 105.653224][ T1756] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 105.661607][ T1756] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 105.669638][ T1756] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 105.677580][ T1756] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 105.685536][ T1756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.693478][ T1756] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 17:16:34 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={0x0, 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:35 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, 0x0}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:35 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 105.729310][ T1771] FAULT_INJECTION: forcing a failure. [ 105.729310][ T1771] name failslab, interval 1, probability 0, space 0, times 0 [ 105.760670][ T1773] FAULT_INJECTION: forcing a failure. [ 105.760670][ T1773] name failslab, interval 1, probability 0, space 0, times 0 [ 105.792130][ T1771] CPU: 1 PID: 1771 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 105.802327][ T1771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 105.812522][ T1771] Call Trace: [ 105.815817][ T1771] dump_stack+0x1d8/0x24e [ 105.820143][ T1771] ? devkmsg_release+0x11c/0x11c [ 105.825097][ T1771] ? show_regs_print_info+0x12/0x12 [ 105.830285][ T1771] should_fail+0x6f6/0x860 [ 105.834690][ T1771] ? setup_fault_attr+0x3d0/0x3d0 [ 105.839720][ T1771] ? alloc_fdtable+0x93/0x250 [ 105.844383][ T1771] should_failslab+0x5/0x20 [ 105.848871][ T1771] kmem_cache_alloc_trace+0x39/0x2b0 [ 105.854157][ T1771] ? _raw_spin_lock+0xa3/0x1b0 [ 105.858908][ T1771] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 105.864269][ T1771] alloc_fdtable+0x93/0x250 [ 105.868766][ T1771] dup_fd+0x785/0xb60 [ 105.872743][ T1771] unshare_files+0x11b/0x2d0 [ 105.877324][ T1771] ? __ia32_sys_unshare+0x40/0x40 [ 105.882338][ T1771] __do_execve_file+0x24d/0x17e0 [ 105.887266][ T1771] ? __virt_addr_valid+0x1fd/0x290 [ 105.892374][ T1771] ? do_execve_file+0x40/0x40 [ 105.897090][ T1771] ? getname_flags+0x1fe/0x640 [ 105.901844][ T1771] __x64_sys_execveat+0xcf/0xe0 [ 105.906699][ T1771] do_syscall_64+0xcb/0x1e0 [ 105.911211][ T1771] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 105.917198][ T1771] RIP: 0033:0x4665d9 [ 105.921102][ T1771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 105.940812][ T1771] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 105.949211][ T1771] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 105.957256][ T1771] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 105.965387][ T1771] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 105.973622][ T1771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 105.981593][ T1771] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 105.989561][ T1773] CPU: 0 PID: 1773 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 105.999713][ T1773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.009759][ T1773] Call Trace: [ 106.013055][ T1773] dump_stack+0x1d8/0x24e [ 106.017420][ T1773] ? devkmsg_release+0x11c/0x11c [ 106.022356][ T1773] ? show_regs_print_info+0x12/0x12 [ 106.027562][ T1773] ? debug_smp_processor_id+0x20/0x20 [ 106.032925][ T1773] ? __fsnotify_parent+0x310/0x310 [ 106.038035][ T1773] should_fail+0x6f6/0x860 [ 106.040621][ T1793] FAULT_INJECTION: forcing a failure. [ 106.040621][ T1793] name failslab, interval 1, probability 0, space 0, times 0 [ 106.042530][ T1773] ? setup_fault_attr+0x3d0/0x3d0 [ 106.042542][ T1773] ? vfs_write+0x422/0x4e0 [ 106.042551][ T1773] ? getname_flags+0xba/0x640 [ 106.042561][ T1773] should_failslab+0x5/0x20 [ 106.042577][ T1773] kmem_cache_alloc+0x36/0x290 [ 106.056058][ T1794] FAULT_INJECTION: forcing a failure. [ 106.056058][ T1794] name failslab, interval 1, probability 0, space 0, times 0 [ 106.060423][ T1773] ? debug_smp_processor_id+0x20/0x20 [ 106.060434][ T1773] getname_flags+0xba/0x640 [ 106.060448][ T1773] __x64_sys_execveat+0xb6/0xe0 [ 106.106060][ T1773] do_syscall_64+0xcb/0x1e0 [ 106.110576][ T1773] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.116453][ T1773] RIP: 0033:0x4665d9 [ 106.120336][ T1773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:35 executing program 0 (fault-call:4 fault-nth:2): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:35 executing program 4: mkdir(&(0x7f0000000240)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f0000000200)='./file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000029c0)=ANY=[@ANYBLOB="6c6f77091b648cb1f389da612dff9b80804086047e9224c809cfb59bb11763c1f07b4e00001300000014e1d2e9000a91332794037955450efdc2a672f7b5ad3b13a56e1c70cced105d85ce716339fa20921c862de45ce048ddaf1737f6ad59772a0d69fb"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000440)='./bus\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setxattr$incfs_metadata(&(0x7f0000002840)='./bus\x00', &(0x7f0000002880), &(0x7f00000028c0)="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", 0xff, 0x1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000380)=@x25={0x9, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)=""/155, 0x80}], 0x1, &(0x7f0000001680)=""/4096, 0x1000}, 0x50}, {{&(0x7f0000000540)=@sco={0x1f, @none}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f00000005c0)=""/58, 0x2e}], 0x2, &(0x7f0000002680)=""/159, 0x9f}, 0x10001}], 0x2, 0x10001, &(0x7f0000002800)={r2, r3+10000000}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f00000002c0)="dfec4dce18573e34a4923cc6325361861457f3c56b318d8daddf3c86d423802794d3c2cc8964ed9e7bc2a04c1c75f2910954b9f7bb52b966adc14c8321622c381261ee9b62404807ccafd1b1b60f859c7b6f7d34e7ad630f0d5a9550f6a35acb2d8a6b78a925fa704653689fe5c3efb8808fdf850affa8d7d7229ac73a48c129b13707f24a66af24196dd2d012a782e262ba1c6b9a8be514ae46cc80", 0x9c}], 0x2, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="0000000000000000000000000000000001"]) 17:16:35 executing program 2 (fault-call:4 fault-nth:3): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 106.139951][ T1773] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 106.148388][ T1773] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 106.156409][ T1773] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 106.164369][ T1773] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 106.172331][ T1773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.180286][ T1773] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 106.188260][ T1794] CPU: 1 PID: 1794 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 106.198405][ T1794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.208444][ T1794] Call Trace: [ 106.211835][ T1794] dump_stack+0x1d8/0x24e [ 106.216163][ T1794] ? devkmsg_release+0x11c/0x11c [ 106.221086][ T1794] ? show_regs_print_info+0x12/0x12 [ 106.226273][ T1794] should_fail+0x6f6/0x860 [ 106.230673][ T1794] ? setup_fault_attr+0x3d0/0x3d0 [ 106.235697][ T1794] ? alloc_fdtable+0x93/0x250 [ 106.240360][ T1794] should_failslab+0x5/0x20 [ 106.244848][ T1794] kmem_cache_alloc_trace+0x39/0x2b0 [ 106.250216][ T1794] ? _raw_spin_lock+0xa3/0x1b0 [ 106.254973][ T1794] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 106.260325][ T1794] alloc_fdtable+0x93/0x250 [ 106.264815][ T1794] dup_fd+0x785/0xb60 [ 106.268816][ T1794] unshare_files+0x11b/0x2d0 [ 106.273503][ T1794] ? __ia32_sys_unshare+0x40/0x40 [ 106.278513][ T1794] __do_execve_file+0x24d/0x17e0 [ 106.283439][ T1794] ? __virt_addr_valid+0x1fd/0x290 [ 106.288550][ T1794] ? do_execve_file+0x40/0x40 [ 106.293298][ T1794] ? getname_flags+0x1fe/0x640 [ 106.298046][ T1794] __x64_sys_execveat+0xcf/0xe0 [ 106.302883][ T1794] do_syscall_64+0xcb/0x1e0 [ 106.307459][ T1794] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.313335][ T1794] RIP: 0033:0x4665d9 [ 106.317225][ T1794] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.337022][ T1794] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 106.345427][ T1794] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 106.353383][ T1794] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 106.361338][ T1794] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 106.369567][ T1794] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.377524][ T1794] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 17:16:35 executing program 5 (fault-call:4 fault-nth:1): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:35 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:35 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 106.385490][ T1793] CPU: 0 PID: 1793 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 106.395639][ T1793] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.405689][ T1793] Call Trace: [ 106.408980][ T1793] dump_stack+0x1d8/0x24e [ 106.413316][ T1793] ? devkmsg_release+0x11c/0x11c [ 106.418252][ T1793] ? show_regs_print_info+0x12/0x12 [ 106.423446][ T1793] should_fail+0x6f6/0x860 [ 106.427864][ T1793] ? setup_fault_attr+0x3d0/0x3d0 [ 106.432918][ T1793] ? alloc_fdtable+0x93/0x250 [ 106.437679][ T1793] should_failslab+0x5/0x20 17:16:35 executing program 2 (fault-call:4 fault-nth:4): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 106.442181][ T1793] kmem_cache_alloc_trace+0x39/0x2b0 [ 106.447466][ T1793] ? _raw_spin_lock+0xa3/0x1b0 [ 106.452223][ T1793] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 106.457731][ T1793] alloc_fdtable+0x93/0x250 [ 106.462326][ T1793] dup_fd+0x785/0xb60 [ 106.466318][ T1793] unshare_files+0x11b/0x2d0 [ 106.470907][ T1793] ? __ia32_sys_unshare+0x40/0x40 [ 106.475958][ T1793] __do_execve_file+0x24d/0x17e0 [ 106.480984][ T1793] ? __virt_addr_valid+0x1fd/0x290 [ 106.486090][ T1793] ? do_execve_file+0x40/0x40 [ 106.487923][ T1807] FAULT_INJECTION: forcing a failure. [ 106.487923][ T1807] name failslab, interval 1, probability 0, space 0, times 0 [ 106.490760][ T1793] ? getname_flags+0x1fe/0x640 [ 106.490770][ T1793] __x64_sys_execveat+0xcf/0xe0 [ 106.490780][ T1793] do_syscall_64+0xcb/0x1e0 [ 106.490797][ T1793] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.503903][ T1806] FAULT_INJECTION: forcing a failure. [ 106.503903][ T1806] name failslab, interval 1, probability 0, space 0, times 0 [ 106.508340][ T1793] RIP: 0033:0x4665d9 17:16:35 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 106.508350][ T1793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.508356][ T1793] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 106.508364][ T1793] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 106.508376][ T1793] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 106.572592][ T1797] overlayfs: unrecognized mount option "low dŒ±ó‰Úa-ÿ›€€@†~’$È Ïµ›±cÁð{N" or missing value [ 106.576241][ T1793] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 106.602779][ T1793] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.610746][ T1793] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 106.618805][ T1806] CPU: 1 PID: 1806 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 106.628961][ T1806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.639064][ T1806] Call Trace: [ 106.642348][ T1806] dump_stack+0x1d8/0x24e [ 106.646679][ T1806] ? devkmsg_release+0x11c/0x11c [ 106.651599][ T1806] ? show_regs_print_info+0x12/0x12 [ 106.656792][ T1806] should_fail+0x6f6/0x860 [ 106.661331][ T1806] ? setup_fault_attr+0x3d0/0x3d0 [ 106.666348][ T1806] ? kvmalloc_node+0x7e/0xf0 [ 106.670922][ T1806] should_failslab+0x5/0x20 [ 106.675532][ T1806] __kmalloc+0x5f/0x2f0 [ 106.679672][ T1806] ? kvmalloc_node+0x7e/0xf0 [ 106.684274][ T1806] kvmalloc_node+0x7e/0xf0 [ 106.688707][ T1806] alloc_fdtable+0x146/0x250 [ 106.693301][ T1806] dup_fd+0x785/0xb60 [ 106.697274][ T1806] unshare_files+0x11b/0x2d0 [ 106.701868][ T1806] ? __ia32_sys_unshare+0x40/0x40 [ 106.706894][ T1806] __do_execve_file+0x24d/0x17e0 [ 106.711823][ T1806] ? __virt_addr_valid+0x1fd/0x290 [ 106.716936][ T1806] ? do_execve_file+0x40/0x40 [ 106.721650][ T1806] ? getname_flags+0x1fe/0x640 [ 106.726399][ T1806] __x64_sys_execveat+0xcf/0xe0 [ 106.731236][ T1806] do_syscall_64+0xcb/0x1e0 [ 106.735730][ T1806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.741609][ T1806] RIP: 0033:0x4665d9 [ 106.745487][ T1806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.765081][ T1806] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 106.773481][ T1806] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 106.781438][ T1806] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 17:16:36 executing program 0 (fault-call:4 fault-nth:3): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 106.789571][ T1806] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 106.797529][ T1806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.805497][ T1806] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 106.813470][ T1807] CPU: 0 PID: 1807 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 106.823619][ T1807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 106.833699][ T1807] Call Trace: [ 106.836994][ T1807] dump_stack+0x1d8/0x24e [ 106.841324][ T1807] ? devkmsg_release+0x11c/0x11c 17:16:36 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 106.846258][ T1807] ? show_regs_print_info+0x12/0x12 [ 106.851463][ T1807] should_fail+0x6f6/0x860 [ 106.855874][ T1807] ? setup_fault_attr+0x3d0/0x3d0 [ 106.860897][ T1807] ? dup_fd+0x6b/0xb60 [ 106.864962][ T1807] should_failslab+0x5/0x20 [ 106.869475][ T1807] kmem_cache_alloc+0x36/0x290 [ 106.874358][ T1807] ? __kasan_kmalloc+0x1a3/0x1e0 [ 106.879292][ T1807] ? proc_fail_nth_read+0x1c0/0x1c0 [ 106.884521][ T1807] dup_fd+0x6b/0xb60 [ 106.888421][ T1807] unshare_files+0x11b/0x2d0 17:16:36 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:36 executing program 2 (fault-call:4 fault-nth:5): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 106.893158][ T1807] ? __ia32_sys_unshare+0x40/0x40 [ 106.898182][ T1807] __do_execve_file+0x24d/0x17e0 [ 106.903123][ T1807] ? __virt_addr_valid+0x1fd/0x290 [ 106.908357][ T1807] ? do_execve_file+0x40/0x40 [ 106.913033][ T1807] ? getname_flags+0x1fe/0x640 [ 106.917887][ T1807] __x64_sys_execveat+0xcf/0xe0 [ 106.922740][ T1807] do_syscall_64+0xcb/0x1e0 [ 106.927242][ T1807] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 106.933161][ T1807] RIP: 0033:0x4665d9 [ 106.937138][ T1807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 106.956808][ T1807] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 106.962545][ T1830] FAULT_INJECTION: forcing a failure. [ 106.962545][ T1830] name failslab, interval 1, probability 0, space 0, times 0 [ 106.965216][ T1807] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 106.965222][ T1807] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 106.965228][ T1807] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 106.965233][ T1807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.965238][ T1807] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 106.971389][ T1833] FAULT_INJECTION: forcing a failure. [ 106.971389][ T1833] name failslab, interval 1, probability 0, space 0, times 0 [ 107.002730][ T1830] CPU: 1 PID: 1830 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 107.040767][ T1830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.050808][ T1830] Call Trace: [ 107.054119][ T1830] dump_stack+0x1d8/0x24e [ 107.058480][ T1830] ? devkmsg_release+0x11c/0x11c [ 107.063410][ T1830] ? show_regs_print_info+0x12/0x12 [ 107.068595][ T1830] ? _raw_spin_lock+0xa3/0x1b0 [ 107.073346][ T1830] should_fail+0x6f6/0x860 [ 107.077752][ T1830] ? setup_fault_attr+0x3d0/0x3d0 [ 107.082776][ T1830] ? _raw_spin_unlock+0x49/0x60 [ 107.087803][ T1830] ? unshare_files+0x1c7/0x2d0 [ 107.092578][ T1830] ? __do_execve_file+0x29c/0x17e0 [ 107.097695][ T1830] should_failslab+0x5/0x20 [ 107.102186][ T1830] kmem_cache_alloc_trace+0x39/0x2b0 [ 107.107487][ T1830] __do_execve_file+0x29c/0x17e0 [ 107.112418][ T1830] ? __virt_addr_valid+0x1fd/0x290 [ 107.117532][ T1830] ? do_execve_file+0x40/0x40 [ 107.122212][ T1830] ? getname_flags+0x1fe/0x640 [ 107.126963][ T1830] __x64_sys_execveat+0xcf/0xe0 [ 107.132080][ T1830] do_syscall_64+0xcb/0x1e0 [ 107.136570][ T1830] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.142567][ T1830] RIP: 0033:0x4665d9 [ 107.146455][ T1830] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.166152][ T1830] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 107.174546][ T1830] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 107.182501][ T1830] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 107.190470][ T1830] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 107.198426][ T1830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.206403][ T1830] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 107.214477][ T1833] CPU: 0 PID: 1833 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 107.224737][ T1833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.234816][ T1833] Call Trace: [ 107.238107][ T1833] dump_stack+0x1d8/0x24e [ 107.242449][ T1833] ? devkmsg_release+0x11c/0x11c 17:16:36 executing program 4: mkdir(&(0x7f0000000240)='./bus\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) chdir(&(0x7f0000000200)='./file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000029c0)=ANY=[@ANYBLOB="6c6f77091b648cb1f389da612dff9b80804086047e9224c809cfb59bb11763c1f07b4e00001300000014e1d2e9000a91332794037955450efdc2a672f7b5ad3b13a56e1c70cced105d85ce716339fa20921c862de45ce048ddaf1737f6ad59772a0d69fb"]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) chdir(&(0x7f0000000440)='./bus\x00') creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) setxattr$incfs_metadata(&(0x7f0000002840)='./bus\x00', &(0x7f0000002880), &(0x7f00000028c0)="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", 0xff, 0x1) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clock_gettime(0x0, &(0x7f00000027c0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002740)=[{{&(0x7f0000000380)=@x25={0x9, @remote}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000480)=""/155, 0x80}], 0x1, &(0x7f0000001680)=""/4096, 0x1000}, 0x50}, {{&(0x7f0000000540)=@sco={0x1f, @none}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000400)=""/15, 0xf}, {&(0x7f00000005c0)=""/58, 0x2e}], 0x2, &(0x7f0000002680)=""/159, 0x9f}, 0x10001}], 0x2, 0x10001, &(0x7f0000002800)={r2, r3+10000000}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) vmsplice(r4, &(0x7f0000000140)=[{&(0x7f0000000680)="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", 0x1000}, {&(0x7f00000002c0)="dfec4dce18573e34a4923cc6325361861457f3c56b318d8daddf3c86d423802794d3c2cc8964ed9e7bc2a04c1c75f2910954b9f7bb52b966adc14c8321622c381261ee9b62404807ccafd1b1b60f859c7b6f7d34e7ad630f0d5a9550f6a35acb2d8a6b78a925fa704653689fe5c3efb8808fdf850affa8d7d7229ac73a48c129b13707f24a66af24196dd2d012a782e262ba1c6b9a8be514ae46cc80", 0x9c}], 0x2, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000640)=ANY=[@ANYBLOB="0000000000000000000000000000000001"]) 17:16:36 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:36 executing program 5 (fault-call:4 fault-nth:2): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 2 (fault-call:4 fault-nth:6): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 107.247475][ T1833] ? show_regs_print_info+0x12/0x12 [ 107.252758][ T1833] should_fail+0x6f6/0x860 [ 107.253773][ T1804] overlayfs: unrecognized mount option "low dŒ±ó‰Úa-ÿ›€€@†~’$È Ïµ›±cÁð{N" or missing value [ 107.257171][ T1833] ? setup_fault_attr+0x3d0/0x3d0 [ 107.257183][ T1833] ? kvmalloc_node+0x7e/0xf0 [ 107.257200][ T1833] should_failslab+0x5/0x20 [ 107.282725][ T1833] __kmalloc+0x5f/0x2f0 [ 107.286882][ T1833] ? alloc_fdtable+0x93/0x250 [ 107.291560][ T1833] kvmalloc_node+0x7e/0xf0 17:16:36 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 107.295972][ T1833] alloc_fdtable+0xcf/0x250 [ 107.300553][ T1833] dup_fd+0x785/0xb60 [ 107.304533][ T1833] unshare_files+0x11b/0x2d0 [ 107.309156][ T1833] ? __ia32_sys_unshare+0x40/0x40 [ 107.314219][ T1833] __do_execve_file+0x24d/0x17e0 [ 107.319434][ T1833] ? __virt_addr_valid+0x1fd/0x290 [ 107.324544][ T1833] ? do_execve_file+0x40/0x40 [ 107.329216][ T1833] ? getname_flags+0x1fe/0x640 [ 107.334149][ T1833] __x64_sys_execveat+0xcf/0xe0 [ 107.339023][ T1833] do_syscall_64+0xcb/0x1e0 17:16:36 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 107.343532][ T1833] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.349431][ T1833] RIP: 0033:0x4665d9 [ 107.353318][ T1833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.373394][ T1833] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 107.381799][ T1833] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 107.389762][ T1833] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 107.397729][ T1833] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 107.405722][ T1833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.412254][ T1854] FAULT_INJECTION: forcing a failure. [ 107.412254][ T1854] name failslab, interval 1, probability 0, space 0, times 0 [ 107.414986][ T1833] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 107.437272][ T1856] FAULT_INJECTION: forcing a failure. [ 107.437272][ T1856] name failslab, interval 1, probability 0, space 0, times 0 [ 107.451509][ T1854] CPU: 1 PID: 1854 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 107.461754][ T1854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.471991][ T1854] Call Trace: [ 107.475297][ T1854] dump_stack+0x1d8/0x24e [ 107.479653][ T1854] ? devkmsg_release+0x11c/0x11c [ 107.484575][ T1854] ? show_regs_print_info+0x12/0x12 [ 107.489779][ T1854] should_fail+0x6f6/0x860 [ 107.494183][ T1854] ? setup_fault_attr+0x3d0/0x3d0 [ 107.499218][ T1854] ? alloc_fdtable+0x93/0x250 [ 107.503884][ T1854] should_failslab+0x5/0x20 [ 107.508392][ T1854] kmem_cache_alloc_trace+0x39/0x2b0 [ 107.514011][ T1854] ? _raw_spin_lock+0xa3/0x1b0 [ 107.518758][ T1854] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 107.524224][ T1854] alloc_fdtable+0x93/0x250 [ 107.528861][ T1854] dup_fd+0x785/0xb60 [ 107.532996][ T1854] unshare_files+0x11b/0x2d0 [ 107.537589][ T1854] ? __ia32_sys_unshare+0x40/0x40 [ 107.542607][ T1854] __do_execve_file+0x24d/0x17e0 [ 107.547745][ T1854] ? __virt_addr_valid+0x1fd/0x290 [ 107.552849][ T1854] ? do_execve_file+0x40/0x40 [ 107.557514][ T1854] ? getname_flags+0x1fe/0x640 [ 107.562264][ T1854] __x64_sys_execveat+0xcf/0xe0 [ 107.567137][ T1854] do_syscall_64+0xcb/0x1e0 [ 107.571629][ T1854] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.577520][ T1854] RIP: 0033:0x4665d9 [ 107.581402][ T1854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.601165][ T1854] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 107.609582][ T1854] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 107.617554][ T1854] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 107.625509][ T1854] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 107.633464][ T1854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.641418][ T1854] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 17:16:36 executing program 0 (fault-call:4 fault-nth:4): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 107.649384][ T1856] CPU: 0 PID: 1856 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 107.659536][ T1856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.669583][ T1856] Call Trace: [ 107.672873][ T1856] dump_stack+0x1d8/0x24e [ 107.677229][ T1856] ? devkmsg_release+0x11c/0x11c [ 107.682161][ T1856] ? show_regs_print_info+0x12/0x12 [ 107.687556][ T1856] should_fail+0x6f6/0x860 [ 107.689700][ T1865] FAULT_INJECTION: forcing a failure. 17:16:36 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:36 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 107.689700][ T1865] name failslab, interval 1, probability 0, space 0, times 0 [ 107.691969][ T1856] ? setup_fault_attr+0x3d0/0x3d0 [ 107.691983][ T1856] ? prepare_creds+0x20/0x370 [ 107.692000][ T1856] should_failslab+0x5/0x20 [ 107.718709][ T1856] kmem_cache_alloc+0x36/0x290 [ 107.723470][ T1856] prepare_creds+0x20/0x370 [ 107.727971][ T1856] prepare_exec_creds+0x13/0xc0 [ 107.732818][ T1856] __do_execve_file+0x325/0x17e0 [ 107.737755][ T1856] ? do_execve_file+0x40/0x40 [ 107.742430][ T1856] ? getname_flags+0x1fe/0x640 17:16:37 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 107.747187][ T1856] __x64_sys_execveat+0xcf/0xe0 [ 107.752050][ T1856] do_syscall_64+0xcb/0x1e0 [ 107.756632][ T1856] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.762599][ T1856] RIP: 0033:0x4665d9 [ 107.766572][ T1856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.786292][ T1856] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 17:16:37 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 107.794703][ T1856] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 107.802670][ T1856] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 107.810632][ T1856] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 107.818854][ T1856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.826820][ T1856] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 107.834799][ T1865] CPU: 1 PID: 1865 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 107.844980][ T1865] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 107.855034][ T1865] Call Trace: [ 107.858326][ T1865] dump_stack+0x1d8/0x24e [ 107.862638][ T1865] ? devkmsg_release+0x11c/0x11c [ 107.867732][ T1865] ? show_regs_print_info+0x12/0x12 [ 107.872918][ T1865] should_fail+0x6f6/0x860 [ 107.877342][ T1865] ? setup_fault_attr+0x3d0/0x3d0 [ 107.882458][ T1865] ? kvmalloc_node+0x7e/0xf0 [ 107.887130][ T1865] should_failslab+0x5/0x20 [ 107.891639][ T1865] __kmalloc+0x5f/0x2f0 [ 107.895954][ T1865] ? kvmalloc_node+0x7e/0xf0 [ 107.900528][ T1865] kvmalloc_node+0x7e/0xf0 [ 107.904931][ T1865] alloc_fdtable+0x146/0x250 [ 107.909509][ T1865] dup_fd+0x785/0xb60 [ 107.913655][ T1865] unshare_files+0x11b/0x2d0 [ 107.918232][ T1865] ? __ia32_sys_unshare+0x40/0x40 [ 107.923259][ T1865] __do_execve_file+0x24d/0x17e0 [ 107.928185][ T1865] ? __virt_addr_valid+0x1fd/0x290 [ 107.933307][ T1865] ? do_execve_file+0x40/0x40 [ 107.938173][ T1865] ? getname_flags+0x1fe/0x640 [ 107.942922][ T1865] __x64_sys_execveat+0xcf/0xe0 [ 107.947763][ T1865] do_syscall_64+0xcb/0x1e0 [ 107.952279][ T1865] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 107.958158][ T1865] RIP: 0033:0x4665d9 [ 107.962049][ T1865] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 107.981725][ T1865] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 107.990122][ T1865] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 107.998167][ T1865] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 108.006147][ T1865] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 108.014211][ T1865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.022268][ T1865] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 17:16:37 executing program 5 (fault-call:4 fault-nth:3): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 2 (fault-call:4 fault-nth:7): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:37 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 0 (fault-call:4 fault-nth:5): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c0003000800000000000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c0003000800000000000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 108.103582][ T1885] FAULT_INJECTION: forcing a failure. [ 108.103582][ T1885] name failslab, interval 1, probability 0, space 0, times 0 [ 108.118422][ T1887] FAULT_INJECTION: forcing a failure. [ 108.118422][ T1887] name failslab, interval 1, probability 0, space 0, times 0 [ 108.147681][ T1900] FAULT_INJECTION: forcing a failure. 17:16:37 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c0003000800000000000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 108.147681][ T1900] name failslab, interval 1, probability 0, space 0, times 0 [ 108.176980][ T1885] CPU: 0 PID: 1885 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 108.187149][ T1885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.197570][ T1885] Call Trace: [ 108.200860][ T1885] dump_stack+0x1d8/0x24e [ 108.205185][ T1885] ? devkmsg_release+0x11c/0x11c [ 108.210124][ T1885] ? show_regs_print_info+0x12/0x12 [ 108.215353][ T1885] should_fail+0x6f6/0x860 [ 108.219770][ T1885] ? setup_fault_attr+0x3d0/0x3d0 [ 108.224798][ T1885] ? kvmalloc_node+0x7e/0xf0 [ 108.229401][ T1885] should_failslab+0x5/0x20 [ 108.233929][ T1885] __kmalloc+0x5f/0x2f0 [ 108.238084][ T1885] ? alloc_fdtable+0x93/0x250 [ 108.242762][ T1885] kvmalloc_node+0x7e/0xf0 [ 108.247169][ T1885] alloc_fdtable+0xcf/0x250 [ 108.251887][ T1885] dup_fd+0x785/0xb60 [ 108.255867][ T1885] unshare_files+0x11b/0x2d0 [ 108.260448][ T1885] ? __ia32_sys_unshare+0x40/0x40 [ 108.265470][ T1885] __do_execve_file+0x24d/0x17e0 [ 108.270410][ T1885] ? __virt_addr_valid+0x1fd/0x290 [ 108.275512][ T1885] ? do_execve_file+0x40/0x40 [ 108.280181][ T1885] ? getname_flags+0x1fe/0x640 [ 108.284940][ T1885] __x64_sys_execveat+0xcf/0xe0 [ 108.289828][ T1885] do_syscall_64+0xcb/0x1e0 [ 108.294345][ T1885] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 108.300229][ T1885] RIP: 0033:0x4665d9 [ 108.304156][ T1885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.323761][ T1885] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 108.332267][ T1885] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 108.340334][ T1885] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 108.348377][ T1885] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 108.356333][ T1885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.364330][ T1885] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 108.372572][ T1900] CPU: 1 PID: 1900 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 108.382726][ T1900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.392767][ T1900] Call Trace: [ 108.396048][ T1900] dump_stack+0x1d8/0x24e [ 108.400362][ T1900] ? devkmsg_release+0x11c/0x11c [ 108.405286][ T1900] ? show_regs_print_info+0x12/0x12 [ 108.410494][ T1900] should_fail+0x6f6/0x860 [ 108.414900][ T1900] ? setup_fault_attr+0x3d0/0x3d0 [ 108.419926][ T1900] ? kzalloc+0x1d/0x30 [ 108.423980][ T1900] should_failslab+0x5/0x20 [ 108.428475][ T1900] __kmalloc+0x5f/0x2f0 [ 108.432730][ T1900] ? refcount_add_checked+0x50/0x50 [ 108.437921][ T1900] kzalloc+0x1d/0x30 [ 108.441808][ T1900] security_prepare_creds+0x46/0x210 [ 108.447088][ T1900] prepare_creds+0x27b/0x370 [ 108.451666][ T1900] prepare_exec_creds+0x13/0xc0 [ 108.456591][ T1900] __do_execve_file+0x325/0x17e0 [ 108.461534][ T1900] ? do_execve_file+0x40/0x40 [ 108.466197][ T1900] ? getname_flags+0x1fe/0x640 [ 108.470949][ T1900] __x64_sys_execveat+0xcf/0xe0 [ 108.475816][ T1900] do_syscall_64+0xcb/0x1e0 [ 108.480414][ T1900] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 108.486418][ T1900] RIP: 0033:0x4665d9 [ 108.491017][ T1900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.510634][ T1900] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 108.519389][ T1900] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 108.527627][ T1900] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 108.535677][ T1900] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 108.543842][ T1900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:16:37 executing program 5 (fault-call:4 fault-nth:4): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 2 (fault-call:4 fault-nth:8): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:37 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 108.551997][ T1900] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 108.560191][ T1887] CPU: 0 PID: 1887 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 108.570522][ T1887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.580591][ T1887] Call Trace: [ 108.584025][ T1887] dump_stack+0x1d8/0x24e [ 108.588371][ T1887] ? devkmsg_release+0x11c/0x11c [ 108.593307][ T1887] ? show_regs_print_info+0x12/0x12 [ 108.598506][ T1887] ? _raw_spin_lock+0xa3/0x1b0 17:16:37 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 108.603358][ T1887] should_fail+0x6f6/0x860 [ 108.607777][ T1887] ? setup_fault_attr+0x3d0/0x3d0 [ 108.612800][ T1887] ? _raw_spin_unlock+0x49/0x60 [ 108.617646][ T1887] ? unshare_files+0x1c7/0x2d0 [ 108.622327][ T1929] FAULT_INJECTION: forcing a failure. [ 108.622327][ T1929] name failslab, interval 1, probability 0, space 0, times 0 [ 108.622534][ T1887] ? __do_execve_file+0x29c/0x17e0 [ 108.622546][ T1887] should_failslab+0x5/0x20 [ 108.622563][ T1887] kmem_cache_alloc_trace+0x39/0x2b0 [ 108.650209][ T1887] __do_execve_file+0x29c/0x17e0 [ 108.655156][ T1887] ? __virt_addr_valid+0x1fd/0x290 [ 108.660271][ T1887] ? do_execve_file+0x40/0x40 [ 108.664948][ T1887] ? getname_flags+0x1fe/0x640 [ 108.669708][ T1887] __x64_sys_execveat+0xcf/0xe0 [ 108.674560][ T1887] do_syscall_64+0xcb/0x1e0 [ 108.679065][ T1887] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 108.684981][ T1887] RIP: 0033:0x4665d9 [ 108.688875][ T1887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 108.708669][ T1887] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 108.717181][ T1887] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 108.725232][ T1887] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 108.733198][ T1887] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 108.741248][ T1887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 108.746211][ T1937] FAULT_INJECTION: forcing a failure. 17:16:38 executing program 0 (fault-call:4 fault-nth:6): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:38 executing program 4: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:38 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 108.746211][ T1937] name failslab, interval 1, probability 0, space 0, times 0 [ 108.749213][ T1887] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 108.777387][ T1942] FAULT_INJECTION: forcing a failure. [ 108.777387][ T1942] name failslab, interval 1, probability 0, space 0, times 0 [ 108.800641][ T1929] CPU: 1 PID: 1929 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 108.810817][ T1929] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 108.820873][ T1929] Call Trace: [ 108.824163][ T1929] dump_stack+0x1d8/0x24e [ 108.828987][ T1929] ? devkmsg_release+0x11c/0x11c [ 108.833920][ T1929] ? show_regs_print_info+0x12/0x12 [ 108.839113][ T1929] should_fail+0x6f6/0x860 [ 108.843517][ T1929] ? setup_fault_attr+0x3d0/0x3d0 [ 108.848525][ T1929] ? stack_trace_save+0x120/0x1f0 [ 108.853557][ T1929] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 108.859557][ T1929] ? __alloc_file+0x26/0x380 [ 108.864679][ T1929] should_failslab+0x5/0x20 [ 108.869171][ T1929] kmem_cache_alloc+0x36/0x290 [ 108.873923][ T1929] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 108.880149][ T1929] __alloc_file+0x26/0x380 [ 108.884561][ T1929] ? alloc_empty_file+0x49/0x1b0 [ 108.889510][ T1929] alloc_empty_file+0xa9/0x1b0 [ 108.894265][ T1929] path_openat+0x125/0x3da0 [ 108.898761][ T1929] ? is_bpf_text_address+0x280/0x2a0 [ 108.904129][ T1929] ? stack_trace_save+0x1f0/0x1f0 [ 108.909143][ T1929] ? arch_stack_walk+0xf8/0x140 [ 108.913985][ T1929] ? stack_trace_save+0x120/0x1f0 [ 108.919015][ T1929] ? do_filp_open+0x450/0x450 [ 108.923680][ T1929] ? stack_trace_save+0x120/0x1f0 [ 108.928692][ T1929] ? stack_trace_snprint+0x150/0x150 [ 108.933965][ T1929] ? __kasan_kmalloc+0x1a3/0x1e0 [ 108.938884][ T1929] ? stack_trace_snprint+0x150/0x150 [ 108.944155][ T1929] ? __kasan_kmalloc+0x137/0x1e0 [ 108.949080][ T1929] ? __kmalloc+0x174/0x2f0 [ 108.953484][ T1929] ? security_prepare_creds+0x46/0x210 [ 108.959016][ T1929] do_filp_open+0x208/0x450 [ 108.963511][ T1929] ? vfs_tmpfile+0x210/0x210 [ 108.968180][ T1929] ? do_open_execat+0xab/0x860 [ 108.972930][ T1929] do_open_execat+0x175/0x860 [ 108.977594][ T1929] ? memcpy+0x38/0x50 [ 108.981563][ T1929] ? open_exec+0x50/0x50 [ 108.985795][ T1929] ? selinux_cred_prepare+0x72/0x80 [ 108.990992][ T1929] ? __rcu_read_lock+0x50/0x50 [ 108.995741][ T1929] ? prepare_creds+0x28f/0x370 [ 109.000504][ T1929] ? key_put+0x64/0x70 [ 109.004567][ T1929] __do_execve_file+0x64a/0x17e0 [ 109.009502][ T1929] ? do_execve_file+0x40/0x40 [ 109.014168][ T1929] ? getname_flags+0x1fe/0x640 [ 109.019113][ T1929] __x64_sys_execveat+0xcf/0xe0 [ 109.023954][ T1929] do_syscall_64+0xcb/0x1e0 [ 109.028456][ T1929] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.034333][ T1929] RIP: 0033:0x4665d9 [ 109.038215][ T1929] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 109.057892][ T1929] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 109.066554][ T1929] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 109.074660][ T1929] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 109.082629][ T1929] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 109.090672][ T1929] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.098715][ T1929] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 109.106683][ T1942] CPU: 0 PID: 1942 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 109.116867][ T1942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.126917][ T1942] Call Trace: [ 109.130212][ T1942] dump_stack+0x1d8/0x24e [ 109.134703][ T1942] ? devkmsg_release+0x11c/0x11c [ 109.139649][ T1942] ? show_regs_print_info+0x12/0x12 [ 109.144861][ T1942] should_fail+0x6f6/0x860 [ 109.149307][ T1942] ? setup_fault_attr+0x3d0/0x3d0 [ 109.154319][ T1942] ? prepare_creds+0x20/0x370 [ 109.158981][ T1942] should_failslab+0x5/0x20 [ 109.163493][ T1942] kmem_cache_alloc+0x36/0x290 [ 109.168256][ T1942] prepare_creds+0x20/0x370 [ 109.172762][ T1942] prepare_exec_creds+0x13/0xc0 [ 109.177612][ T1942] __do_execve_file+0x325/0x17e0 [ 109.182651][ T1942] ? do_execve_file+0x40/0x40 [ 109.187311][ T1942] ? getname_flags+0x1fe/0x640 [ 109.192062][ T1942] __x64_sys_execveat+0xcf/0xe0 [ 109.196989][ T1942] do_syscall_64+0xcb/0x1e0 [ 109.201480][ T1942] entry_SYSCALL_64_after_hwframe+0x44/0xa9 17:16:38 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 109.207360][ T1942] RIP: 0033:0x4665d9 [ 109.211332][ T1942] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.230929][ T1942] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 109.239335][ T1942] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 109.247559][ T1942] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 109.255522][ T1942] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 109.263840][ T1942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.271842][ T1942] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 109.288061][ T1937] CPU: 1 PID: 1937 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 109.298224][ T1937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.308270][ T1937] Call Trace: [ 109.311563][ T1937] dump_stack+0x1d8/0x24e [ 109.315904][ T1937] ? devkmsg_release+0x11c/0x11c [ 109.320923][ T1937] ? show_regs_print_info+0x12/0x12 [ 109.326152][ T1937] should_fail+0x6f6/0x860 [ 109.330597][ T1937] ? setup_fault_attr+0x3d0/0x3d0 [ 109.335624][ T1937] ? kvmalloc_node+0x7e/0xf0 [ 109.340243][ T1937] should_failslab+0x5/0x20 [ 109.344749][ T1937] __kmalloc+0x5f/0x2f0 [ 109.348904][ T1937] ? kvmalloc_node+0x7e/0xf0 [ 109.353575][ T1937] kvmalloc_node+0x7e/0xf0 [ 109.357988][ T1937] alloc_fdtable+0x146/0x250 [ 109.362572][ T1937] dup_fd+0x785/0xb60 [ 109.366627][ T1937] unshare_files+0x11b/0x2d0 [ 109.371208][ T1937] ? __ia32_sys_unshare+0x40/0x40 [ 109.376226][ T1937] __do_execve_file+0x24d/0x17e0 [ 109.381139][ T1937] ? __virt_addr_valid+0x1fd/0x290 [ 109.386235][ T1937] ? do_execve_file+0x40/0x40 [ 109.390889][ T1937] ? getname_flags+0x1fe/0x640 [ 109.395627][ T1937] __x64_sys_execveat+0xcf/0xe0 [ 109.400462][ T1937] do_syscall_64+0xcb/0x1e0 [ 109.404942][ T1937] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.410995][ T1937] RIP: 0033:0x4665d9 [ 109.414914][ T1937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.434599][ T1937] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 109.443003][ T1937] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 109.450964][ T1937] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 17:16:38 executing program 5 (fault-call:4 fault-nth:5): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 0 (fault-call:4 fault-nth:7): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 2 (fault-call:4 fault-nth:9): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 109.458917][ T1937] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 109.466870][ T1937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.474832][ T1937] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 109.507715][ T1966] FAULT_INJECTION: forcing a failure. [ 109.507715][ T1966] name failslab, interval 1, probability 0, space 0, times 0 [ 109.514124][ T1971] FAULT_INJECTION: forcing a failure. [ 109.514124][ T1971] name failslab, interval 1, probability 0, space 0, times 0 [ 109.541877][ T1968] FAULT_INJECTION: forcing a failure. [ 109.541877][ T1968] name failslab, interval 1, probability 0, space 0, times 0 [ 109.552245][ T1966] CPU: 1 PID: 1966 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 109.564609][ T1966] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 109.574656][ T1966] Call Trace: [ 109.577944][ T1966] dump_stack+0x1d8/0x24e [ 109.582271][ T1966] ? devkmsg_release+0x11c/0x11c [ 109.587210][ T1966] ? show_regs_print_info+0x12/0x12 [ 109.592405][ T1966] ? _raw_spin_lock+0xa3/0x1b0 [ 109.597164][ T1966] should_fail+0x6f6/0x860 [ 109.601756][ T1966] ? setup_fault_attr+0x3d0/0x3d0 [ 109.606775][ T1966] ? _raw_spin_unlock+0x49/0x60 [ 109.611702][ T1966] ? unshare_files+0x1c7/0x2d0 [ 109.616459][ T1966] ? __do_execve_file+0x29c/0x17e0 [ 109.621603][ T1966] should_failslab+0x5/0x20 [ 109.626100][ T1966] kmem_cache_alloc_trace+0x39/0x2b0 [ 109.631380][ T1966] __do_execve_file+0x29c/0x17e0 [ 109.636343][ T1966] ? __virt_addr_valid+0x1fd/0x290 [ 109.641447][ T1966] ? do_execve_file+0x40/0x40 [ 109.646121][ T1966] ? getname_flags+0x1fe/0x640 [ 109.650875][ T1966] __x64_sys_execveat+0xcf/0xe0 [ 109.655716][ T1966] do_syscall_64+0xcb/0x1e0 [ 109.660219][ T1966] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.666111][ T1966] RIP: 0033:0x4665d9 [ 109.670016][ T1966] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.689698][ T1966] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 109.698189][ T1966] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c0003000800000000000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:38 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 109.706175][ T1966] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 109.714149][ T1966] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 109.722129][ T1966] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 109.730193][ T1966] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 109.738166][ T1968] CPU: 0 PID: 1968 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 109.748407][ T1968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:16:39 executing program 5 (fault-call:4 fault-nth:6): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 109.758480][ T1968] Call Trace: [ 109.761798][ T1968] dump_stack+0x1d8/0x24e [ 109.766481][ T1968] ? devkmsg_release+0x11c/0x11c [ 109.771419][ T1968] ? show_regs_print_info+0x12/0x12 [ 109.776620][ T1968] should_fail+0x6f6/0x860 [ 109.781032][ T1968] ? setup_fault_attr+0x3d0/0x3d0 [ 109.786082][ T1968] ? security_file_alloc+0x32/0x1f0 [ 109.791278][ T1968] should_failslab+0x5/0x20 [ 109.795773][ T1968] kmem_cache_alloc+0x36/0x290 [ 109.798573][ T2001] FAULT_INJECTION: forcing a failure. [ 109.798573][ T2001] name failslab, interval 1, probability 0, space 0, times 0 [ 109.800634][ T1968] security_file_alloc+0x32/0x1f0 [ 109.800645][ T1968] __alloc_file+0xba/0x380 [ 109.800660][ T1968] alloc_empty_file+0xa9/0x1b0 [ 109.827586][ T1968] path_openat+0x125/0x3da0 [ 109.832079][ T1968] ? is_bpf_text_address+0x280/0x2a0 [ 109.837353][ T1968] ? stack_trace_save+0x1f0/0x1f0 [ 109.842379][ T1968] ? arch_stack_walk+0xf8/0x140 [ 109.847306][ T1968] ? stack_trace_save+0x120/0x1f0 [ 109.852315][ T1968] ? do_filp_open+0x450/0x450 [ 109.856976][ T1968] ? stack_trace_save+0x120/0x1f0 [ 109.861983][ T1968] ? stack_trace_snprint+0x150/0x150 [ 109.867704][ T1968] ? __kasan_kmalloc+0x1a3/0x1e0 [ 109.872627][ T1968] ? stack_trace_snprint+0x150/0x150 [ 109.877909][ T1968] ? __kasan_kmalloc+0x137/0x1e0 [ 109.882833][ T1968] ? __kmalloc+0x174/0x2f0 [ 109.887242][ T1968] ? security_prepare_creds+0x46/0x210 [ 109.892701][ T1968] do_filp_open+0x208/0x450 [ 109.897193][ T1968] ? vfs_tmpfile+0x210/0x210 [ 109.901894][ T1968] ? do_open_execat+0xab/0x860 [ 109.906649][ T1968] do_open_execat+0x175/0x860 [ 109.911317][ T1968] ? memcpy+0x38/0x50 [ 109.915302][ T1968] ? open_exec+0x50/0x50 [ 109.919570][ T1968] ? selinux_cred_prepare+0x72/0x80 [ 109.924763][ T1968] ? __rcu_read_lock+0x50/0x50 [ 109.929520][ T1968] ? prepare_creds+0x28f/0x370 [ 109.934275][ T1968] ? key_put+0x64/0x70 [ 109.938429][ T1968] __do_execve_file+0x64a/0x17e0 [ 109.943363][ T1968] ? do_execve_file+0x40/0x40 [ 109.948033][ T1968] ? getname_flags+0x1fe/0x640 [ 109.952793][ T1968] __x64_sys_execveat+0xcf/0xe0 [ 109.957734][ T1968] do_syscall_64+0xcb/0x1e0 [ 109.962230][ T1968] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 109.968133][ T1968] RIP: 0033:0x4665d9 [ 109.972040][ T1968] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 109.991719][ T1968] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 110.000118][ T1968] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 110.008076][ T1968] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 110.016049][ T1968] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 110.024004][ T1968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.032079][ T1968] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 110.040067][ T2001] CPU: 1 PID: 2001 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 110.050217][ T2001] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.060274][ T2001] Call Trace: [ 110.063559][ T2001] dump_stack+0x1d8/0x24e [ 110.067875][ T2001] ? devkmsg_release+0x11c/0x11c [ 110.072799][ T2001] ? show_regs_print_info+0x12/0x12 [ 110.077992][ T2001] should_fail+0x6f6/0x860 [ 110.082397][ T2001] ? setup_fault_attr+0x3d0/0x3d0 [ 110.087411][ T2001] ? prepare_creds+0x20/0x370 [ 110.092253][ T2001] should_failslab+0x5/0x20 [ 110.096750][ T2001] kmem_cache_alloc+0x36/0x290 [ 110.101505][ T2001] prepare_creds+0x20/0x370 [ 110.105998][ T2001] prepare_exec_creds+0x13/0xc0 [ 110.110841][ T2001] __do_execve_file+0x325/0x17e0 [ 110.115769][ T2001] ? do_execve_file+0x40/0x40 [ 110.120448][ T2001] ? getname_flags+0x1fe/0x640 [ 110.125200][ T2001] __x64_sys_execveat+0xcf/0xe0 [ 110.130137][ T2001] do_syscall_64+0xcb/0x1e0 [ 110.134636][ T2001] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.140526][ T2001] RIP: 0033:0x4665d9 [ 110.144447][ T2001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.164038][ T2001] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 110.172439][ T2001] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 110.180399][ T2001] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 110.188556][ T2001] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 110.196518][ T2001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.204564][ T2001] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 110.212535][ T1971] CPU: 0 PID: 1971 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 110.222679][ T1971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.232727][ T1971] Call Trace: [ 110.236016][ T1971] dump_stack+0x1d8/0x24e [ 110.240343][ T1971] ? devkmsg_release+0x11c/0x11c [ 110.245276][ T1971] ? show_regs_print_info+0x12/0x12 [ 110.250474][ T1971] should_fail+0x6f6/0x860 [ 110.254886][ T1971] ? setup_fault_attr+0x3d0/0x3d0 [ 110.259998][ T1971] ? kzalloc+0x1d/0x30 [ 110.264170][ T1971] should_failslab+0x5/0x20 [ 110.268651][ T1971] __kmalloc+0x5f/0x2f0 [ 110.272807][ T1971] ? refcount_add_checked+0x50/0x50 [ 110.278040][ T1971] kzalloc+0x1d/0x30 [ 110.281990][ T1971] security_prepare_creds+0x46/0x210 [ 110.287300][ T1971] prepare_creds+0x27b/0x370 [ 110.291862][ T1971] prepare_exec_creds+0x13/0xc0 [ 110.296703][ T1971] __do_execve_file+0x325/0x17e0 [ 110.301630][ T1971] ? do_execve_file+0x40/0x40 [ 110.306286][ T1971] ? getname_flags+0x1fe/0x640 [ 110.311029][ T1971] __x64_sys_execveat+0xcf/0xe0 [ 110.315873][ T1971] do_syscall_64+0xcb/0x1e0 [ 110.320354][ T1971] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.326284][ T1971] RIP: 0033:0x4665d9 [ 110.330212][ T1971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.349883][ T1971] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 17:16:39 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:39 executing program 0 (fault-call:4 fault-nth:8): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:39 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:39 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:39 executing program 5 (fault-call:4 fault-nth:7): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:39 executing program 2 (fault-call:4 fault-nth:10): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:39 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 110.358371][ T1971] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 110.366341][ T1971] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 110.374303][ T1971] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 110.382260][ T1971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.390223][ T1971] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 110.452091][ T2019] FAULT_INJECTION: forcing a failure. [ 110.452091][ T2019] name failslab, interval 1, probability 0, space 0, times 0 [ 110.452110][ T2016] FAULT_INJECTION: forcing a failure. [ 110.452110][ T2016] name failslab, interval 1, probability 0, space 0, times 0 [ 110.472896][ T2019] CPU: 1 PID: 2019 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 110.482393][ T2017] FAULT_INJECTION: forcing a failure. [ 110.482393][ T2017] name failslab, interval 1, probability 0, space 0, times 0 [ 110.487556][ T2019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.487561][ T2019] Call Trace: [ 110.487580][ T2019] dump_stack+0x1d8/0x24e [ 110.487590][ T2019] ? devkmsg_release+0x11c/0x11c [ 110.487607][ T2019] ? show_regs_print_info+0x12/0x12 [ 110.528195][ T2019] should_fail+0x6f6/0x860 [ 110.532627][ T2019] ? setup_fault_attr+0x3d0/0x3d0 [ 110.537645][ T2019] ? kzalloc+0x1d/0x30 [ 110.541705][ T2019] should_failslab+0x5/0x20 [ 110.546204][ T2019] __kmalloc+0x5f/0x2f0 [ 110.550387][ T2019] ? refcount_add_checked+0x50/0x50 [ 110.555766][ T2019] kzalloc+0x1d/0x30 [ 110.559666][ T2019] security_prepare_creds+0x46/0x210 [ 110.564950][ T2019] prepare_creds+0x27b/0x370 [ 110.569722][ T2019] prepare_exec_creds+0x13/0xc0 [ 110.574560][ T2019] __do_execve_file+0x325/0x17e0 [ 110.579590][ T2019] ? do_execve_file+0x40/0x40 [ 110.584252][ T2019] ? getname_flags+0x1fe/0x640 [ 110.589018][ T2019] __x64_sys_execveat+0xcf/0xe0 [ 110.594052][ T2019] do_syscall_64+0xcb/0x1e0 [ 110.598547][ T2019] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.604426][ T2019] RIP: 0033:0x4665d9 [ 110.608317][ T2019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.627999][ T2019] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 110.636395][ T2019] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 110.644348][ T2019] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 17:16:39 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:39 executing program 5 (fault-call:4 fault-nth:8): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 110.652311][ T2019] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 110.660269][ T2019] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 110.668247][ T2019] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 110.676233][ T2016] CPU: 0 PID: 2016 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 110.686382][ T2016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.696608][ T2016] Call Trace: [ 110.700014][ T2016] dump_stack+0x1d8/0x24e [ 110.704344][ T2016] ? devkmsg_release+0x11c/0x11c [ 110.709305][ T2016] ? show_regs_print_info+0x12/0x12 [ 110.714586][ T2016] should_fail+0x6f6/0x860 [ 110.718996][ T2016] ? setup_fault_attr+0x3d0/0x3d0 [ 110.721980][ T2032] FAULT_INJECTION: forcing a failure. [ 110.721980][ T2032] name failslab, interval 1, probability 0, space 0, times 0 [ 110.724018][ T2016] ? security_file_alloc+0x32/0x1f0 [ 110.724029][ T2016] should_failslab+0x5/0x20 [ 110.724039][ T2016] kmem_cache_alloc+0x36/0x290 [ 110.724049][ T2016] security_file_alloc+0x32/0x1f0 [ 110.724066][ T2016] __alloc_file+0xba/0x380 [ 110.760509][ T2016] alloc_empty_file+0xa9/0x1b0 [ 110.765620][ T2016] path_openat+0x125/0x3da0 [ 110.770382][ T2016] ? is_bpf_text_address+0x280/0x2a0 [ 110.775656][ T2016] ? stack_trace_save+0x1f0/0x1f0 [ 110.780774][ T2016] ? arch_stack_walk+0xf8/0x140 [ 110.785618][ T2016] ? stack_trace_save+0x120/0x1f0 [ 110.790637][ T2016] ? do_filp_open+0x450/0x450 [ 110.795303][ T2016] ? stack_trace_save+0x120/0x1f0 [ 110.800342][ T2016] ? stack_trace_snprint+0x150/0x150 [ 110.805702][ T2016] ? __kasan_kmalloc+0x1a3/0x1e0 [ 110.810624][ T2016] ? stack_trace_snprint+0x150/0x150 [ 110.815897][ T2016] ? __kasan_kmalloc+0x137/0x1e0 [ 110.820847][ T2016] ? __kmalloc+0x174/0x2f0 [ 110.825345][ T2016] ? security_prepare_creds+0x46/0x210 [ 110.830800][ T2016] do_filp_open+0x208/0x450 [ 110.835299][ T2016] ? vfs_tmpfile+0x210/0x210 [ 110.839894][ T2016] ? do_open_execat+0xab/0x860 [ 110.844652][ T2016] do_open_execat+0x175/0x860 [ 110.849319][ T2016] ? memcpy+0x38/0x50 [ 110.853393][ T2016] ? open_exec+0x50/0x50 [ 110.857624][ T2016] ? selinux_cred_prepare+0x72/0x80 [ 110.862840][ T2016] ? __rcu_read_lock+0x50/0x50 [ 110.868115][ T2016] ? prepare_creds+0x28f/0x370 [ 110.872873][ T2016] ? key_put+0x64/0x70 [ 110.876948][ T2016] __do_execve_file+0x64a/0x17e0 [ 110.881885][ T2016] ? do_execve_file+0x40/0x40 [ 110.886562][ T2016] ? getname_flags+0x1fe/0x640 [ 110.891417][ T2016] __x64_sys_execveat+0xcf/0xe0 [ 110.896273][ T2016] do_syscall_64+0xcb/0x1e0 [ 110.900786][ T2016] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 110.906673][ T2016] RIP: 0033:0x4665d9 [ 110.910567][ T2016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 110.930353][ T2016] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 110.938773][ T2016] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 110.946733][ T2016] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 110.954815][ T2016] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 110.962846][ T2016] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.970807][ T2016] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 110.978810][ T2032] CPU: 1 PID: 2032 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 110.989168][ T2032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 110.999385][ T2032] Call Trace: [ 111.002669][ T2032] dump_stack+0x1d8/0x24e [ 111.007003][ T2032] ? devkmsg_release+0x11c/0x11c [ 111.011929][ T2032] ? show_regs_print_info+0x12/0x12 [ 111.017129][ T2032] should_fail+0x6f6/0x860 [ 111.021634][ T2032] ? setup_fault_attr+0x3d0/0x3d0 [ 111.026644][ T2032] ? stack_trace_save+0x120/0x1f0 [ 111.031672][ T2032] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 111.037652][ T2032] ? __alloc_file+0x26/0x380 [ 111.042229][ T2032] should_failslab+0x5/0x20 [ 111.046739][ T2032] kmem_cache_alloc+0x36/0x290 [ 111.051501][ T2032] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.057559][ T2032] __alloc_file+0x26/0x380 [ 111.061961][ T2032] ? alloc_empty_file+0x49/0x1b0 [ 111.066887][ T2032] alloc_empty_file+0xa9/0x1b0 [ 111.071635][ T2032] path_openat+0x125/0x3da0 [ 111.076148][ T2032] ? is_bpf_text_address+0x280/0x2a0 [ 111.081438][ T2032] ? stack_trace_save+0x1f0/0x1f0 [ 111.086450][ T2032] ? arch_stack_walk+0xf8/0x140 [ 111.091289][ T2032] ? stack_trace_save+0x120/0x1f0 [ 111.096300][ T2032] ? do_filp_open+0x450/0x450 [ 111.100978][ T2032] ? stack_trace_save+0x120/0x1f0 [ 111.106000][ T2032] ? stack_trace_snprint+0x150/0x150 [ 111.111301][ T2032] ? __kasan_kmalloc+0x1a3/0x1e0 [ 111.116233][ T2032] ? stack_trace_snprint+0x150/0x150 [ 111.121508][ T2032] ? __kasan_kmalloc+0x137/0x1e0 [ 111.126431][ T2032] ? __kmalloc+0x174/0x2f0 [ 111.130836][ T2032] ? security_prepare_creds+0x46/0x210 [ 111.136282][ T2032] do_filp_open+0x208/0x450 [ 111.140789][ T2032] ? vfs_tmpfile+0x210/0x210 [ 111.145375][ T2032] ? do_open_execat+0xab/0x860 [ 111.150146][ T2032] do_open_execat+0x175/0x860 [ 111.154901][ T2032] ? memcpy+0x38/0x50 [ 111.158882][ T2032] ? open_exec+0x50/0x50 [ 111.163132][ T2032] ? selinux_cred_prepare+0x72/0x80 [ 111.168331][ T2032] ? __rcu_read_lock+0x50/0x50 [ 111.173107][ T2032] ? prepare_creds+0x28f/0x370 [ 111.177857][ T2032] ? key_put+0x64/0x70 [ 111.181912][ T2032] __do_execve_file+0x64a/0x17e0 [ 111.186846][ T2032] ? do_execve_file+0x40/0x40 [ 111.191628][ T2032] ? getname_flags+0x1fe/0x640 [ 111.196378][ T2032] __x64_sys_execveat+0xcf/0xe0 [ 111.201410][ T2032] do_syscall_64+0xcb/0x1e0 [ 111.205915][ T2032] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.211799][ T2032] RIP: 0033:0x4665d9 [ 111.215896][ T2032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.235486][ T2032] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 111.243991][ T2032] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 111.251952][ T2032] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 111.259908][ T2032] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 111.267864][ T2032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.275828][ T2032] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 111.283821][ T2017] CPU: 0 PID: 2017 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 111.294062][ T2017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:16:40 executing program 2 (fault-call:4 fault-nth:11): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.304136][ T2017] Call Trace: [ 111.307421][ T2017] dump_stack+0x1d8/0x24e [ 111.311748][ T2017] ? devkmsg_release+0x11c/0x11c [ 111.316684][ T2017] ? show_regs_print_info+0x12/0x12 [ 111.321880][ T2017] should_fail+0x6f6/0x860 [ 111.326297][ T2017] ? setup_fault_attr+0x3d0/0x3d0 [ 111.331335][ T2017] ? stack_trace_save+0x120/0x1f0 [ 111.336364][ T2017] ? unwind_get_return_address_ptr+0xa0/0xa0 [ 111.342354][ T2017] ? __alloc_file+0x26/0x380 [ 111.346941][ T2017] should_failslab+0x5/0x20 [ 111.351440][ T2017] kmem_cache_alloc+0x36/0x290 17:16:40 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.356202][ T2017] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.362266][ T2017] __alloc_file+0x26/0x380 [ 111.366682][ T2017] ? alloc_empty_file+0x49/0x1b0 [ 111.371617][ T2017] alloc_empty_file+0xa9/0x1b0 [ 111.376376][ T2017] path_openat+0x125/0x3da0 [ 111.382136][ T2017] ? is_bpf_text_address+0x280/0x2a0 [ 111.387591][ T2017] ? stack_trace_save+0x1f0/0x1f0 [ 111.392619][ T2017] ? arch_stack_walk+0xf8/0x140 [ 111.397471][ T2017] ? stack_trace_save+0x120/0x1f0 [ 111.402492][ T2017] ? do_filp_open+0x450/0x450 [ 111.407167][ T2017] ? stack_trace_save+0x120/0x1f0 [ 111.412185][ T2017] ? stack_trace_snprint+0x150/0x150 [ 111.417481][ T2017] ? __kasan_kmalloc+0x1a3/0x1e0 [ 111.422412][ T2017] ? stack_trace_snprint+0x150/0x150 [ 111.427720][ T2017] ? __kasan_kmalloc+0x137/0x1e0 [ 111.432655][ T2017] ? __kmalloc+0x174/0x2f0 [ 111.437066][ T2017] ? security_prepare_creds+0x46/0x210 [ 111.442521][ T2017] do_filp_open+0x208/0x450 [ 111.447024][ T2017] ? vfs_tmpfile+0x210/0x210 [ 111.450587][ T2049] FAULT_INJECTION: forcing a failure. [ 111.450587][ T2049] name failslab, interval 1, probability 0, space 0, times 0 [ 111.451646][ T2017] ? do_open_execat+0xab/0x860 [ 111.451662][ T2017] do_open_execat+0x175/0x860 [ 111.473982][ T2017] ? memcpy+0x38/0x50 [ 111.478160][ T2017] ? open_exec+0x50/0x50 [ 111.482509][ T2017] ? selinux_cred_prepare+0x72/0x80 [ 111.487703][ T2017] ? __rcu_read_lock+0x50/0x50 [ 111.492567][ T2017] ? prepare_creds+0x28f/0x370 [ 111.497332][ T2017] ? key_put+0x64/0x70 [ 111.501494][ T2017] __do_execve_file+0x64a/0x17e0 [ 111.506447][ T2017] ? do_execve_file+0x40/0x40 [ 111.511114][ T2017] ? getname_flags+0x1fe/0x640 [ 111.515867][ T2017] __x64_sys_execveat+0xcf/0xe0 [ 111.520707][ T2017] do_syscall_64+0xcb/0x1e0 [ 111.525220][ T2017] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.531202][ T2017] RIP: 0033:0x4665d9 [ 111.535112][ T2017] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.554791][ T2017] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 111.563462][ T2017] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 111.571424][ T2017] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 111.579492][ T2017] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 111.587485][ T2017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 111.595538][ T2017] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 111.603513][ T2049] CPU: 1 PID: 2049 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 111.613848][ T2049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.623986][ T2049] Call Trace: [ 111.627277][ T2049] dump_stack+0x1d8/0x24e [ 111.631602][ T2049] ? devkmsg_release+0x11c/0x11c [ 111.636537][ T2049] ? show_regs_print_info+0x12/0x12 [ 111.638263][ T2057] FAULT_INJECTION: forcing a failure. [ 111.638263][ T2057] name failslab, interval 1, probability 0, space 0, times 0 [ 111.641730][ T2049] ? kvasprintf+0x107/0x180 [ 111.641740][ T2049] ? asan.module_ctor+0x10/0x10 [ 111.641758][ T2049] should_fail+0x6f6/0x860 [ 111.658166][ T2059] FAULT_INJECTION: forcing a failure. [ 111.658166][ T2059] name failslab, interval 1, probability 0, space 0, times 0 [ 111.658847][ T2049] ? setup_fault_attr+0x3d0/0x3d0 [ 111.658857][ T2049] ? kasprintf+0xd1/0x120 [ 111.658874][ T2049] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 111.695844][ T2049] ? mm_alloc+0x1f/0xb0 [ 111.700022][ T2049] should_failslab+0x5/0x20 [ 111.704643][ T2049] kmem_cache_alloc+0x36/0x290 [ 111.709402][ T2049] mm_alloc+0x1f/0xb0 [ 111.713374][ T2049] __do_execve_file+0x91f/0x17e0 [ 111.718307][ T2049] ? do_execve_file+0x40/0x40 [ 111.722977][ T2049] ? getname_flags+0x1fe/0x640 [ 111.727735][ T2049] __x64_sys_execveat+0xcf/0xe0 [ 111.732579][ T2049] do_syscall_64+0xcb/0x1e0 [ 111.737079][ T2049] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 111.742967][ T2049] RIP: 0033:0x4665d9 [ 111.746852][ T2049] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 111.766454][ T2049] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 111.774882][ T2049] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 111.782930][ T2049] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 111.790951][ T2049] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 111.798916][ T2049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 17:16:40 executing program 0 (fault-call:4 fault-nth:9): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 5 (fault-call:4 fault-nth:9): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:40 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:40 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.806901][ T2049] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 111.814872][ T2057] CPU: 0 PID: 2057 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 111.825025][ T2057] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 111.835109][ T2057] Call Trace: [ 111.838400][ T2057] dump_stack+0x1d8/0x24e [ 111.842775][ T2057] ? devkmsg_release+0x11c/0x11c [ 111.847714][ T2057] ? show_regs_print_info+0x12/0x12 [ 111.852916][ T2057] should_fail+0x6f6/0x860 17:16:41 executing program 2 (fault-call:4 fault-nth:12): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:41 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.857343][ T2057] ? setup_fault_attr+0x3d0/0x3d0 [ 111.862450][ T2057] ? security_file_alloc+0x32/0x1f0 [ 111.867711][ T2057] should_failslab+0x5/0x20 [ 111.872208][ T2057] kmem_cache_alloc+0x36/0x290 [ 111.877102][ T2057] security_file_alloc+0x32/0x1f0 [ 111.882143][ T2057] __alloc_file+0xba/0x380 [ 111.886724][ T2057] alloc_empty_file+0xa9/0x1b0 [ 111.891597][ T2057] path_openat+0x125/0x3da0 [ 111.896112][ T2057] ? is_bpf_text_address+0x280/0x2a0 [ 111.901390][ T2057] ? stack_trace_save+0x1f0/0x1f0 17:16:41 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.906404][ T2057] ? arch_stack_walk+0xf8/0x140 [ 111.911334][ T2057] ? stack_trace_save+0x120/0x1f0 [ 111.916349][ T2057] ? do_filp_open+0x450/0x450 [ 111.921052][ T2057] ? stack_trace_save+0x120/0x1f0 [ 111.926105][ T2057] ? stack_trace_snprint+0x150/0x150 [ 111.931417][ T2057] ? __kasan_kmalloc+0x1a3/0x1e0 [ 111.936345][ T2057] ? stack_trace_snprint+0x150/0x150 [ 111.941624][ T2057] ? __kasan_kmalloc+0x137/0x1e0 [ 111.946553][ T2057] ? __kmalloc+0x174/0x2f0 [ 111.950974][ T2057] ? security_prepare_creds+0x46/0x210 17:16:41 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08000200040000000800020008"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 111.956425][ T2057] do_filp_open+0x208/0x450 [ 111.960923][ T2057] ? vfs_tmpfile+0x210/0x210 [ 111.965520][ T2057] ? do_open_execat+0xab/0x860 [ 111.970311][ T2057] do_open_execat+0x175/0x860 [ 111.974993][ T2057] ? memcpy+0x38/0x50 [ 111.979001][ T2057] ? open_exec+0x50/0x50 [ 111.983323][ T2057] ? selinux_cred_prepare+0x72/0x80 [ 111.988531][ T2057] ? __rcu_read_lock+0x50/0x50 [ 111.993327][ T2057] ? prepare_creds+0x28f/0x370 [ 111.998083][ T2057] ? key_put+0x64/0x70 [ 112.002233][ T2057] __do_execve_file+0x64a/0x17e0 [ 112.007217][ T2057] ? do_execve_file+0x40/0x40 [ 112.011890][ T2057] ? getname_flags+0x1fe/0x640 [ 112.016643][ T2057] __x64_sys_execveat+0xcf/0xe0 [ 112.019006][ T2088] FAULT_INJECTION: forcing a failure. [ 112.019006][ T2088] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 112.021484][ T2057] do_syscall_64+0xcb/0x1e0 [ 112.021496][ T2057] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.021511][ T2057] RIP: 0033:0x4665d9 [ 112.048956][ T2057] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.069104][ T2057] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 112.077676][ T2057] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 112.085665][ T2057] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 112.093625][ T2057] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 112.101618][ T2057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.109584][ T2057] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 112.117552][ T2088] CPU: 1 PID: 2088 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 112.127887][ T2088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.137976][ T2088] Call Trace: [ 112.141262][ T2088] dump_stack+0x1d8/0x24e [ 112.145581][ T2088] ? devkmsg_release+0x11c/0x11c [ 112.150515][ T2088] ? show_regs_print_info+0x12/0x12 [ 112.155962][ T2088] ? __kasan_kmalloc+0x1a3/0x1e0 [ 112.160898][ T2088] ? __kasan_kmalloc+0x137/0x1e0 [ 112.165914][ T2088] ? kmem_cache_alloc+0x115/0x290 [ 112.171027][ T2088] ? mm_alloc+0x1f/0xb0 [ 112.175177][ T2088] should_fail+0x6f6/0x860 [ 112.179580][ T2088] ? setup_fault_attr+0x3d0/0x3d0 [ 112.184597][ T2088] __alloc_pages_nodemask+0x1c4/0x880 [ 112.189958][ T2088] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 112.195494][ T2088] __get_free_pages+0xa/0x30 [ 112.200076][ T2088] pgd_alloc+0x1e/0x2b0 [ 112.204220][ T2088] mm_init+0x497/0x7a0 [ 112.208300][ T2088] __do_execve_file+0x91f/0x17e0 [ 112.213234][ T2088] ? do_execve_file+0x40/0x40 [ 112.218010][ T2088] ? getname_flags+0x1fe/0x640 [ 112.223031][ T2088] __x64_sys_execveat+0xcf/0xe0 [ 112.227894][ T2088] do_syscall_64+0xcb/0x1e0 [ 112.232387][ T2088] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.238266][ T2088] RIP: 0033:0x4665d9 [ 112.242239][ T2088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.261835][ T2088] RSP: 002b:00007f14e1674188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 112.270248][ T2088] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 112.278206][ T2088] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 112.286165][ T2088] RBP: 00007f14e16741d0 R08: 0000000000001100 R09: 0000000000000000 [ 112.294133][ T2088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.302106][ T2088] R13: 00007ffc1571100f R14: 00007f14e1674300 R15: 0000000000022000 [ 112.310172][ T2059] CPU: 0 PID: 2059 Comm: syz-executor.0 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 112.320331][ T2059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.330398][ T2059] Call Trace: [ 112.333745][ T2059] dump_stack+0x1d8/0x24e [ 112.338123][ T2059] ? devkmsg_release+0x11c/0x11c [ 112.343074][ T2059] ? show_regs_print_info+0x12/0x12 [ 112.348271][ T2059] should_fail+0x6f6/0x860 [ 112.352689][ T2059] ? setup_fault_attr+0x3d0/0x3d0 [ 112.357712][ T2059] ? security_file_alloc+0x32/0x1f0 [ 112.363198][ T2059] should_failslab+0x5/0x20 [ 112.367732][ T2059] kmem_cache_alloc+0x36/0x290 [ 112.372525][ T2059] security_file_alloc+0x32/0x1f0 [ 112.377675][ T2059] __alloc_file+0xba/0x380 [ 112.382087][ T2059] alloc_empty_file+0xa9/0x1b0 [ 112.387217][ T2059] path_openat+0x125/0x3da0 [ 112.391703][ T2059] ? is_bpf_text_address+0x280/0x2a0 [ 112.396963][ T2059] ? stack_trace_save+0x1f0/0x1f0 [ 112.401981][ T2059] ? arch_stack_walk+0xf8/0x140 [ 112.406988][ T2059] ? stack_trace_save+0x120/0x1f0 [ 112.411990][ T2059] ? do_filp_open+0x450/0x450 [ 112.416670][ T2059] ? stack_trace_save+0x120/0x1f0 [ 112.421669][ T2059] ? stack_trace_snprint+0x150/0x150 [ 112.426938][ T2059] ? __kasan_kmalloc+0x1a3/0x1e0 [ 112.431866][ T2059] ? stack_trace_snprint+0x150/0x150 [ 112.437126][ T2059] ? __kasan_kmalloc+0x137/0x1e0 [ 112.442049][ T2059] ? __kmalloc+0x174/0x2f0 [ 112.446442][ T2059] ? security_prepare_creds+0x46/0x210 [ 112.451888][ T2059] do_filp_open+0x208/0x450 [ 112.456365][ T2059] ? vfs_tmpfile+0x210/0x210 [ 112.460943][ T2059] ? do_open_execat+0xab/0x860 [ 112.465783][ T2059] do_open_execat+0x175/0x860 [ 112.470451][ T2059] ? memcpy+0x38/0x50 [ 112.474418][ T2059] ? open_exec+0x50/0x50 [ 112.478646][ T2059] ? selinux_cred_prepare+0x72/0x80 [ 112.483951][ T2059] ? __rcu_read_lock+0x50/0x50 [ 112.488710][ T2059] ? prepare_creds+0x28f/0x370 [ 112.493447][ T2059] ? key_put+0x64/0x70 [ 112.497506][ T2059] __do_execve_file+0x64a/0x17e0 [ 112.502473][ T2059] ? do_execve_file+0x40/0x40 [ 112.507216][ T2059] ? getname_flags+0x1fe/0x640 [ 112.511950][ T2059] __x64_sys_execveat+0xcf/0xe0 [ 112.516886][ T2059] do_syscall_64+0xcb/0x1e0 [ 112.521380][ T2059] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.527266][ T2059] RIP: 0033:0x4665d9 [ 112.531134][ T2059] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.550802][ T2059] RSP: 002b:00007f5d5118f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 17:16:41 executing program 0 (fault-call:4 fault-nth:10): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:41 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x40, 0x80, 0xa1, 0xb8, 0x0, 0x0, 0xc032, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_config_ext={0x20, 0xff}, 0x2000, 0x0, 0x40, 0x2, 0x2, 0x1, 0x5, 0x0, 0xe7, 0x0, 0xff}, 0x0, 0xd, 0xffffffffffffffff, 0x2) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x80) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x800, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000800)={0x8, 0x0, {0x0, @usage=0x4, 0x0, 0x5, 0x0, 0x9, 0x0, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x0, 0x8000, [0x34, 0x80000000, 0x1e, 0x4, 0x0, 0x79ec]}, {0x9, @usage=0xee, 0x0, 0x8000, 0x8, 0x2, 0x2, 0x0, 0x40, @struct={0x200, 0x4}, 0x36a, 0x1ff, [0x1f, 0x0, 0x7, 0x2, 0xf89]}, {0x6, @usage=0x3, 0x0, 0x400, 0x5, 0x80000000, 0x338, 0x0, 0x4, @struct={0x0, 0x4}, 0x8001, 0x40, [0x4, 0x7ff, 0x7ff, 0x2b8000000000000, 0x8000, 0xc04]}, {0x8, 0x3, 0x400080000}}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000500), 0x105000, 0x0) writev(r1, &(0x7f0000000e00)=[{&(0x7f0000000540)="b3ef", 0x2}, {&(0x7f0000000580)="7503feaf0840a3b3461f816760bfa8817049f5e6dcb7fd0b4f62e9fe88bf3ecaed59acf023b0115957cd2109210dba8543c11688d0dbe4222b72b2687d92dbbd8da02e38a5b6750aae06abd4a92516d3f83deea97d2289061a022dfe63d8919323ed489c00707e0a4d271211791a5ed3a1d47ae8ba941184a9424c138479d57eb718880dbf3e9366661ee90530c43ffa9b1fd124c159de07ccc0b6a40f51ef1bc1335259ca635172a6011b94d21872344b21dbd70024226c145c9b86a9fb89feb7ee4b99347e434cbd94dc95d169c1e4d9cf3695e1571035e55646f18afe4c5f5ec62cff54ca528be405646c4652f87acf8b1095b2b3", 0xf6}, {&(0x7f0000000680)="87b63ee93d98eb179a6da1b6f6347b8b366771cf9dfe19a5daeaedf1f8510ebd5e1fdde589148be3c86d3d318bdda0a6cd36604bd38ea18bddd4fa16f0723e645c27b21888f1fe3adf732d26b06139b5d3f767730ec502531a0d2ba8b8a4be9eb180011ab823d8796a34a457b8362e743772f9eb73f6861751de744b3dbd1697fe1a9becdb485d6e2155bb6ebeb6a3615b8392df03b93204868a9947b95f2582ed4ccd61110c1daab257c8d11bd1081535bcb74d8c89e89d43568b2ad4fb146b54", 0xc1}, {&(0x7f0000000c00)="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", 0xfa}, {&(0x7f0000000780)="341f8fdf20add6e5e057fba8df493b7d660969583a4a3fc3fb1bddc6c62b2ebb19d7f0c0efdfcea882d0bbe288a46e61fa9d8d5bc6d3c4a61b361ef53d35c1bd994a", 0x42}, {&(0x7f0000000d00)="d4f888a0ebdb4d31806cf82f6f5c3a930ad664f4bc6c052c1a3416552b372f67bab8b25fd0324598cbc6291ebf21af10e817c1b8be22b183ab3c1b7e8d8e24308c073574970c5cfcbf626a3f7e49e7d2c48e08671aac14a6fbe7d3a9fe369b", 0x5f}, {&(0x7f0000000d80)="045d520c7323ca1cff295684750daa15f040bb0dbd5a2949fdfeff6ad54f1d5b90ac829c39f56a53c7be81ce48ccc9c1b3bf59f3989afb720a6b21c49ba59a6b93b2d1", 0x43}], 0x7) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4c000000150a010100000000000000000a0000040900020073797a320000000008000340000000070900020073797a31000000000900020073797a30000000000c00064000000000000000057b370feabe1461e05e67e8f47b63bead2fdcae16515d6f8e3db38d218996237d3c2092856538ffb45a2b94b9bf764793692787b14ef8dba9f2f3665842c98a1a080a91bb2f5cae9a7870861c6fed51f0fd526b7d74e7d79c67fd184f13cbc0d7619cd4fd472ad5"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x2400c880) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) 17:16:41 executing program 5 (fault-call:4 fault-nth:10): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:41 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:41 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08000200040000000800020008"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:41 executing program 2 (fault-call:4 fault-nth:13): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 112.559203][ T2059] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 112.567339][ T2059] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 112.575800][ T2059] RBP: 00007f5d5118f1d0 R08: 0000000000001100 R09: 0000000000000000 [ 112.583744][ T2059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.591704][ T2059] R13: 00007ffc6722afcf R14: 00007f5d5118f300 R15: 0000000000022000 [ 112.626086][ T2102] FAULT_INJECTION: forcing a failure. [ 112.626086][ T2102] name failslab, interval 1, probability 0, space 0, times 0 [ 112.626303][ T2103] FAULT_INJECTION: forcing a failure. [ 112.626303][ T2103] name failslab, interval 1, probability 0, space 0, times 0 [ 112.643533][ T2102] CPU: 0 PID: 2102 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 112.661573][ T2102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.671726][ T2102] Call Trace: [ 112.675013][ T2102] dump_stack+0x1d8/0x24e [ 112.679350][ T2102] ? devkmsg_release+0x11c/0x11c [ 112.684273][ T2102] ? show_regs_print_info+0x12/0x12 [ 112.689457][ T2102] ? __alloc_pages_nodemask+0x3a2/0x880 [ 112.695021][ T2102] should_fail+0x6f6/0x860 [ 112.699462][ T2102] ? setup_fault_attr+0x3d0/0x3d0 [ 112.704484][ T2102] ? vm_area_alloc+0x20/0xe0 [ 112.709169][ T2102] should_failslab+0x5/0x20 [ 112.713678][ T2102] kmem_cache_alloc+0x36/0x290 [ 112.718448][ T2102] vm_area_alloc+0x20/0xe0 [ 112.722855][ T2102] __do_execve_file+0xa25/0x17e0 [ 112.727810][ T2102] ? do_execve_file+0x40/0x40 [ 112.732499][ T2102] ? getname_flags+0x1fe/0x640 [ 112.737260][ T2102] __x64_sys_execveat+0xcf/0xe0 [ 112.742230][ T2102] do_syscall_64+0xcb/0x1e0 [ 112.746788][ T2102] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 112.753017][ T2102] RIP: 0033:0x4665d9 [ 112.756895][ T2102] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 112.776495][ T2102] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 112.784929][ T2102] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 112.792891][ T2102] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 112.800850][ T2102] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 112.808818][ T2102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 112.816785][ T2102] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 112.824759][ T2103] CPU: 1 PID: 2103 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 112.835102][ T2103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 112.845337][ T2103] Call Trace: [ 112.848625][ T2103] dump_stack+0x1d8/0x24e [ 112.852943][ T2103] ? devkmsg_release+0x11c/0x11c [ 112.857990][ T2103] ? show_regs_print_info+0x12/0x12 [ 112.863182][ T2103] should_fail+0x6f6/0x860 [ 112.867587][ T2103] ? setup_fault_attr+0x3d0/0x3d0 [ 112.872616][ T2103] ? security_file_alloc+0x32/0x1f0 [ 112.877894][ T2103] should_failslab+0x5/0x20 [ 112.882386][ T2103] kmem_cache_alloc+0x36/0x290 [ 112.887141][ T2103] security_file_alloc+0x32/0x1f0 [ 112.892153][ T2103] __alloc_file+0xba/0x380 [ 112.896568][ T2103] alloc_empty_file+0xa9/0x1b0 [ 112.901326][ T2103] path_openat+0x125/0x3da0 [ 112.905854][ T2103] ? is_bpf_text_address+0x280/0x2a0 [ 112.911147][ T2103] ? stack_trace_save+0x1f0/0x1f0 [ 112.916177][ T2103] ? arch_stack_walk+0xf8/0x140 [ 112.921036][ T2103] ? stack_trace_save+0x120/0x1f0 [ 112.926045][ T2103] ? do_filp_open+0x450/0x450 [ 112.930704][ T2103] ? stack_trace_save+0x120/0x1f0 [ 112.935712][ T2103] ? stack_trace_snprint+0x150/0x150 [ 112.940984][ T2103] ? __kasan_kmalloc+0x1a3/0x1e0 [ 112.945908][ T2103] ? stack_trace_snprint+0x150/0x150 [ 112.951211][ T2103] ? __kasan_kmalloc+0x137/0x1e0 [ 112.956136][ T2103] ? __kmalloc+0x174/0x2f0 [ 112.960561][ T2103] ? security_prepare_creds+0x46/0x210 [ 112.966006][ T2103] do_filp_open+0x208/0x450 [ 112.970495][ T2103] ? vfs_tmpfile+0x210/0x210 [ 112.975075][ T2103] ? do_open_execat+0xab/0x860 [ 112.979825][ T2103] do_open_execat+0x175/0x860 [ 112.984489][ T2103] ? memcpy+0x38/0x50 [ 112.988456][ T2103] ? open_exec+0x50/0x50 [ 112.992705][ T2103] ? selinux_cred_prepare+0x72/0x80 [ 112.997888][ T2103] ? __rcu_read_lock+0x50/0x50 [ 113.002636][ T2103] ? prepare_creds+0x28f/0x370 [ 113.007469][ T2103] ? key_put+0x64/0x70 [ 113.011521][ T2103] __do_execve_file+0x64a/0x17e0 [ 113.016468][ T2103] ? do_execve_file+0x40/0x40 [ 113.021147][ T2103] ? getname_flags+0x1fe/0x640 [ 113.025897][ T2103] __x64_sys_execveat+0xcf/0xe0 [ 113.030732][ T2103] do_syscall_64+0xcb/0x1e0 [ 113.035353][ T2103] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.041237][ T2103] RIP: 0033:0x4665d9 [ 113.045150][ T2103] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.065001][ T2103] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 17:16:42 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:42 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:42 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff08000200040000000800020008"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:42 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) [ 113.073403][ T2103] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 113.081376][ T2103] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 113.089341][ T2103] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 113.097330][ T2103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.105291][ T2103] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 17:16:42 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:42 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:42 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) [ 113.250367][ T2108] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 17:16:42 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x40, 0x80, 0xa1, 0xb8, 0x0, 0x0, 0xc032, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_config_ext={0x20, 0xff}, 0x2000, 0x0, 0x40, 0x2, 0x2, 0x1, 0x5, 0x0, 0xe7, 0x0, 0xff}, 0x0, 0xd, 0xffffffffffffffff, 0x2) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x80) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x800, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000800)={0x8, 0x0, {0x0, @usage=0x4, 0x0, 0x5, 0x0, 0x9, 0x0, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x0, 0x8000, [0x34, 0x80000000, 0x1e, 0x4, 0x0, 0x79ec]}, {0x9, @usage=0xee, 0x0, 0x8000, 0x8, 0x2, 0x2, 0x0, 0x40, @struct={0x200, 0x4}, 0x36a, 0x1ff, [0x1f, 0x0, 0x7, 0x2, 0xf89]}, {0x6, @usage=0x3, 0x0, 0x400, 0x5, 0x80000000, 0x338, 0x0, 0x4, @struct={0x0, 0x4}, 0x8001, 0x40, [0x4, 0x7ff, 0x7ff, 0x2b8000000000000, 0x8000, 0xc04]}, {0x8, 0x3, 0x400080000}}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000500), 0x105000, 0x0) writev(r1, &(0x7f0000000e00)=[{&(0x7f0000000540)="b3ef", 0x2}, {&(0x7f0000000580)="7503feaf0840a3b3461f816760bfa8817049f5e6dcb7fd0b4f62e9fe88bf3ecaed59acf023b0115957cd2109210dba8543c11688d0dbe4222b72b2687d92dbbd8da02e38a5b6750aae06abd4a92516d3f83deea97d2289061a022dfe63d8919323ed489c00707e0a4d271211791a5ed3a1d47ae8ba941184a9424c138479d57eb718880dbf3e9366661ee90530c43ffa9b1fd124c159de07ccc0b6a40f51ef1bc1335259ca635172a6011b94d21872344b21dbd70024226c145c9b86a9fb89feb7ee4b99347e434cbd94dc95d169c1e4d9cf3695e1571035e55646f18afe4c5f5ec62cff54ca528be405646c4652f87acf8b1095b2b3", 0xf6}, {&(0x7f0000000680)="87b63ee93d98eb179a6da1b6f6347b8b366771cf9dfe19a5daeaedf1f8510ebd5e1fdde589148be3c86d3d318bdda0a6cd36604bd38ea18bddd4fa16f0723e645c27b21888f1fe3adf732d26b06139b5d3f767730ec502531a0d2ba8b8a4be9eb180011ab823d8796a34a457b8362e743772f9eb73f6861751de744b3dbd1697fe1a9becdb485d6e2155bb6ebeb6a3615b8392df03b93204868a9947b95f2582ed4ccd61110c1daab257c8d11bd1081535bcb74d8c89e89d43568b2ad4fb146b54", 0xc1}, {&(0x7f0000000c00)="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", 0xfa}, {&(0x7f0000000780)="341f8fdf20add6e5e057fba8df493b7d660969583a4a3fc3fb1bddc6c62b2ebb19d7f0c0efdfcea882d0bbe288a46e61fa9d8d5bc6d3c4a61b361ef53d35c1bd994a", 0x42}, {&(0x7f0000000d00)="d4f888a0ebdb4d31806cf82f6f5c3a930ad664f4bc6c052c1a3416552b372f67bab8b25fd0324598cbc6291ebf21af10e817c1b8be22b183ab3c1b7e8d8e24308c073574970c5cfcbf626a3f7e49e7d2c48e08671aac14a6fbe7d3a9fe369b", 0x5f}, {&(0x7f0000000d80)="045d520c7323ca1cff295684750daa15f040bb0dbd5a2949fdfeff6ad54f1d5b90ac829c39f56a53c7be81ce48ccc9c1b3bf59f3989afb720a6b21c49ba59a6b93b2d1", 0x43}], 0x7) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4c000000150a010100000000000000000a0000040900020073797a320000000008000340000000070900020073797a31000000000900020073797a30000000000c00064000000000000000057b370feabe1461e05e67e8f47b63bead2fdcae16515d6f8e3db38d218996237d3c2092856538ffb45a2b94b9bf764793692787b14ef8dba9f2f3665842c98a1a080a91bb2f5cae9a7870861c6fed51f0fd526b7d74e7d79c67fd184f13cbc0d7619cd4fd472ad5"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x2400c880) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) 17:16:42 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:42 executing program 5 (fault-call:4 fault-nth:11): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:42 executing program 2 (fault-call:4 fault-nth:14): r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:42 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 17:16:42 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 113.375426][ T2148] FAULT_INJECTION: forcing a failure. [ 113.375426][ T2148] name failslab, interval 1, probability 0, space 0, times 0 [ 113.376123][ T2150] FAULT_INJECTION: forcing a failure. [ 113.376123][ T2150] name failslab, interval 1, probability 0, space 0, times 0 [ 113.388491][ T2148] CPU: 0 PID: 2148 Comm: syz-executor.2 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 113.411123][ T2148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.421561][ T2148] Call Trace: [ 113.424931][ T2148] dump_stack+0x1d8/0x24e [ 113.429269][ T2148] ? devkmsg_release+0x11c/0x11c [ 113.434296][ T2148] ? show_regs_print_info+0x12/0x12 [ 113.439483][ T2148] ? put_task_stack+0x1ed/0x220 [ 113.444321][ T2148] should_fail+0x6f6/0x860 [ 113.448726][ T2148] ? setup_fault_attr+0x3d0/0x3d0 [ 113.453733][ T2148] ? unwind_next_frame+0x1f0a/0x27b0 [ 113.459003][ T2148] ? ebitmap_cmp+0x1b8/0x220 [ 113.463579][ T2148] ? mls_compute_context_len+0x7dd/0x810 [ 113.469197][ T2148] ? context_struct_to_string+0x43b/0x8b0 [ 113.474907][ T2148] should_failslab+0x5/0x20 [ 113.479397][ T2148] __kmalloc+0x5f/0x2f0 [ 113.483758][ T2148] context_struct_to_string+0x43b/0x8b0 [ 113.489311][ T2148] ? __rcu_read_lock+0x50/0x50 [ 113.494105][ T2148] ? security_bounded_transition+0x560/0x560 [ 113.500085][ T2148] ? symhash+0xe0/0xe0 [ 113.506135][ T2148] ? hashtab_search+0x1bf/0x200 [ 113.510975][ T2148] context_add_hash+0x13f/0x270 [ 113.515826][ T2148] ? security_sid_to_context_inval+0x40/0x40 [ 113.521890][ T2148] ? mls_context_isvalid+0x272/0x380 [ 113.527175][ T2148] ? policydb_context_isvalid+0x1b6/0x400 [ 113.532883][ T2148] security_compute_sid+0x1142/0x1d00 [ 113.538254][ T2148] ? security_transition_sid+0x90/0x90 [ 113.543698][ T2148] ? cred_has_capability+0x2ca/0x420 [ 113.548970][ T2148] ? selinux_perf_event_write+0x100/0x100 [ 113.554676][ T2148] ? stack_trace_save+0x120/0x1f0 [ 113.559687][ T2148] ? stack_trace_snprint+0x150/0x150 [ 113.565056][ T2148] ? cap_capable+0x23f/0x280 [ 113.569641][ T2148] ? security_capable+0xb1/0xd0 [ 113.574582][ T2148] ? ns_capable+0x83/0xe0 [ 113.579161][ T2148] security_transition_sid+0x78/0x90 [ 113.584545][ T2148] selinux_bprm_set_creds+0x45c/0xeb0 [ 113.589926][ T2148] ? selinux_netlink_send+0x890/0x890 [ 113.595283][ T2148] ? check_preemption_disabled+0x9e/0x330 [ 113.600987][ T2148] ? debug_smp_processor_id+0x20/0x20 [ 113.606359][ T2148] security_bprm_set_creds+0x50/0xb0 [ 113.611676][ T2148] prepare_binprm+0x539/0x770 [ 113.616351][ T2148] ? up_write+0xa6/0x270 [ 113.620578][ T2148] ? install_exec_creds+0x130/0x130 [ 113.625762][ T2148] ? count+0x19a/0x200 [ 113.629825][ T2148] __do_execve_file+0x1042/0x17e0 [ 113.634843][ T2148] ? do_execve_file+0x40/0x40 [ 113.639504][ T2148] ? getname_flags+0x1fe/0x640 [ 113.644262][ T2148] __x64_sys_execveat+0xcf/0xe0 [ 113.649116][ T2148] do_syscall_64+0xcb/0x1e0 [ 113.653607][ T2148] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.659503][ T2148] RIP: 0033:0x4665d9 [ 113.663384][ T2148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 113.682982][ T2148] RSP: 002b:00007f14e1695188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 113.691421][ T2148] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 113.699386][ T2148] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 113.707347][ T2148] RBP: 00007f14e16951d0 R08: 0000000000001100 R09: 0000000000000000 [ 113.715308][ T2148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.723272][ T2148] R13: 00007ffc1571100f R14: 00007f14e1695300 R15: 0000000000022000 [ 113.731254][ T2150] CPU: 1 PID: 2150 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 113.741426][ T2150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 113.751476][ T2150] Call Trace: [ 113.754766][ T2150] dump_stack+0x1d8/0x24e [ 113.759100][ T2150] ? devkmsg_release+0x11c/0x11c [ 113.764031][ T2150] ? show_regs_print_info+0x12/0x12 [ 113.769221][ T2150] ? kvasprintf+0x107/0x180 [ 113.773715][ T2150] ? asan.module_ctor+0x10/0x10 [ 113.778564][ T2150] should_fail+0x6f6/0x860 [ 113.783081][ T2150] ? setup_fault_attr+0x3d0/0x3d0 [ 113.788102][ T2150] ? kasprintf+0xd1/0x120 [ 113.792430][ T2150] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 113.798314][ T2150] ? mm_alloc+0x1f/0xb0 [ 113.802598][ T2150] should_failslab+0x5/0x20 [ 113.807099][ T2150] kmem_cache_alloc+0x36/0x290 [ 113.811934][ T2150] mm_alloc+0x1f/0xb0 [ 113.815909][ T2150] __do_execve_file+0x91f/0x17e0 [ 113.820846][ T2150] ? do_execve_file+0x40/0x40 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) [ 113.825689][ T2150] ? getname_flags+0x1fe/0x640 [ 113.830448][ T2150] __x64_sys_execveat+0xcf/0xe0 [ 113.835301][ T2150] do_syscall_64+0xcb/0x1e0 [ 113.839846][ T2150] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 113.845846][ T2150] RIP: 0033:0x4665d9 [ 113.849736][ T2150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 113.869503][ T2150] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 113.878002][ T2150] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 113.886006][ T2150] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 113.893973][ T2150] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 113.901940][ T2150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 113.909909][ T2150] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 113.962174][ T2161] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 17:16:43 executing program 5 (fault-call:4 fault-nth:12): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000082e36724c6f34caa846ed2e527703378010040", 0x1f, 0x4e0}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000010000000daf4655fdbf4655fdbf4655f00000000000004008000000000000800050000000af301000400000000000000000000000900000010", 0x3d, 0x4400}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.stat\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0xff, 0x0, 0x0, 0x0, 0x248000009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x80, 0x40, 0x80, 0xa1, 0xb8, 0x0, 0x0, 0xc032, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_config_ext={0x20, 0xff}, 0x2000, 0x0, 0x40, 0x2, 0x2, 0x1, 0x5, 0x0, 0xe7, 0x0, 0xff}, 0x0, 0xd, 0xffffffffffffffff, 0x2) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, 0x0, 0x80) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000001d80)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x800, 0x0) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000800)={0x8, 0x0, {0x0, @usage=0x4, 0x0, 0x5, 0x0, 0x9, 0x0, 0x6, 0x0, @usage=0xfffffffffffffff9, 0x0, 0x8000, [0x34, 0x80000000, 0x1e, 0x4, 0x0, 0x79ec]}, {0x9, @usage=0xee, 0x0, 0x8000, 0x8, 0x2, 0x2, 0x0, 0x40, @struct={0x200, 0x4}, 0x36a, 0x1ff, [0x1f, 0x0, 0x7, 0x2, 0xf89]}, {0x6, @usage=0x3, 0x0, 0x400, 0x5, 0x80000000, 0x338, 0x0, 0x4, @struct={0x0, 0x4}, 0x8001, 0x40, [0x4, 0x7ff, 0x7ff, 0x2b8000000000000, 0x8000, 0xc04]}, {0x8, 0x3, 0x400080000}}) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000500), 0x105000, 0x0) writev(r1, &(0x7f0000000e00)=[{&(0x7f0000000540)="b3ef", 0x2}, {&(0x7f0000000580)="7503feaf0840a3b3461f816760bfa8817049f5e6dcb7fd0b4f62e9fe88bf3ecaed59acf023b0115957cd2109210dba8543c11688d0dbe4222b72b2687d92dbbd8da02e38a5b6750aae06abd4a92516d3f83deea97d2289061a022dfe63d8919323ed489c00707e0a4d271211791a5ed3a1d47ae8ba941184a9424c138479d57eb718880dbf3e9366661ee90530c43ffa9b1fd124c159de07ccc0b6a40f51ef1bc1335259ca635172a6011b94d21872344b21dbd70024226c145c9b86a9fb89feb7ee4b99347e434cbd94dc95d169c1e4d9cf3695e1571035e55646f18afe4c5f5ec62cff54ca528be405646c4652f87acf8b1095b2b3", 0xf6}, {&(0x7f0000000680)="87b63ee93d98eb179a6da1b6f6347b8b366771cf9dfe19a5daeaedf1f8510ebd5e1fdde589148be3c86d3d318bdda0a6cd36604bd38ea18bddd4fa16f0723e645c27b21888f1fe3adf732d26b06139b5d3f767730ec502531a0d2ba8b8a4be9eb180011ab823d8796a34a457b8362e743772f9eb73f6861751de744b3dbd1697fe1a9becdb485d6e2155bb6ebeb6a3615b8392df03b93204868a9947b95f2582ed4ccd61110c1daab257c8d11bd1081535bcb74d8c89e89d43568b2ad4fb146b54", 0xc1}, {&(0x7f0000000c00)="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", 0xfa}, {&(0x7f0000000780)="341f8fdf20add6e5e057fba8df493b7d660969583a4a3fc3fb1bddc6c62b2ebb19d7f0c0efdfcea882d0bbe288a46e61fa9d8d5bc6d3c4a61b361ef53d35c1bd994a", 0x42}, {&(0x7f0000000d00)="d4f888a0ebdb4d31806cf82f6f5c3a930ad664f4bc6c052c1a3416552b372f67bab8b25fd0324598cbc6291ebf21af10e817c1b8be22b183ab3c1b7e8d8e24308c073574970c5cfcbf626a3f7e49e7d2c48e08671aac14a6fbe7d3a9fe369b", 0x5f}, {&(0x7f0000000d80)="045d520c7323ca1cff295684750daa15f040bb0dbd5a2949fdfeff6ad54f1d5b90ac829c39f56a53c7be81ce48ccc9c1b3bf59f3989afb720a6b21c49ba59a6b93b2d1", 0x43}], 0x7) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000440)={&(0x7f0000000e80)=ANY=[@ANYBLOB="4c000000150a010100000000000000000a0000040900020073797a320000000008000340000000070900020073797a31000000000900020073797a30000000000c00064000000000000000057b370feabe1461e05e67e8f47b63bead2fdcae16515d6f8e3db38d218996237d3c2092856538ffb45a2b94b9bf764793692787b14ef8dba9f2f3665842c98a1a080a91bb2f5cae9a7870861c6fed51f0fd526b7d74e7d79c67fd184f13cbc0d7619cd4fd472ad5"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x2400c880) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000002c0)=0x2) write$cgroup_type(r0, &(0x7f0000000140), 0xffffff1f) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz1\x00', 0x200002, 0x0) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(0x0, 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) [ 114.048669][ T2181] FAULT_INJECTION: forcing a failure. [ 114.048669][ T2181] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 114.074653][ T2181] CPU: 1 PID: 2181 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 114.084815][ T2181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) [ 114.095028][ T2181] Call Trace: [ 114.099225][ T2181] dump_stack+0x1d8/0x24e [ 114.103815][ T2181] ? devkmsg_release+0x11c/0x11c [ 114.108755][ T2181] ? show_regs_print_info+0x12/0x12 [ 114.113955][ T2181] ? __kasan_kmalloc+0x1a3/0x1e0 [ 114.118889][ T2181] ? __kasan_kmalloc+0x137/0x1e0 [ 114.123990][ T2181] ? kmem_cache_alloc+0x115/0x290 [ 114.129273][ T2181] ? mm_alloc+0x1f/0xb0 [ 114.133424][ T2181] should_fail+0x6f6/0x860 [ 114.137841][ T2181] ? setup_fault_attr+0x3d0/0x3d0 [ 114.142868][ T2181] __alloc_pages_nodemask+0x1c4/0x880 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) [ 114.148239][ T2181] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 114.153787][ T2181] __get_free_pages+0xa/0x30 [ 114.158384][ T2181] pgd_alloc+0x1e/0x2b0 [ 114.162534][ T2181] mm_init+0x497/0x7a0 [ 114.166594][ T2181] __do_execve_file+0x91f/0x17e0 [ 114.171531][ T2181] ? do_execve_file+0x40/0x40 [ 114.176198][ T2181] ? getname_flags+0x1fe/0x640 [ 114.180951][ T2181] __x64_sys_execveat+0xcf/0xe0 [ 114.185778][ T2181] do_syscall_64+0xcb/0x1e0 [ 114.190324][ T2181] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.196506][ T2181] RIP: 0033:0x4665d9 [ 114.200390][ T2181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.220232][ T2181] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 114.228741][ T2181] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 114.236832][ T2181] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 17:16:43 executing program 5 (fault-call:4 fault-nth:13): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.244826][ T2181] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 [ 114.252838][ T2181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.260788][ T2181] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 [ 114.324252][ T2222] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue [ 114.352464][ T2235] FAULT_INJECTION: forcing a failure. [ 114.352464][ T2235] name failslab, interval 1, probability 0, space 0, times 0 [ 114.367126][ T2235] CPU: 0 PID: 2235 Comm: syz-executor.5 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 114.377305][ T2235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 114.387362][ T2235] Call Trace: [ 114.390658][ T2235] dump_stack+0x1d8/0x24e [ 114.394991][ T2235] ? devkmsg_release+0x11c/0x11c [ 114.399932][ T2235] ? show_regs_print_info+0x12/0x12 [ 114.405280][ T2235] ? __alloc_pages_nodemask+0x3a2/0x880 [ 114.410918][ T2235] should_fail+0x6f6/0x860 [ 114.415424][ T2235] ? setup_fault_attr+0x3d0/0x3d0 [ 114.420449][ T2235] ? vm_area_alloc+0x20/0xe0 [ 114.425046][ T2235] should_failslab+0x5/0x20 [ 114.429564][ T2235] kmem_cache_alloc+0x36/0x290 [ 114.434321][ T2235] vm_area_alloc+0x20/0xe0 [ 114.438835][ T2235] __do_execve_file+0xa25/0x17e0 [ 114.443836][ T2235] ? do_execve_file+0x40/0x40 [ 114.448770][ T2235] ? getname_flags+0x1fe/0x640 [ 114.453531][ T2235] __x64_sys_execveat+0xcf/0xe0 [ 114.458379][ T2235] do_syscall_64+0xcb/0x1e0 [ 114.462966][ T2235] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 114.468875][ T2235] RIP: 0033:0x4665d9 [ 114.472771][ T2235] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 114.492481][ T2235] RSP: 002b:00007f8a4e6e5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 114.500910][ T2235] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 114.508881][ T2235] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 114.516881][ T2235] RBP: 00007f8a4e6e51d0 R08: 0000000000001100 R09: 0000000000000000 17:16:43 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 5 (fault-call:4 fault-nth:14): flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 114.524861][ T2235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 114.532934][ T2235] R13: 00007ffe57f9e0df R14: 00007f8a4e6e5300 R15: 0000000000022000 17:16:43 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 17:16:43 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1102) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0x0, 0x5f37900f6c944c2a) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 17:16:43 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1103) 17:16:43 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 17:16:43 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 17:16:43 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:43 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1104) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 17:16:44 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 17:16:44 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 17:16:44 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1105) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 17:16:44 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x0) 17:16:44 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1106) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 17:16:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f00000001c0)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x800000000009031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000071102400000000009c000000000000000400000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x3, 0x0}, 0x8) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1e, 0x7, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3f}, [@alu={0x7, 0x0, 0x3, 0x8, 0x969025ad547db470, 0x56, 0x4}, @alu={0x7, 0x1, 0x4, 0x7, 0x7, 0x2, 0xfffffffffffffff0}, @btf_id={0x18, 0x7, 0x3, 0x0, 0x2}]}, &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x8a, &(0x7f0000000100)=""/138, 0x41000, 0x10, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x6, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x4, 0x2, 0x800, 0x6}, 0x10, r2, r3}, 0x78) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1107) 17:16:44 executing program 3 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) [ 114.978032][ T2405] FAULT_INJECTION: forcing a failure. [ 114.978032][ T2405] name failslab, interval 1, probability 0, space 0, times 0 [ 115.045244][ T2405] CPU: 0 PID: 2405 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 115.055523][ T2405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.065684][ T2405] Call Trace: [ 115.068978][ T2405] dump_stack+0x1d8/0x24e [ 115.073418][ T2405] ? devkmsg_release+0x11c/0x11c [ 115.078354][ T2405] ? show_regs_print_info+0x12/0x12 [ 115.083555][ T2405] ? __lru_cache_add+0x1c4/0x210 [ 115.088578][ T2405] ? proc_fail_nth_read+0x1c0/0x1c0 [ 115.093776][ T2405] should_fail+0x6f6/0x860 [ 115.098189][ T2405] ? setup_fault_attr+0x3d0/0x3d0 [ 115.103207][ T2405] ? check_preemption_disabled+0x9e/0x330 [ 115.108927][ T2405] ? debug_smp_processor_id+0x20/0x20 [ 115.114296][ T2405] ? getname_flags+0xba/0x640 [ 115.118983][ T2405] should_failslab+0x5/0x20 [ 115.123482][ T2405] kmem_cache_alloc+0x36/0x290 [ 115.128272][ T2405] getname_flags+0xba/0x640 [ 115.132773][ T2405] do_sys_open+0x33e/0x7c0 [ 115.137183][ T2405] ? check_preemption_disabled+0x154/0x330 [ 115.142986][ T2405] ? file_open_root+0x450/0x450 [ 115.147843][ T2405] do_syscall_64+0xcb/0x1e0 [ 115.152353][ T2405] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.158274][ T2405] RIP: 0033:0x4665d9 [ 115.162256][ T2405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.181955][ T2405] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 115.190470][ T2405] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 115.198462][ T2405] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 115.206433][ T2405] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.214510][ T2405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.222481][ T2405] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:44 executing program 4: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1108) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1109) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 17:16:44 executing program 3 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x6]}, 0x8, 0x800) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x7f, 0x1, 0x31, 0x3, 0x0, 0x731, 0xc0820, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb22a, 0x2, @perf_config_ext={0x401, 0x5}, 0xa480, 0x788, 0xff, 0x0, 0x101, 0xfffffe00, 0xfe00, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r1, 0x1) inotify_init() preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/226, 0xe2}, {&(0x7f00000000c0)=""/123, 0x7b}], 0x2, 0xfffff63d, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3c) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sync_file_range(r3, 0x10001, 0x4, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xfa0f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r4, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110a) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) [ 115.336830][ T2457] FAULT_INJECTION: forcing a failure. [ 115.336830][ T2457] name failslab, interval 1, probability 0, space 0, times 0 [ 115.393189][ T2457] CPU: 1 PID: 2457 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 115.403562][ T2457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.413639][ T2457] Call Trace: [ 115.416933][ T2457] dump_stack+0x1d8/0x24e [ 115.421264][ T2457] ? devkmsg_release+0x11c/0x11c [ 115.426200][ T2457] ? arch_stack_walk+0xf8/0x140 [ 115.431047][ T2457] ? show_regs_print_info+0x12/0x12 [ 115.436263][ T2457] should_fail+0x6f6/0x860 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) [ 115.440672][ T2457] ? setup_fault_attr+0x3d0/0x3d0 [ 115.445724][ T2457] ? mntput_no_expire+0x114/0xbd0 [ 115.450754][ T2457] ? stack_trace_save+0x1f0/0x1f0 [ 115.455772][ T2457] ? __alloc_file+0x26/0x380 [ 115.460359][ T2457] should_failslab+0x5/0x20 [ 115.464859][ T2457] kmem_cache_alloc+0x36/0x290 [ 115.469623][ T2457] __alloc_file+0x26/0x380 [ 115.474054][ T2457] ? alloc_empty_file+0x49/0x1b0 [ 115.478994][ T2457] alloc_empty_file+0xa9/0x1b0 [ 115.483754][ T2457] path_openat+0x125/0x3da0 [ 115.488254][ T2457] ? arch_stack_walk+0xf8/0x140 17:16:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) r1 = signalfd4(r0, &(0x7f0000000140)={[0x6]}, 0x8, 0x800) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x7f, 0x1, 0x31, 0x3, 0x0, 0x731, 0xc0820, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0xb22a, 0x2, @perf_config_ext={0x401, 0x5}, 0xa480, 0x788, 0xff, 0x0, 0x101, 0xfffffe00, 0xfe00, 0x0, 0x3, 0x0, 0x3}, 0xffffffffffffffff, 0x7, r1, 0x1) inotify_init() preadv(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000280)=""/226, 0xe2}, {&(0x7f00000000c0)=""/123, 0x7b}], 0x2, 0xfffff63d, 0x0) r2 = socket$inet6(0xa, 0x100000003, 0x3c) r3 = socket$nl_sock_diag(0x10, 0x3, 0x4) sync_file_range(r3, 0x10001, 0x4, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0xfa0f, 0x0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback={0x0, 0xac141409}}, 0x1c) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ftruncate(r4, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) [ 115.493103][ T2457] ? stack_trace_snprint+0x150/0x150 [ 115.498387][ T2457] ? kstrtouint_from_user+0x20f/0x2a0 [ 115.503840][ T2457] ? do_filp_open+0x450/0x450 [ 115.508508][ T2457] ? __kasan_kmalloc+0x137/0x1e0 [ 115.513436][ T2457] ? kmem_cache_alloc+0x115/0x290 [ 115.518453][ T2457] ? getname_flags+0xba/0x640 [ 115.523132][ T2457] ? do_sys_open+0x33e/0x7c0 [ 115.527714][ T2457] ? do_syscall_64+0xcb/0x1e0 [ 115.532389][ T2457] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.538458][ T2457] do_filp_open+0x208/0x450 [ 115.542957][ T2457] ? vfs_tmpfile+0x210/0x210 [ 115.547552][ T2457] ? _raw_spin_unlock+0x49/0x60 [ 115.552397][ T2457] ? __alloc_fd+0x4f1/0x590 [ 115.556896][ T2457] do_sys_open+0x383/0x7c0 [ 115.561307][ T2457] ? check_preemption_disabled+0x154/0x330 [ 115.567112][ T2457] ? file_open_root+0x450/0x450 [ 115.572063][ T2457] do_syscall_64+0xcb/0x1e0 [ 115.576594][ T2457] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.582501][ T2457] RIP: 0033:0x4665d9 [ 115.586391][ T2457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 115.606030][ T2457] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 115.614442][ T2457] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 115.622409][ T2457] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 115.630377][ T2457] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 17:16:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000040)=""/30, 0x1e}], 0x1, 0xd9f, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_SUBVOL_CREATE(r0, 0x5000940e, &(0x7f00000004c0)={{r1}, "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"}) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 17:16:44 executing program 3 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110b) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) [ 115.638346][ T2457] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.646312][ T2457] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:44 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:44 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 17:16:44 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 17:16:44 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110c) [ 115.708292][ T2527] FAULT_INJECTION: forcing a failure. [ 115.708292][ T2527] name failslab, interval 1, probability 0, space 0, times 0 [ 115.765391][ T2527] CPU: 1 PID: 2527 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 115.775584][ T2527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 115.785637][ T2527] Call Trace: [ 115.788929][ T2527] dump_stack+0x1d8/0x24e [ 115.793276][ T2527] ? devkmsg_release+0x11c/0x11c [ 115.798315][ T2527] ? show_regs_print_info+0x12/0x12 [ 115.803513][ T2527] should_fail+0x6f6/0x860 [ 115.807925][ T2527] ? setup_fault_attr+0x3d0/0x3d0 [ 115.812948][ T2527] ? security_file_alloc+0x32/0x1f0 [ 115.818149][ T2527] should_failslab+0x5/0x20 [ 115.822640][ T2527] kmem_cache_alloc+0x36/0x290 [ 115.827419][ T2527] security_file_alloc+0x32/0x1f0 [ 115.832445][ T2527] __alloc_file+0xba/0x380 [ 115.836857][ T2527] alloc_empty_file+0xa9/0x1b0 [ 115.841622][ T2527] path_openat+0x125/0x3da0 [ 115.846097][ T2527] ? arch_stack_walk+0xf8/0x140 [ 115.850922][ T2527] ? stack_trace_snprint+0x150/0x150 [ 115.856231][ T2527] ? kstrtouint_from_user+0x20f/0x2a0 [ 115.861579][ T2527] ? do_filp_open+0x450/0x450 [ 115.866243][ T2527] ? __kasan_kmalloc+0x137/0x1e0 [ 115.871178][ T2527] ? kmem_cache_alloc+0x115/0x290 [ 115.876184][ T2527] ? getname_flags+0xba/0x640 [ 115.880845][ T2527] ? do_sys_open+0x33e/0x7c0 [ 115.885407][ T2527] ? do_syscall_64+0xcb/0x1e0 [ 115.890080][ T2527] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.896145][ T2527] do_filp_open+0x208/0x450 [ 115.900624][ T2527] ? vfs_tmpfile+0x210/0x210 [ 115.905189][ T2527] ? _raw_spin_unlock+0x49/0x60 [ 115.910016][ T2527] ? __alloc_fd+0x4f1/0x590 [ 115.914648][ T2527] do_sys_open+0x383/0x7c0 [ 115.919047][ T2527] ? check_preemption_disabled+0x154/0x330 [ 115.924874][ T2527] ? file_open_root+0x450/0x450 [ 115.929711][ T2527] do_syscall_64+0xcb/0x1e0 [ 115.934364][ T2527] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 115.940254][ T2527] RIP: 0033:0x4665d9 [ 115.944250][ T2527] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d90000000f0000000100000000000000000000000020000000200000200000002cc4645f2cc4645f0100ffff53ef0100010000002cc4645f000000000000000001000000000000000b0000008000000038000000c20200006b0400000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e3338363633343038350000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000d9ca5cac99fd4329af4dde786c1a5d13010040000c000000000000002cc4645f", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB=',nojourna\a_checksul,\x00']) 17:16:45 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:45 executing program 3 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:45 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110d) 17:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 17:16:45 executing program 0: flock(0xffffffffffffffff, 0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000080)=@name, &(0x7f00000000c0)=0x10, 0x800) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x7, 0x400}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) pwritev(r1, &(0x7f0000000540)=[{&(0x7f00000005c0)="f067580956c6eb830e39934319c532493121c64e52cfb3679b8d7f06df341ad93e9993f7469b513fdec74b02c5d79d0389a8dad27599cf94ccec0c9937b4c7d8fdaae9b3a5bca41fc3ad2752064f5c2da182125a24c0d8f6be962f7f29db7ae10dcbc1ec9849399029fe1046235157ce0ace76f501067ae4126cd1c3723e2183158e73d9b511a43b532211e90d17ec6511f7fadf9ed33a5433d0cf0b35cac9f19956860f2cf1caf25239c71d540caaa99701585d1986b02a14b60ef4e079109e939c38f7f925ce130b13c89babdd133579d17c7521a0485a9b7a20dd74c8514915e6ced42211a168e01989b218f44f58ff14e31a6204b23f94efb2a00eb258c34f5e9fcfab37514ed52e9343f93dddda9d66c630a80ba1bc3703eed3b616afaf6f66a7e2b32da48a30aa255f5579f8d214354366c136cf1b49a42b15ab34", 0x13e}, {&(0x7f0000000180)="ccf0d4499654b26a7d642cc382bdaeab4f75cebeaab9e66672a696e752991c1f139dd3c7f24124bfa6910e2409aa0a68a4a6428ae4732c123579e4ea3e004d6e8d3cc23ec35b61f83c814a8f11d94ab2117ab12c23d8a7", 0x57}, {&(0x7f00000002c0)="99f5a2c77021ee53976a5cf582ac3ba2e751392617d6e389b563caf2131263694dab28c68e5cbdb7ce1e5ea00f47e5ebb6a1b5fe2e201bd320d1db7a08b1ecb40205d0dbf0be4f1437cf23f1cbed8bc1a6c07704b7e38d2e024a74f465c17346b110ea41d0d9aae4b4bea124c7046721138dac47383ec428172dcf7ff8a6080697407fb8d5396b52862ee92cb522af68064ce97a25b5f2c53e6727", 0x9b}, {&(0x7f0000000380)="fb9ed3fc2e7a3b22332c476ba1a056bce1da9899b248a980b42a438a58420ffd1217446a97bc264e2853f61dee6216b4efe0fa00fa79f0ef6a8840a01b1ca606b930efbd8e53fe01e6f8ba796b7dab10c7bee6f4a975a6eea7b1ad43c7c66662ccf3047732a41e012f933bb05bc402553ac99b140079c4227592a939fc1ecd3742250c3cc46b7d6a5eddfca55ca0e27a6b6dc01396acd5c8ef00d19451a8d1300e333d85541c99", 0xa7}, {&(0x7f0000000200)="b255ebb4b8a144e4fb9e560fb9b70952da0e6c267a74c75e363f8f0bd0a3ef2765", 0x21}, {&(0x7f0000000440)="f10faa26eb6eb40a047e01fdea031bcec54917c146d466a306cf6e4452f2a7b08dc367f59ee07a10e2d44ab276d886b8378398a46a0cc7ce8d9186b5387d88ab86911bd553e4a06ace5d331d", 0x4c}, {&(0x7f00000004c0)="07b14eb6c1796cd3067b7a50bf600d534adc658421433535890f601646a702c798fa170c4cf980b1258ea7fe5e68b9b1baaf433fb12a148ba25f11ca81a4978ca0f77d8c3ddf864233cd73df7cfb44987a30e4c7f8b687", 0x57}], 0x7, 0x6, 0x7718) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000800)=[&(0x7f0000000700)='#:[+\x00', &(0x7f0000000740)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000007c0)='^\x00'], &(0x7f0000000980)=[&(0x7f0000000840)='\x00', &(0x7f0000000880)='\x00', &(0x7f00000008c0)='#$.\x00', &(0x7f0000000900)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'], 0x400) [ 115.963838][ T2527] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 115.972221][ T2527] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 115.980185][ T2527] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 115.988238][ T2527] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 115.996220][ T2527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.004176][ T2527] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:45 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x110e) 17:16:45 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:45 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='^,%^\\/[-/\x00') execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 17:16:45 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 116.060083][ T2579] FAULT_INJECTION: forcing a failure. [ 116.060083][ T2579] name failslab, interval 1, probability 0, space 0, times 0 [ 116.090272][ T2580] EXT4-fs (loop4): Unrecognized mount option "nojourna_checksul" or missing value 17:16:45 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x8c030000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="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", 0x10c, 0x400}, {&(0x7f0000010200)="0500000000000000000000000000000000000000040100002b", 0x19, 0x560}, {&(0x7f0000010300)="000000000000000000000000000000000000000000000000000000001481910a040000001400000024000000d9000f000300040000000000210d5cf20f00e6ef00000000000000000000000000000000000000000000000065789ee9", 0x5c, 0x7e0}, {&(0x7f0000011e00)="00000000000000000000000000000000000000000000000000000000520b0000ed410000000400002cc4645f2cc4645f2cc4645f00000000000004000200000000000800050000000af3010004000000000000000000000001000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008669", 0x9e, 0x9060}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='resgid=', @ANYRESHEX=0x0, @ANYBLOB=',nojourna\a_checksul,\x00']) 17:16:45 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1110) 17:16:45 executing program 0: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)) flock(0xffffffffffffffff, 0x0) clone(0xf32a0280, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x18100, 0x0) execveat(r0, &(0x7f0000000100)='\x00', 0x0, 0x0, 0x1100) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='\'-\x00') r1 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x9, 0x20, 0x7fffffff}) [ 116.157698][ T2579] CPU: 0 PID: 2579 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 116.168026][ T2579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.178181][ T2579] Call Trace: [ 116.181464][ T2579] dump_stack+0x1d8/0x24e [ 116.185785][ T2579] ? devkmsg_release+0x11c/0x11c [ 116.190724][ T2579] ? show_regs_print_info+0x12/0x12 [ 116.195911][ T2579] ? avc_has_perm_noaudit+0x30c/0x400 [ 116.201269][ T2579] should_fail+0x6f6/0x860 [ 116.205673][ T2579] ? setup_fault_attr+0x3d0/0x3d0 [ 116.210685][ T2579] ? __d_alloc+0x2a/0x6a0 [ 116.215025][ T2579] should_failslab+0x5/0x20 [ 116.219513][ T2579] kmem_cache_alloc+0x36/0x290 [ 116.224276][ T2579] ? selinux_inode_follow_link+0x3c0/0x3c0 [ 116.230063][ T2579] ? _raw_spin_lock+0xa3/0x1b0 [ 116.234814][ T2579] __d_alloc+0x2a/0x6a0 [ 116.238976][ T2579] ? filename_lookup+0x6a0/0x6a0 [ 116.243901][ T2579] ? generic_permission+0x13a/0x490 [ 116.249086][ T2579] d_alloc+0x45/0x1c0 [ 116.253054][ T2579] vfs_tmpfile+0xe6/0x210 [ 116.257472][ T2579] path_openat+0x388f/0x3da0 [ 116.262049][ T2579] ? arch_stack_walk+0xf8/0x140 [ 116.266887][ T2579] ? stack_trace_snprint+0x150/0x150 [ 116.272159][ T2579] ? kstrtouint_from_user+0x20f/0x2a0 [ 116.277521][ T2579] ? do_filp_open+0x450/0x450 [ 116.282185][ T2579] ? __kasan_kmalloc+0x137/0x1e0 [ 116.287379][ T2579] ? kmem_cache_alloc+0x115/0x290 [ 116.292389][ T2579] ? getname_flags+0xba/0x640 [ 116.297072][ T2579] ? do_sys_open+0x33e/0x7c0 [ 116.301914][ T2579] ? do_syscall_64+0xcb/0x1e0 [ 116.306590][ T2579] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.312643][ T2579] do_filp_open+0x208/0x450 [ 116.317144][ T2579] ? vfs_tmpfile+0x210/0x210 [ 116.321725][ T2579] ? _raw_spin_unlock+0x49/0x60 [ 116.326583][ T2579] ? __alloc_fd+0x4f1/0x590 [ 116.331074][ T2579] do_sys_open+0x383/0x7c0 [ 116.335491][ T2579] ? check_preemption_disabled+0x154/0x330 [ 116.341372][ T2579] ? file_open_root+0x450/0x450 [ 116.346213][ T2579] do_syscall_64+0xcb/0x1e0 [ 116.350699][ T2579] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.356574][ T2579] RIP: 0033:0x4665d9 [ 116.360450][ T2579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.380037][ T2579] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 116.388440][ T2579] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 116.396400][ T2579] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 17:16:45 executing program 3 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:45 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1111) 17:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 17:16:45 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 116.404448][ T2579] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.412424][ T2579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.420406][ T2579] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:45 executing program 0: flock(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f00000002c0)={{0x0, 0xfffffffffffffff8, 0x2, 0x7, 0xffffffff, 0x8000, 0x3, 0x6, 0xffff, 0xddca, 0x6, 0x0, 0x1, 0x0, 0x3}}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:45 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) 17:16:45 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:45 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1112) 17:16:45 executing program 0: flock(0xffffffffffffffff, 0x0) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, &(0x7f0000000080)) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 116.521655][ T2656] FAULT_INJECTION: forcing a failure. [ 116.521655][ T2656] name failslab, interval 1, probability 0, space 0, times 0 [ 116.541517][ T2656] CPU: 0 PID: 2656 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 116.551841][ T2656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 116.561916][ T2656] Call Trace: [ 116.565212][ T2656] dump_stack+0x1d8/0x24e [ 116.569518][ T2656] ? devkmsg_release+0x11c/0x11c [ 116.574428][ T2656] ? check_preemption_disabled+0x9e/0x330 [ 116.580118][ T2656] ? show_regs_print_info+0x12/0x12 [ 116.585302][ T2656] ? __unwind_start+0x72f/0x8e0 [ 116.590161][ T2656] ? debug_smp_processor_id+0x20/0x20 [ 116.595525][ T2656] should_fail+0x6f6/0x860 [ 116.599914][ T2656] ? setup_fault_attr+0x3d0/0x3d0 [ 116.604927][ T2656] ? __kernel_text_address+0x93/0x100 [ 116.610277][ T2656] ? unwind_get_return_address+0x48/0x80 [ 116.615896][ T2656] ? arch_stack_walk+0xf8/0x140 [ 116.620719][ T2656] ? ext4_alloc_inode+0x1d/0x620 [ 116.625629][ T2656] should_failslab+0x5/0x20 [ 116.630122][ T2656] kmem_cache_alloc+0x36/0x290 [ 116.634859][ T2656] ? set_qf_name+0x310/0x310 [ 116.639438][ T2656] ext4_alloc_inode+0x1d/0x620 [ 116.644315][ T2656] ? set_qf_name+0x310/0x310 [ 116.649094][ T2656] new_inode_pseudo+0x61/0x220 [ 116.653880][ T2656] new_inode+0x25/0x1d0 [ 116.658028][ T2656] __ext4_new_inode+0x303/0x6190 [ 116.662957][ T2656] ? d_alloc+0x45/0x1c0 [ 116.667085][ T2656] ? vfs_tmpfile+0xe6/0x210 [ 116.671575][ T2656] ? path_openat+0x388f/0x3da0 [ 116.676311][ T2656] ? do_sys_open+0x383/0x7c0 [ 116.681048][ T2656] ? do_syscall_64+0xcb/0x1e0 [ 116.685726][ T2656] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 116.691443][ T2656] ? memset+0x1f/0x40 [ 116.695400][ T2656] ? __dquot_initialize+0x25e/0xe20 [ 116.700573][ T2656] ext4_tmpfile+0x237/0x4a0 [ 116.705049][ T2656] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 116.710406][ T2656] ? ext4_rename2+0x6cb0/0x6cb0 [ 116.715418][ T2656] ? _raw_spin_unlock+0x49/0x60 [ 116.720240][ T2656] ? d_alloc+0x18a/0x1c0 [ 116.724468][ T2656] vfs_tmpfile+0x13a/0x210 [ 116.728861][ T2656] path_openat+0x388f/0x3da0 [ 116.733529][ T2656] ? arch_stack_walk+0xf8/0x140 [ 116.738533][ T2656] ? stack_trace_snprint+0x150/0x150 [ 116.743795][ T2656] ? kstrtouint_from_user+0x20f/0x2a0 [ 116.749160][ T2656] ? do_filp_open+0x450/0x450 [ 116.753819][ T2656] ? __kasan_kmalloc+0x137/0x1e0 [ 116.758731][ T2656] ? kmem_cache_alloc+0x115/0x290 [ 116.763747][ T2656] ? getname_flags+0xba/0x640 [ 116.768401][ T2656] ? do_sys_open+0x33e/0x7c0 [ 116.773069][ T2656] ? do_syscall_64+0xcb/0x1e0 [ 116.777744][ T2656] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.783784][ T2656] do_filp_open+0x208/0x450 [ 116.788272][ T2656] ? vfs_tmpfile+0x210/0x210 [ 116.792850][ T2656] ? _raw_spin_unlock+0x49/0x60 [ 116.797689][ T2656] ? __alloc_fd+0x4f1/0x590 [ 116.802306][ T2656] do_sys_open+0x383/0x7c0 [ 116.806711][ T2656] ? check_preemption_disabled+0x154/0x330 [ 116.812536][ T2656] ? file_open_root+0x450/0x450 [ 116.817401][ T2656] do_syscall_64+0xcb/0x1e0 [ 116.821880][ T2656] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 116.827846][ T2656] RIP: 0033:0x4665d9 [ 116.831726][ T2656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 116.851391][ T2656] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 116.859973][ T2656] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 17:16:46 executing program 4: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1123) 17:16:46 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 116.867945][ T2656] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 116.875981][ T2656] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 116.883929][ T2656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.891909][ T2656] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:46 executing program 3 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:46 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000002c0)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x80, 0x4, 0x44, 0x4, 0x0, 0x9, 0x30208, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x919e878e0063edd7, @perf_bp={&(0x7f0000000080), 0x14}, 0x448, 0x5, 0x28, 0x7, 0xff, 0x4, 0x1, 0x0, 0x2, 0x0, 0xfffffffffffffff8}, r1, 0x4, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:46 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1126) 17:16:46 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) 17:16:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r7, 0x8912, 0x400308) 17:16:46 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x1, 0x1, 0x6, 0x10001, 0x3, 0x3, 0x81, 0x1cc, 0x40, 0x22e, 0x400, 0x81, 0x38, 0x2, 0x3, 0x2, 0x7}, [{0x4, 0x3, 0x81, 0x2acc, 0x650, 0x30000000, 0x670, 0x200}, {0x2, 0xd47, 0x3, 0x3, 0x9, 0x0, 0x5, 0x8001}], "ec818bd368299d6c2d5b91c1c55fec70c4c6dbd01247fd086f952e3f90af111e7857fde8e51cf09d237198885fb16ecc73a9bee24fa3cd1b203d7a1895cd9b5fb12a"}, 0xf2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:46 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) [ 117.004563][ T2682] FAULT_INJECTION: forcing a failure. [ 117.004563][ T2682] name failslab, interval 1, probability 0, space 0, times 0 [ 117.068736][ T2703] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 117.074050][ T2682] CPU: 0 PID: 2682 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 117.088186][ T2682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.098236][ T2682] Call Trace: [ 117.101531][ T2682] dump_stack+0x1d8/0x24e [ 117.105885][ T2682] ? devkmsg_release+0x11c/0x11c [ 117.110852][ T2682] ? show_regs_print_info+0x12/0x12 [ 117.116046][ T2682] should_fail+0x6f6/0x860 [ 117.120456][ T2682] ? setup_fault_attr+0x3d0/0x3d0 [ 117.125567][ T2682] ? security_inode_alloc+0x32/0x1d0 [ 117.130933][ T2682] should_failslab+0x5/0x20 [ 117.135438][ T2682] kmem_cache_alloc+0x36/0x290 [ 117.140237][ T2682] ? from_kuid_munged+0x3b0/0x3b0 [ 117.145259][ T2682] ? ext4_alloc_inode+0x1d/0x620 [ 117.150192][ T2682] security_inode_alloc+0x32/0x1d0 [ 117.155302][ T2682] inode_init_always+0x387/0x810 [ 117.160363][ T2682] ? set_qf_name+0x310/0x310 [ 117.164950][ T2682] new_inode_pseudo+0x90/0x220 [ 117.169710][ T2682] new_inode+0x25/0x1d0 [ 117.173863][ T2682] __ext4_new_inode+0x303/0x6190 [ 117.178819][ T2682] ? d_alloc+0x45/0x1c0 [ 117.182969][ T2682] ? vfs_tmpfile+0xe6/0x210 [ 117.187485][ T2682] ? path_openat+0x388f/0x3da0 [ 117.192245][ T2682] ? do_sys_open+0x383/0x7c0 [ 117.196943][ T2682] ? do_syscall_64+0xcb/0x1e0 [ 117.201642][ T2682] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 117.207368][ T2682] ? memset+0x1f/0x40 [ 117.211527][ T2682] ? __dquot_initialize+0x25e/0xe20 [ 117.216731][ T2682] ext4_tmpfile+0x237/0x4a0 [ 117.221236][ T2682] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 117.226806][ T2682] ? ext4_rename2+0x6cb0/0x6cb0 [ 117.231685][ T2682] ? _raw_spin_unlock+0x49/0x60 [ 117.236620][ T2682] ? d_alloc+0x18a/0x1c0 [ 117.240888][ T2682] vfs_tmpfile+0x13a/0x210 [ 117.245301][ T2682] path_openat+0x388f/0x3da0 [ 117.250025][ T2682] ? arch_stack_walk+0xf8/0x140 [ 117.254877][ T2682] ? stack_trace_snprint+0x150/0x150 [ 117.260162][ T2682] ? kstrtouint_from_user+0x20f/0x2a0 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x112f) 17:16:46 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1148) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x114c) [ 117.265540][ T2682] ? do_filp_open+0x450/0x450 [ 117.270240][ T2682] ? __kasan_kmalloc+0x137/0x1e0 [ 117.275177][ T2682] ? kmem_cache_alloc+0x115/0x290 [ 117.280202][ T2682] ? getname_flags+0xba/0x640 [ 117.285013][ T2682] ? do_sys_open+0x33e/0x7c0 [ 117.289591][ T2682] ? do_syscall_64+0xcb/0x1e0 [ 117.294279][ T2682] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.300370][ T2682] do_filp_open+0x208/0x450 [ 117.304976][ T2682] ? vfs_tmpfile+0x210/0x210 [ 117.309628][ T2682] ? _raw_spin_unlock+0x49/0x60 [ 117.314628][ T2682] ? __alloc_fd+0x4f1/0x590 [ 117.319108][ T2682] do_sys_open+0x383/0x7c0 [ 117.323603][ T2682] ? check_preemption_disabled+0x154/0x330 [ 117.329407][ T2682] ? file_open_root+0x450/0x450 [ 117.334272][ T2682] do_syscall_64+0xcb/0x1e0 [ 117.338752][ T2682] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.344618][ T2682] RIP: 0033:0x4665d9 [ 117.348486][ T2682] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 17:16:46 executing program 3 (fault-call:5 fault-nth:6): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:46 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1168) 17:16:46 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) 17:16:46 executing program 0: flock(0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080), 0x2000, 0x0) flock(r0, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = socket$unix(0x1, 0x2, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f00000000c0)={0x39, 0xc6b, 0x5, 0x0, 0x2, [{0x2ff, 0x4, 0x1300000000000000, '\x00', 0x480}, {0x6, 0x200, 0x5, '\x00', 0x1000}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 117.368253][ T2682] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 117.376639][ T2682] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 117.384586][ T2682] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 117.392531][ T2682] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.400477][ T2682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.408421][ T2682] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 [ 117.453805][ T2751] FAULT_INJECTION: forcing a failure. [ 117.453805][ T2751] name failslab, interval 1, probability 0, space 0, times 0 [ 117.466494][ T2751] CPU: 0 PID: 2751 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 117.476757][ T2751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.487000][ T2751] Call Trace: [ 117.490578][ T2751] dump_stack+0x1d8/0x24e [ 117.494933][ T2751] ? devkmsg_release+0x11c/0x11c 17:16:46 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r7, 0x8912, 0x400308) 17:16:46 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 117.499869][ T2751] ? show_regs_print_info+0x12/0x12 [ 117.505369][ T2751] ? preempt_count_add+0x66/0x130 [ 117.510393][ T2751] should_fail+0x6f6/0x860 [ 117.514806][ T2751] ? setup_fault_attr+0x3d0/0x3d0 [ 117.519829][ T2751] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.525915][ T2751] ? ebitmap_cmp+0x1b8/0x220 [ 117.530792][ T2751] ? mls_compute_context_len+0x7dd/0x810 [ 117.536554][ T2751] ? context_struct_to_string+0x43b/0x8b0 [ 117.536849][ T2762] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:46 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x116c) [ 117.542569][ T2751] should_failslab+0x5/0x20 [ 117.542579][ T2751] __kmalloc+0x5f/0x2f0 [ 117.542590][ T2751] context_struct_to_string+0x43b/0x8b0 [ 117.542606][ T2751] ? security_bounded_transition+0x560/0x560 [ 117.573296][ T2751] ? symhash+0xe0/0xe0 [ 117.577364][ T2751] ? hashtab_search+0x1bf/0x200 [ 117.582208][ T2751] context_add_hash+0x13f/0x270 [ 117.587055][ T2751] ? security_sid_to_context_inval+0x40/0x40 [ 117.593144][ T2751] ? mls_context_isvalid+0x98/0x380 [ 117.598339][ T2751] ? policydb_context_isvalid+0x1b6/0x400 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1174) 17:16:46 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 117.604068][ T2751] security_compute_sid+0x1142/0x1d00 [ 117.609437][ T2751] ? __rcu_read_lock+0x50/0x50 [ 117.614204][ T2751] ? security_transition_sid+0x90/0x90 [ 117.619846][ T2751] ? page_cache_prev_miss+0x3f0/0x3f0 [ 117.625996][ T2751] ? __rcu_read_lock+0x50/0x50 [ 117.630755][ T2751] ? xas_load+0x4a6/0x4f0 [ 117.635084][ T2751] ? chksum_update+0x41/0x90 [ 117.639698][ T2751] ? crypto_shash_update+0x1ed/0x2b0 [ 117.644983][ T2751] security_transition_sid+0x78/0x90 17:16:46 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x117a) [ 117.650496][ T2751] selinux_inode_init_security+0x4b7/0xaf0 [ 117.656303][ T2751] ? selinux_inode_free_security+0x1d0/0x1d0 [ 117.662455][ T2751] ? get_cached_acl+0x10e/0x130 [ 117.667569][ T2751] security_inode_init_security+0x15f/0x3a0 [ 117.673485][ T2751] ? posix_acl_create+0x15f/0x400 [ 117.678534][ T2751] ? ext4_init_security+0x40/0x40 [ 117.683553][ T2751] ? security_dentry_create_files_as+0xd0/0xd0 [ 117.689733][ T2751] ? ext4_init_acl+0x31e/0x360 [ 117.694493][ T2751] ? prandom_u32+0x21a/0x240 [ 117.699135][ T2751] __ext4_new_inode+0x4c66/0x6190 [ 117.704250][ T2751] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 117.710064][ T2751] ext4_tmpfile+0x237/0x4a0 [ 117.714573][ T2751] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 117.719941][ T2751] ? ext4_rename2+0x6cb0/0x6cb0 [ 117.725141][ T2751] ? _raw_spin_unlock+0x49/0x60 [ 117.730075][ T2751] ? d_alloc+0x18a/0x1c0 [ 117.734335][ T2751] vfs_tmpfile+0x13a/0x210 [ 117.738754][ T2751] path_openat+0x388f/0x3da0 [ 117.743348][ T2751] ? arch_stack_walk+0xf8/0x140 [ 117.748208][ T2751] ? stack_trace_snprint+0x150/0x150 [ 117.753498][ T2751] ? kstrtouint_from_user+0x20f/0x2a0 [ 117.758890][ T2751] ? do_filp_open+0x450/0x450 [ 117.763565][ T2751] ? __kasan_kmalloc+0x137/0x1e0 [ 117.768499][ T2751] ? kmem_cache_alloc+0x115/0x290 [ 117.773517][ T2751] ? getname_flags+0xba/0x640 [ 117.778306][ T2751] ? do_sys_open+0x33e/0x7c0 [ 117.782898][ T2751] ? do_syscall_64+0xcb/0x1e0 [ 117.787740][ T2751] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.793801][ T2751] do_filp_open+0x208/0x450 [ 117.798294][ T2751] ? vfs_tmpfile+0x210/0x210 [ 117.802860][ T2751] ? _raw_spin_unlock+0x49/0x60 [ 117.807702][ T2751] ? __alloc_fd+0x4f1/0x590 [ 117.812181][ T2751] do_sys_open+0x383/0x7c0 [ 117.816588][ T2751] ? check_preemption_disabled+0x154/0x330 [ 117.822609][ T2751] ? file_open_root+0x450/0x450 [ 117.827461][ T2751] do_syscall_64+0xcb/0x1e0 [ 117.831944][ T2751] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 117.837812][ T2751] RIP: 0033:0x4665d9 [ 117.841846][ T2751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.861693][ T2751] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 117.870094][ T2751] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 117.878214][ T2751] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 117.886168][ T2751] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 117.894139][ T2751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 17:16:47 executing program 3 (fault-call:5 fault-nth:7): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:47 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x11ef) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) gettid() ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 117.902114][ T2751] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 [ 117.955595][ T2806] FAULT_INJECTION: forcing a failure. [ 117.955595][ T2806] name failslab, interval 1, probability 0, space 0, times 0 [ 117.968408][ T2806] CPU: 0 PID: 2806 Comm: syz-executor.3 Not tainted 5.4.123-syzkaller-00835-g3e256ddba1ff #0 [ 117.978683][ T2806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 117.988769][ T2806] Call Trace: [ 117.992064][ T2806] dump_stack+0x1d8/0x24e [ 117.996420][ T2806] ? devkmsg_release+0x11c/0x11c 17:16:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r7, 0x8912, 0x400308) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$setopts(0x4200, r1, 0xffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) tkill(0x0, 0x37) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.001387][ T2806] ? show_regs_print_info+0x12/0x12 [ 118.006589][ T2806] ? preempt_count_add+0x66/0x130 [ 118.011612][ T2806] should_fail+0x6f6/0x860 [ 118.016023][ T2806] ? setup_fault_attr+0x3d0/0x3d0 [ 118.021221][ T2806] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.027288][ T2806] ? ebitmap_cmp+0x1b8/0x220 [ 118.032007][ T2806] ? mls_compute_context_len+0x7dd/0x810 [ 118.037721][ T2806] ? context_struct_to_string+0x43b/0x8b0 [ 118.043541][ T2806] should_failslab+0x5/0x20 [ 118.048044][ T2806] __kmalloc+0x5f/0x2f0 [ 118.052243][ T2806] context_struct_to_string+0x43b/0x8b0 [ 118.057913][ T2806] ? security_bounded_transition+0x560/0x560 [ 118.063921][ T2806] ? symhash+0xe0/0xe0 [ 118.065778][ T2826] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 118.068332][ T2806] ? hashtab_search+0x1bf/0x200 [ 118.068344][ T2806] context_add_hash+0x13f/0x270 [ 118.068355][ T2806] ? security_sid_to_context_inval+0x40/0x40 [ 118.068363][ T2806] ? mls_context_isvalid+0x98/0x380 [ 118.068378][ T2806] ? policydb_context_isvalid+0x1b6/0x400 17:16:47 executing program 0: r0 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80000) flock(r0, 0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) gettid() execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.104526][ T2806] security_compute_sid+0x1142/0x1d00 [ 118.109901][ T2806] ? __rcu_read_lock+0x50/0x50 [ 118.114752][ T2806] ? security_transition_sid+0x90/0x90 [ 118.120211][ T2806] ? page_cache_prev_miss+0x3f0/0x3f0 [ 118.125756][ T2806] ? __rcu_read_lock+0x50/0x50 [ 118.130517][ T2806] ? xas_load+0x4a6/0x4f0 [ 118.134841][ T2806] ? chksum_update+0x41/0x90 [ 118.139466][ T2806] ? crypto_shash_update+0x1ed/0x2b0 [ 118.144749][ T2806] security_transition_sid+0x78/0x90 [ 118.150471][ T2806] selinux_inode_init_security+0x4b7/0xaf0 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.156277][ T2806] ? selinux_inode_free_security+0x1d0/0x1d0 [ 118.162356][ T2806] ? get_cached_acl+0x10e/0x130 [ 118.167202][ T2806] security_inode_init_security+0x15f/0x3a0 [ 118.173264][ T2806] ? posix_acl_create+0x15f/0x400 [ 118.178394][ T2806] ? ext4_init_security+0x40/0x40 [ 118.183433][ T2806] ? security_dentry_create_files_as+0xd0/0xd0 [ 118.191901][ T2806] ? ext4_init_acl+0x31e/0x360 [ 118.196748][ T2806] ? prandom_u32+0x21a/0x240 [ 118.201368][ T2806] __ext4_new_inode+0x4c66/0x6190 [ 118.206414][ T2806] ? ext4_read_inode_bitmap+0x1950/0x1950 [ 118.212148][ T2806] ext4_tmpfile+0x237/0x4a0 [ 118.216666][ T2806] ? _raw_spin_trylock_bh+0x1a0/0x1a0 [ 118.222034][ T2806] ? ext4_rename2+0x6cb0/0x6cb0 [ 118.226889][ T2806] ? _raw_spin_unlock+0x49/0x60 [ 118.231739][ T2806] ? d_alloc+0x18a/0x1c0 [ 118.236022][ T2806] vfs_tmpfile+0x13a/0x210 [ 118.240445][ T2806] path_openat+0x388f/0x3da0 [ 118.245033][ T2806] ? arch_stack_walk+0xf8/0x140 [ 118.249892][ T2806] ? stack_trace_snprint+0x150/0x150 [ 118.255177][ T2806] ? do_filp_open+0x450/0x450 [ 118.259886][ T2806] ? __kasan_kmalloc+0x137/0x1e0 [ 118.264820][ T2806] ? kmem_cache_alloc+0x115/0x290 [ 118.269838][ T2806] ? getname_flags+0xba/0x640 [ 118.274517][ T2806] ? do_sys_open+0x33e/0x7c0 [ 118.279097][ T2806] ? do_syscall_64+0xcb/0x1e0 [ 118.284241][ T2806] ? entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.290297][ T2806] do_filp_open+0x208/0x450 [ 118.294791][ T2806] ? vfs_tmpfile+0x210/0x210 [ 118.299364][ T2806] ? _raw_spin_unlock+0x49/0x60 [ 118.304204][ T2806] ? __alloc_fd+0x4f1/0x590 [ 118.308716][ T2806] do_sys_open+0x383/0x7c0 [ 118.313131][ T2806] ? check_preemption_disabled+0x154/0x330 [ 118.318921][ T2806] ? file_open_root+0x450/0x450 [ 118.323757][ T2806] do_syscall_64+0xcb/0x1e0 [ 118.328418][ T2806] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 118.334287][ T2806] RIP: 0033:0x4665d9 17:16:47 executing program 3 (fault-call:5 fault-nth:8): mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000c80)='./file0\x00', 0x83440, 0x0) flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80820280, &(0x7f0000000d40)="a644ac906228efc8550b2036c39fac26212df0505f04764cbe5a70b1432c7597262f7b3603ae7a74ea8cea07fe84dbb5647fb64e12f43513a6577f4559711f5bc70b3bab2a0208a5a0585aa4e6ec7b010000002121e33fd48632fe6118dfa777695249349ed72d6eeeed12a9a1713c58636a404ba6962f36ff3542f409bac4ad4ae63d5f5cd20ddad1f8c938e3514f991d77d4879ddaaa1892a97c490ef7cd6d583988a7e55cf8ce3e033307f10283284831424f22e5f618aab73efa7aada1eca646957d88a5a3d5bdb3584ba4ab32680500000000000000e21ad494d41867d44c83e4df0c4b61e26776e0f93ac9fa8f8fbcb85fd2fc8bbe4a7d5457582a431ee9e754f35b82db1c749ebc750080000000000000b870971fb890e4b5fb23aa78e16e4d08986cb81ba87f000000000000006fe242bb5d0fa31f4b2218f9fcf82159fb7ef153decca1b76334e8107da15659c56887a3c061112da4ce45eb628743d68257d2bee5d6c7716ea23af7f70db9424e701c2441c0edaf7747995767f1b3793e0e4280668338f7e8f3c0894f2eaa96216d1586435a7b22100000e69a375e6d29916597853a1a6a073548fce94483dd715fa5163e1c5305aab8a9c47ffa7f5f23b06aab4f94dc56f2c1f4dcc34c5cf2b18a2b0c742165d2c79493ee132f7bf92a6fd2142848c220793166e2f338cd16bcc8305be47f5a3bfe7dd3e4e18d390c06c656f859e081a93fbc50cfb1edd3eb665e899c3c066dc8dfe9cd43adfc7f96806b5735542937162d40740a7a899987c4474cf2390f79ac32187e01feb3e8fb30e7245af2e7e5297951c9a1b7e7102c6f94", &(0x7f00000009c0), &(0x7f0000000a00), &(0x7f0000000a40)="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") memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000008c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@broadcast, 0x4e23, 0x2, 0x4e24, 0x0, 0xa, 0x0, 0x20, 0x1, 0x0, 0xffffffffffffffff}, {0x8d2c, 0x7, 0x100, 0x1f, 0x9, 0x7, 0x80, 0xb747}, {0x7, 0x3, 0xfffffffeffffffff, 0x4}, 0xfff, 0x6e6bbd, 0x1, 0x1, 0x3, 0x1}, {{@in=@multicast1, 0x4d4, 0x33}, 0x2, @in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x3503, 0x0, 0x0, 0x7f, 0x5, 0x85, 0xffff}}, 0xe8) clone(0x24242000, &(0x7f0000000780)="6247e31bcde9f936fb835fb3bc9057c3f7cc9c69e65ec54e65e0fad8b7e501b28320b84a8111240894e6d11da7fc80ef61b0376eb56b1ff1fc0d99a14830ee0ebaca33bd9f65ea94086f017610c9e598ea24a550da3cf482", &(0x7f0000000000), &(0x7f0000000800), &(0x7f0000000840)="a0e78faad6281f2fc189ef29e2fed84eb59da5814514f79679f728eb07615b74848faa1f0809af078cf98ab734b780aeb1431c313334d56133c7b4d3182be4c9dfa7b176c5e63a34b08e5e00e3371d42c399ad2b02a2e90adb72455b5cfd47b58b0f182472e4b1134cb0663873dd69cdb7") ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000740)='./file1\x00', 0x0, 0x0, 0x1100) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=[&(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000140)=')){\x00', &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000200)='\x00'], &(0x7f00000006c0)=[&(0x7f0000000380)='#)^\xc6[\x10\xa7}@\x00', &(0x7f00000003c0)=')}&{\x00', &(0x7f0000000400)='-E])\x00', &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000540)='^\x00', &(0x7f0000000580)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000600)='[#/:\'.,-//\x00', &(0x7f0000000640)='^}S\xba!\x00', &(0x7f0000000680)='$\x00'], 0x1000) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) syncfs(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2000009, 0x12, r0, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) mmap(&(0x7f0000467000/0x2000)=nil, 0x2000, 0xd, 0x30, r0, 0x42efa000) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$EVIOCGMTSLOTS(r1, 0x8040450a, &(0x7f0000000080)=""/46) [ 118.338159][ T2806] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 118.358008][ T2806] RSP: 002b:00007f71ecb06188 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 118.366505][ T2806] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 118.374556][ T2806] RDX: 5f37900f6c944c2a RSI: c40beb2474df942a RDI: 00000000200002c0 [ 118.382628][ T2806] RBP: 00007f71ecb061d0 R08: 0000000000000000 R09: 0000000000000000 [ 118.390574][ T2806] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.398531][ T2806] R13: 00007fff89c1e1af R14: 00007f71ecb06300 R15: 0000000000022000 17:16:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r7, 0x8912, 0x400308) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x40000, &(0x7f0000000080)="874e9cc20e83da8adbc343aae604878a0486a8f8c683110f753a8eab8adc2106a0bb38328d5d3b7cfd1c3ef50dcba3bf4b7eb4b013b4fa39769140551806452dfb4465ee186900899257a9acf9dba51308852991fc2bfca5e5dfffc50c4dd69791532e00f742c523f055ad49743d43430c0f2d004773bf89a7abbb0dd6f1b1e115e9e0fedaa51c8b7b4bba31311d8b19061747e6c408d1137d89a1e8f5ee438f1047d570283978687dc670c28fb0f049966acb5a310dbaae10b4f097a59eae9221cca663d40f30b95c2b6a7224b69e3f8bcc708ddef23b666ddbca2ea20cd0c6", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="6b0f5ea00a674fdf01e7b92424de6a3f30e8b9aa1e43ef") r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = memfd_create(&(0x7f0000000200)='-:,-\x00', 0x6) signalfd(r1, &(0x7f00000002c0)={[0x7ffffffc]}, 0x8) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x5, 0x20, 0xff, 0x4, 0x0, 0x20, 0x11, 0x5, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x7}, 0x80, 0x9, 0x80, 0x0, 0x3ff, 0x5, 0x200, 0x0, 0x9, 0x0, 0x3f}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000001c0)=0x401) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r4, &(0x7f0000000200)='./file0\x00', &(0x7f0000000440)=[&(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000003c0), &(0x7f0000000400)='\x1a@}\x00'], &(0x7f0000000580)=[&(0x7f0000000480)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000500)='%\x00', &(0x7f0000000540)='].,\'!\\]\xd1!*@#-]\\.)$..\x00'], 0x1000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x4, 0x1f, 0xd0, 0x80, 0x0, 0x2eb000000000, 0x4000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_bp={&(0x7f0000000080)}, 0xe03, 0x5, 0x8, 0x0, 0x1, 0x5, 0x7, 0x0, 0x1ff, 0x0, 0xffffffffffffff80}, r2, 0x0, r3, 0x8) 17:16:47 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_FS_INFO(r0, 0x8400941f, &(0x7f0000000300)) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) wait4(0x0, 0x0, 0x80000000, 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0xffffffff, 0x8, 0x0, 0x1, 0x7}) 17:16:47 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f00000000c0)={'ip6erspan0\x00', @random}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r2 = signalfd(r1, &(0x7f00000015c0)={[0x2]}, 0x8) sendmsg$xdp(r2, &(0x7f0000002700)={0x0, 0x0, &(0x7f00000026c0)=[{&(0x7f0000001600)="1ec81338c1f3254cfd498156fab916b1c4de9485", 0x14}, {&(0x7f0000001640)="7354a49628da40ab138808e02f2741e89a53eac9d5bce9934a5a1e7573f26504e9cc085a5cec1be525583ab07f8c641d2d40df310d23a41f7322cfb876da45691a1db1ee504c7237b9583d58e92ea40c74297c3fde5f63c4c93efbc3511316621df727d7cced4a940e2cdffc66bcb1c9284e0748", 0x74}, {&(0x7f00000016c0)="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", 0x1000}], 0x3}, 0x20000044) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x741840, 0x20) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.508920][ T2879] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r2, 0x3) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r3 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x80, 0x0, 0x4, 0x40, 0x0, 0x251, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0x1, 0x4}, 0x40001, 0x4, 0x8b7, 0x4, 0x2, 0x9, 0x100, 0x0, 0x40, 0x0, 0x4}, r3, 0x5, r2, 0x2) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000280)) 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x8816, 0x5}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) syz_io_uring_complete(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x800) 17:16:47 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000080), 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000080)=0x1) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x7) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800000, &(0x7f0000000300)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0xa00}}], [{@seclabel}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r2) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000001480), 0xffffffffffffffff) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010700000000000000000e00000008000300", @ANYRES32=r6, @ANYBLOB="a75211244323d57e8a5a8bbb2760ad70059b858867030982a26347859973ed204e9fe79d5650a66bdf5bb67423d052d9e4b1c5b4601276c72cf7fb443855992c453399b9fb9ef69d9e47d97c91ac6b988741aa17096b2c1d5641cb722c48b9a0d52f54db01d527604b0e6ce7ef480e228abf363ef72e8735ad687d4399c53c919af6ca7b82672a7a02a1b2a0a6e2fb61653a639d8fb0891f3a10855c382007d843ca08fa48ce586b6cb08e38761eb81ea997f0b9c24a66f49e7fa1e809caf27ca95fd6734062c9"], 0x1c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000980)=@newtfilter={0x6798, 0x2c, 0x100, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x5, 0xfff2}, {0xffff, 0xc}, {0x4, 0xc}}, [@filter_kind_options=@f_fw={{0x7}, {0x6374, 0x2, [@TCA_FW_ACT={0x5f20, 0x4, [@m_police={0xd64, 0x5, 0x0, 0x0, {{0xb}, {0xc54, 0x2, 0x0, 0x1, [[@TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2eeda3e7, 0x1, 0x116, 0x7, 0x4, 0x8, 0x3, 0xaa7, 0x5, 0x1, 0xc71b, 0x9, 0x5, 0x400, 0xffffffff, 0x4, 0x6eee, 0xe2, 0x1f, 0x100, 0x0, 0xffff, 0x2, 0x0, 0x401, 0x2, 0x7fffffff, 0x3, 0x5, 0x3, 0x10001, 0x7, 0x3, 0x1ff, 0x4, 0x4, 0xb9, 0x2, 0x4, 0x4, 0x5, 0xffffffff, 0x0, 0x2, 0x1f, 0x3, 0x8, 0x80000001, 0x3, 0x80000001, 0xbcc, 0x2, 0x62d6, 0x4, 0x0, 0x2, 0xde8, 0x9, 0x10000, 0x4, 0x2, 0x3ff, 0x8, 0x81, 0x6c, 0x0, 0x1, 0x5, 0x0, 0x4, 0x401, 0x80000, 0x3, 0x4, 0x80000000, 0x6, 0x6, 0x0, 0xffff, 0x7fff, 0x101, 0x4, 0x3, 0x0, 0x8, 0xe1a, 0x81, 0x3, 0x744, 0x8001, 0x81, 0x3, 0x3f, 0x7ff, 0x7, 0x0, 0x2, 0xfffffc00, 0x15f, 0x0, 0x7, 0x9, 0x1f, 0xa12, 0x0, 0x2, 0x1, 0xffffffff, 0x7, 0x200, 0x7, 0x1, 0x4, 0x7, 0x2, 0x20, 0x7, 0x5, 0x2, 0x800, 0x10000, 0x20, 0x6, 0x1f, 0x1f, 0x8b, 0x1, 0x2, 0x4, 0x7fffffff, 0x97, 0x81, 0x7f, 0x7, 0x1f, 0x9, 0x7, 0x8ae, 0x3, 0x7f, 0x6, 0x1, 0x4, 0xfff, 0x0, 0x2, 0x7813, 0x9, 0x101, 0x10000, 0x80000001, 0xeb, 0x5, 0x8, 0x9, 0x9, 0xd48, 0x800, 0x46cc, 0xffff2faa, 0x1000, 0x20, 0xab27, 0xe01, 0x3, 0x8, 0x2, 0x0, 0x8c, 0xe52, 0x0, 0x7, 0x6, 0x20, 0x1, 0x7, 0x3, 0x1, 0x40, 0x7, 0x1, 0x9610, 0x1f, 0x8001, 0x6, 0x7fffffff, 0xb3d6, 0x12a9, 0x9, 0x7, 0x20, 0xffffffff, 0xa0, 0xc2f, 0x2, 0x9, 0x9e95, 0xfffffffb, 0x0, 0x1efe, 0xffffff16, 0x81, 0x100, 0x1, 0x1, 0x3c, 0x1, 0x0, 0x0, 0x401, 0x1f2, 0x68, 0x80000000, 0x3, 0xffff1682, 0x4, 0x6, 0x0, 0x80000001, 0x81, 0x1, 0x4, 0x8000, 0x2a816dcd, 0x5f, 0x7, 0x10001, 0xffffff80, 0xfffffffd, 0x200, 0x7fff, 0x800, 0x7, 0x4, 0x8, 0x8, 0x1, 0x5, 0x4, 0x80000000, 0x1, 0x7fffffff, 0x4, 0x5, 0xf0000000, 0x1, 0x7, 0x3, 0x2, 0x2, 0x0, 0x2, 0xfffffffd, 0x7fff, 0x80, 0x80000000]}], [@TCA_POLICE_RATE={0x404, 0x2, [0x9, 0xffffff99, 0x8001, 0x5, 0x9, 0x8000, 0x6, 0x7, 0xffff, 0x6, 0x6, 0x7, 0xb3a, 0x0, 0x1000, 0x80000001, 0x8, 0x1, 0x9c6, 0x7, 0xba, 0x0, 0x3ab, 0x7, 0x1, 0x800, 0x9, 0xffffffff, 0x9, 0x0, 0x57, 0x500, 0x0, 0xffffffff, 0x2, 0x1, 0x7, 0x2837a64c, 0x3, 0x89a, 0x5, 0x3cd, 0x7fffffff, 0x0, 0x10001, 0x9, 0x3ff, 0x7, 0x8, 0x7f, 0x0, 0x7, 0x7, 0x4, 0x5, 0x6, 0x20, 0x20, 0x3f, 0x9, 0x401, 0xfffffffa, 0x400, 0x1, 0x5, 0x2, 0x5ac, 0xffffffff, 0x0, 0x1, 0xfffff5cc, 0x1, 0x4, 0x6, 0x7fff, 0x9, 0x2, 0x5, 0xde0, 0x80000000, 0x8000, 0xae, 0x4, 0x7, 0x1, 0x9, 0x1ff, 0x1, 0x5, 0x0, 0x0, 0x5, 0x100, 0x6, 0x4, 0x9c8, 0xffff, 0x4, 0x100, 0x800, 0x8000000, 0x5000000, 0xfffffbff, 0x4, 0x3, 0x8, 0x80000000, 0x7a, 0x2, 0x0, 0x6f21, 0xfffff000, 0x6, 0x401, 0x1, 0x1ff, 0x200, 0x6, 0xffff, 0x7f, 0x6, 0xbd0, 0x401, 0x7ff, 0xfff, 0x3f, 0x8, 0x2, 0x4, 0x26e40000, 0x4, 0x1, 0x9, 0xffffffff, 0x0, 0x2, 0x8, 0xffffffff, 0x4, 0x10001, 0x0, 0x0, 0x2, 0x7, 0xffffff7f, 0x80000000, 0xfffff545, 0x4, 0xfffffffd, 0x10000, 0x94, 0x2, 0x9, 0x0, 0x1, 0x0, 0x5ad3, 0xff, 0x80, 0x1f, 0x9593, 0xfffffff7, 0xffffffff, 0x27000000, 0x1, 0x2, 0x1000, 0x7fff, 0x7, 0x6, 0x4, 0x10000, 0x0, 0x40, 0x8, 0xffffffff, 0x3, 0x1, 0x4, 0xedc, 0x6, 0x8, 0x2, 0x5cf, 0x80000000, 0xbcf, 0xfffffff9, 0x3, 0x4, 0x5d2, 0x3, 0x57, 0x2, 0x4, 0xffffffff, 0x800, 0xa7ea, 0x0, 0x1000, 0x54, 0x0, 0x7, 0x8000, 0x8, 0x1, 0x56c176aa, 0x6, 0x3ff, 0x1, 0x6, 0x9, 0x7fffffff, 0x1, 0x101, 0x4, 0x1, 0x400, 0x8000, 0xa54, 0x5, 0xffffff00, 0x1, 0x78c9, 0x4, 0x9, 0x7, 0x7, 0xf01a, 0x786, 0x8, 0x401, 0x3, 0x4, 0x4, 0x4, 0x8, 0xffffffff, 0x1, 0x1, 0x4f711b54, 0x8001, 0x1ff, 0x10001, 0x9, 0x3b84, 0x7, 0x8, 0x4, 0x1ff, 0x1, 0x5, 0x8, 0x40, 0x8, 0x1]}, @TCA_POLICE_RESULT={0x8, 0x5, 0x1c1c0d62}, @TCA_POLICE_RATE={0x404, 0x2, [0x4, 0x7, 0xffff, 0x3f, 0x9, 0x8000, 0x2883, 0x0, 0x6, 0xffffffff, 0x7, 0x4ab, 0x40, 0x2, 0x400, 0xffffffff, 0x0, 0x20200, 0xdd58, 0x8, 0x0, 0xfffffffb, 0x7, 0x0, 0x2e, 0x401, 0x26e, 0x401, 0x7, 0x7, 0x4, 0xffffffff, 0x8, 0x7, 0xffff, 0x8, 0x7f, 0x7f, 0xffffff00, 0xffffffff, 0x1f, 0x2, 0x7ff, 0x1a9, 0xe8, 0x2, 0x3, 0x9, 0x3c, 0x9, 0xffff3385, 0x1, 0x1, 0x5, 0x5, 0x6c7, 0x7, 0x3d8, 0x1, 0x8, 0x9, 0x2, 0x8, 0x9, 0x7, 0x8, 0xd9, 0x7, 0x100, 0x5, 0x101, 0x400, 0x8000, 0x1f, 0x3, 0xfffffeff, 0xfbc4, 0x400, 0x3f, 0x1, 0xfffffc01, 0x8, 0x5, 0x2, 0xff, 0x9e, 0x50, 0x3ff, 0x7, 0x574, 0x8, 0x40, 0x7fffffff, 0x100, 0x5b, 0x100, 0x1, 0x6, 0xbb6, 0x0, 0x2, 0x5, 0x3, 0x20, 0xffffffd0, 0x4, 0x0, 0x8, 0x7, 0x6, 0xfffff801, 0x5, 0x9, 0xd68, 0x1, 0x31d, 0x9, 0x7fff, 0x81, 0x5, 0x9, 0x0, 0x8, 0xfdf, 0x5, 0x5ad, 0x8, 0x8, 0x1, 0x5af, 0xa805, 0x3c, 0x7c4903d0, 0xc4, 0x7fffffff, 0x0, 0xfffffc6a, 0xbcb, 0x7ff, 0xf, 0x1f0, 0x7, 0xeae5, 0xffff, 0x2, 0xffffffff, 0x8, 0x6, 0x100, 0x4, 0x40, 0x8, 0x7fffffff, 0x3, 0x1, 0x3ff, 0x5, 0x80, 0xdb, 0x3, 0x1, 0x0, 0x8001, 0x1, 0x3, 0x1000, 0x7fffffff, 0x4, 0x8, 0x62d4cbd8, 0x3f, 0x4, 0x8001, 0x0, 0x9, 0x7, 0x3f, 0x138, 0x0, 0x32, 0x6, 0x1, 0xa51, 0x5, 0x7, 0x3, 0x3f, 0x1000, 0x4a15, 0x6, 0x6, 0x10000, 0x8, 0x5, 0xc1, 0x0, 0x8, 0x7, 0x2cbe, 0x3, 0x80000000, 0x2, 0x9, 0x3, 0x7, 0x4, 0x6b, 0x8, 0xb05, 0x5, 0x4c4b, 0x7, 0x8, 0x6, 0x6, 0xffffaf2d, 0x800, 0x8, 0x0, 0x9, 0x9, 0x3, 0x8, 0x200, 0x9, 0x5, 0x4fe9a69d, 0x4, 0x20, 0x6, 0x1, 0x0, 0x6, 0x8, 0x3, 0x6, 0x0, 0xffffffff, 0x8, 0x0, 0x9, 0xc0, 0x8, 0x6, 0x7, 0x1, 0x6, 0x1, 0x4, 0x7, 0x0, 0x80000001, 0x4, 0x2, 0x7fffffff, 0x1]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x101, 0x7, 0x17b09bed, 0x0, 0x0, {0x0, 0x2, 0x3, 0x4, 0x1, 0x7}, {0xac, 0x0, 0x5, 0xfffe, 0x8, 0x2}, 0x1, 0x8001, 0x4}}]]}, {0xe6, 0x6, "6255ef301cb0b30cb015e32253cf0be5b7488637a9124e068ac563e5fa2a1b4eda8c13f0c021c2873317f48e7e12a789495a601f20a6e90f3ce4a805fe6ef69c503fb5a37bf372827e6b2799a5f7e47df3c0c5e1c006b62f11231306afe9dd8fb517e31cc5a7e6f61c96348a6846bac93af18cfb5a807ec16627f67cf8fe12fa00d821f2b71debe318c0d40dc87f5c95a8c59c32cd04b9843f67400cd1374938701c2b3d9d03b69733e5ae38fa1cd5518e7738b2b32c55f6eab54d7cd55350ce79acafbba1b26056ac4749a8b4d2a43ba829e04406f21daabb891336c9322ea3f491"}, {0xc, 0x7, {0x1}}, {0xc}}}, @m_pedit={0x2efc, 0x16, 0x0, 0x0, {{0xa}, {0x2df4, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x3d, 0x5, 0x4, 0x3f, 0xfff}, 0x7f, 0x4, [{0x6, 0x5, 0x7ff, 0x1, 0x1, 0x3}, {0x1bc, 0x1f, 0x0, 0x2, 0x800000, 0x2}, {0x9, 0x81, 0x8, 0x8, 0x3f, 0xfffffa5b}]}, [{0x6, 0x3f, 0x5, 0x7, 0x7ff}, {0x400, 0x3, 0x400, 0xde8a, 0x2, 0x7fffffff}, {0x5, 0x1, 0x5, 0x0, 0x7ff, 0x3}, {0x3, 0x80000001, 0x10000, 0x4, 0xfffff000, 0x6}, {0x4, 0x2d, 0x20, 0x9, 0x8001, 0xffffff01}, {0xc0e1, 0x3, 0x19, 0x7, 0x6, 0xffffff01}, {0x5, 0x4, 0x0, 0x9, 0x1ff, 0x1b}, {0x2, 0x4, 0x3, 0x5, 0x100, 0xec0}, {0x8000, 0x3, 0xedd, 0xfffffffa, 0xfffeffff, 0x7f}, {0x8e27, 0x6, 0x2, 0x7f2, 0xb8, 0xead}, {0x6, 0x800, 0x1, 0xffff, 0x10000, 0x400}, {0x4221, 0xd7, 0x8001, 0x3f, 0xdc17, 0x800}, {0x69a8, 0xffff8001, 0x7fff, 0x6c, 0x3, 0x3}, {0x9, 0x5, 0x0, 0x2, 0x1, 0x4}, {0x2d09, 0x400, 0x1, 0x8, 0x6, 0x2}, {0x6, 0x2, 0x80000001, 0x4, 0xb3e}, {0x6, 0x1, 0x52d, 0x6, 0x8, 0x80000001}, {0x3ff, 0x4, 0x1, 0x10001, 0xae, 0x1ff}, {0x8, 0x200, 0x0, 0x1, 0xffffffff, 0x4}, {0x80, 0x101000, 0x5, 0x4f, 0x7, 0x3ff}, {0x6cf8522f, 0x7, 0x126, 0x8, 0x9f0, 0x70}, {0x4, 0x10000, 0x7, 0x2, 0x2, 0x3}, {0x5, 0x271, 0x80, 0xfffffffd, 0x3f}, {0x6, 0x1, 0x80, 0x7, 0x100, 0x3f}, {0x0, 0x7, 0x3f, 0x3, 0x4, 0x1}, {0x0, 0x9d7e, 0x4, 0xfffffff9, 0xecb37157}, {0x9, 0x3, 0x1, 0x9, 0x80000000, 0x1ff}, {0x3, 0x2, 0x8, 0x7, 0x6, 0x80}, {0x800, 0x6, 0x7fffffff, 0x5, 0x1, 0x7bf}, {0xd348, 0x0, 0x9, 0x1, 0x1, 0x4a71}, {0xd0, 0x5, 0x7f, 0x2, 0x0, 0x1}, {0x0, 0x9, 0x7, 0x9, 0x75e8, 0x7fffffff}, {0x974, 0x400, 0x2000, 0x1f, 0x9, 0x7}, {0x5, 0x61e0, 0x2, 0x2, 0x0, 0x9}, {0x2, 0x8, 0xffffffc1, 0x1ff, 0x8, 0x9}, {0x200, 0x1, 0x3ff, 0x1f, 0x20, 0x1ff}, {0x800, 0x7f, 0x10000, 0x8, 0x0, 0x8000}, {0x7ae9, 0x5, 0x10001, 0x179bef2d, 0x1f, 0x9}, {0x812, 0x5, 0x0, 0x0, 0x953, 0x7ff}, {0x400, 0x0, 0x9, 0x3ff, 0x3}, {0x8, 0x7, 0x4, 0x81, 0x9, 0x1}, {0x8000, 0xfffffc01, 0x5, 0x7d, 0x10000, 0x5}, {0x0, 0x46c838f, 0x2, 0x2, 0x3, 0x5}, {0x6, 0xfcd, 0x1, 0x8, 0x7}, {0x33e, 0xa3, 0x8ed, 0x9d, 0x800, 0x5}, {0x3, 0x67d5, 0x5, 0x8, 0x9, 0x4800}, {0x3, 0x80000000, 0x81, 0x101, 0x7f, 0x7ff}, {0x0, 0x0, 0xfffff594, 0x2, 0xffffd6b7, 0x6}, {0x8000, 0x3, 0x800, 0x3f, 0x7, 0x1}, {0x0, 0x5, 0xa5, 0x1, 0x2, 0x6}, {0x100, 0x9, 0x1, 0x4, 0x25f9, 0x3}, {0x0, 0x6, 0x4, 0xba, 0x10000}, {0xfffffff9, 0x100, 0xfffffffd, 0x6, 0x1, 0x4}, {0x10000, 0x3, 0x1000, 0x231f, 0x8, 0x40}, {0x40, 0x8001, 0x5, 0xfffffd39, 0x80000001}, {0x0, 0x9, 0x2, 0x7, 0x5, 0xffff}, {0x7, 0x3ff, 0x10000, 0x9, 0x8, 0xb1}, {0x7, 0x4, 0x7, 0xf, 0x3f0, 0x3}, {0xb3e, 0x2, 0xc05e, 0x6, 0xe, 0x7}, {0x1, 0xfff, 0x2, 0x5, 0xba, 0x2}, {0x2e3b, 0x101, 0x7, 0x2, 0x90fa, 0xc1}, {0x8, 0xffffffff, 0x4, 0x9, 0x40, 0x9}, {0x0, 0x7fffffff, 0x0, 0x100, 0x20, 0xffff}, {0x6, 0x9, 0x6, 0x40, 0x100, 0x8}, {0x1, 0x6, 0x7, 0x0, 0x528, 0x9}, {0x1, 0x4, 0x7, 0x8, 0x8, 0x4}, {0xda, 0x1, 0x20f8, 0x20000, 0x1, 0x6ed7994e}, {0x9, 0x21e, 0x2, 0x6, 0x0, 0x80}, {0xfff, 0x3, 0x7, 0x6, 0x4, 0x88d5}, {0x101, 0x10000, 0x8000, 0x9, 0x0, 0x1f}, {0x5, 0xcf, 0x40, 0x9350, 0x5, 0x9}, {0x100, 0x8, 0x10000, 0x8, 0x2, 0x5}, {0x596e, 0x7, 0xf608, 0x6, 0x3582, 0x3}, {0x40, 0x4, 0x20, 0x10001, 0x3, 0x494d}, {0x6, 0xfffffc01, 0x590f, 0x7fffffff, 0x20, 0xf4da}, {0xfffffff9, 0x4, 0x4f, 0x800, 0x80000000, 0x7fffffff}, {0x3, 0x20, 0x0, 0x1, 0x10001, 0x1ff}, {0x6, 0x5412, 0x4, 0x2, 0x9, 0x6}, {0x7fff, 0x6, 0x0, 0x0, 0x7, 0x5}, {0x6, 0x6, 0xffff8f36, 0x6, 0x8001, 0xd6e}, {0xe7, 0xfffffff8, 0x7f, 0xffff0000, 0xff, 0x9}, {0x3b2, 0x101, 0x9, 0x9, 0x800, 0x9f2}, {0x56f, 0x0, 0xfffffff9, 0x1f, 0x3, 0x8}, {0x48, 0xa7, 0x9, 0x4, 0x9, 0x799dee30}, {0x49ef, 0x3, 0x2, 0x9, 0x7, 0x555}, {0x6, 0xffffffff, 0x1c0, 0xffff0000, 0x8001, 0x9}, {0x6, 0x101, 0x8e99, 0xff, 0x7, 0xffff8283}, {0x400, 0x6, 0x200, 0x2, 0x1, 0x7}, {0xeebe, 0xb54, 0xfffffeff, 0x7fff, 0x9, 0xffff}, {0x200, 0x0, 0x5, 0x7ff, 0x2, 0x80}, {0x7ff, 0x40, 0xfffffe00, 0x1, 0x0, 0x1}, {0x5, 0x9, 0x3, 0x100, 0x7f, 0x79e6}, {0x8, 0x2, 0x5, 0x1, 0x2}, {0x7295e353, 0x20, 0x4, 0x7, 0x1, 0x5}, {0xcfa, 0x0, 0x200, 0x4, 0x59e, 0x8}, {0x101, 0x3f, 0x0, 0x10000}, {0x9, 0x0, 0x0, 0xffff, 0x7fffffff, 0x12}, {0x5, 0x7, 0x35, 0x2, 0x2, 0xffffffff}, {0x3, 0x7, 0x793f8, 0x4, 0x9cc, 0x4}, {0x3bc, 0x8001, 0x40, 0x3, 0x9, 0x543}, {0xffffffff, 0x4, 0x9, 0x4, 0x7, 0xffff}, {0x8, 0x0, 0x1, 0x3, 0xbeb, 0xffffffff}, {0x0, 0xfffffffb, 0x6, 0x80, 0x9, 0x5}, {0x3, 0x80, 0x1, 0x5, 0x80000001, 0x5}, {0x3, 0x401, 0x0, 0x3, 0x1}, {0x0, 0x150, 0x8, 0x2, 0x1ff, 0x9}, {0x8, 0x7, 0x6, 0x0, 0xfffffffa, 0x2}, {0x40, 0x10000, 0x12, 0x783, 0x1, 0x3}, {0x80000000, 0x3, 0x7f, 0x0, 0x7, 0x800000}, {0x2d0d, 0xecd7, 0x8001, 0x9, 0x800}, {0xe38, 0x7f, 0x39, 0x8001, 0x5, 0x1}, {0x2, 0x5, 0x2, 0x3, 0x80000001, 0x1}, {0xf6, 0x5131, 0x713a, 0x84, 0x5, 0x3}, {0x1, 0x400, 0x7fffffff, 0xa4, 0x1, 0x2}, {0x1655, 0xffffffff, 0x7, 0x0, 0x3, 0x79}, {0x6, 0x7, 0xffffff16, 0xc98, 0x0, 0x8000}, {0x0, 0x3, 0x7, 0x1, 0x9, 0x2}, {0x9, 0x7f, 0x40, 0x80000001, 0x7fffffff, 0x8}, {0xa517, 0x3, 0x0, 0x4, 0xfffffff7, 0xdc7}, {0x8001, 0x2, 0x6, 0x2, 0x1}, {0x1, 0x8000, 0x1, 0x70000000, 0xffff, 0x10001}, {0xffff, 0x1eb, 0x4, 0x3f, 0x3ff, 0x9e2}, {0xff, 0x61, 0x3ff, 0x6, 0x0, 0x7}, {0x8, 0x40, 0x2, 0x20, 0x1, 0x6}, {0x9ab, 0xffff9271, 0x7c5, 0x678, 0x6, 0x3}, {0xc17, 0x10001, 0xfff, 0x743, 0xfff, 0x4}, {0x4, 0x6, 0x100, 0x80000001, 0x7, 0x5}, {0x3c, 0x9, 0x101, 0x9, 0x32, 0x4}], [{0x2}, {0x5}, {}, {0x1, 0x1}, {0x4, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x2}, {}, {}, {0x2}, {0x1}, {0x3}, {0x2}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x3}, {0x2}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x82d6dd2b87bcb02a}, {0x4, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x5}, {0x1}, {0x4}, {}, {}, {0xe}, {0x3, 0x1}, {0x3, 0x1}, {0x5}, {0x5, 0x1}, {0x1}, {}, {0x4}, {0x3}, {0x0, 0x1}, {0x3}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x5}, {}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x0, 0x1}, {0x2, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x1, 0x1}, {0x1}, {0x4}, {0x2, 0x1}, {0x2}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x4}, {0x1, 0x1}, {0x5, 0x1}, {}, {0x1, 0x1}, {0x5, 0x27015a9f759b2834}, {0x71cd467b9bcb750d}, {0x4, 0x1}, {0x4}, {0x1, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x5}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0x2, 0x1}, {0x5, 0x12d925fd78dd4145}, {0x4, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x3}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x0, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x5}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x0, 0x1}, {0x6, 0x1}, {0x4}, {0x0, 0x1}, {0x2, 0x1}, {0x3}, {0x4, 0x3}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}]}}, @TCA_PEDIT_KEYS_EX={0x3c, 0x5, 0x0, 0x1, [{0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x4}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}]}, @TCA_PEDIT_KEYS_EX={0x13c, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x4c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x24, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_CMD={0x6}]}, {0x3c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}]}, {0xc, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6}]}, {0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}]}, @TCA_PEDIT_KEYS_EX={0x58, 0x5, 0x0, 0x1, [{0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x3}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}, @TCA_PEDIT_KEY_EX_CMD={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}]}, @TCA_PEDIT_PARMS_EX={0xec8, 0x4, {{{0xfff, 0x9784, 0x8, 0x200, 0x7}, 0x0, 0x3f, [{0xffffffff, 0xffffff2d, 0x3, 0x6, 0x5, 0x1f}, {0x81, 0x6, 0x10001, 0x45, 0x3, 0x4}, {0x2, 0x100, 0x1f, 0x1, 0xfa1b, 0x4f5}, {0x400, 0x3, 0x1000, 0x3, 0x910, 0x9}, {0x3, 0x1, 0x101, 0x1, 0x3, 0x9}, {0xfffffff9, 0x3, 0x10001, 0x0, 0xfffffff9, 0x400}, {0x0, 0xa480, 0xffffff88, 0x9, 0x8, 0x6}]}, [{0x0, 0x140b5639, 0xab, 0xe5, 0x10000}, {0x1, 0x1b8e, 0x6, 0x1, 0x800, 0x6}, {0x8, 0x9, 0x5, 0x4, 0x474, 0xfffffffd}, {0x6377, 0x1, 0x2, 0x973, 0xdce7, 0x6}, {0x3f, 0x3f, 0x2, 0x90, 0x3, 0x8d0e}, {0x7fffffff, 0x4, 0x9, 0x7f, 0x10000, 0xfff}, {0xffffffc1, 0x6, 0x2, 0x7, 0xbe7, 0x4}, {0x9, 0x9, 0x9, 0x7ff, 0x2, 0x8001}, {0x86ec, 0x9, 0x3ff, 0x7, 0x7, 0xffffff18}, {0x9e2a, 0x7, 0x5, 0x0, 0x1, 0x10000}, {0x5, 0x7f, 0x8000, 0x20, 0x101, 0x401}, {0xdd, 0x3, 0x22, 0x7ff, 0x0, 0x80000000}, {0xa6, 0x2406, 0x10001, 0x5, 0x1, 0x4}, {0x0, 0xf4ce, 0x0, 0xfffffffa, 0x7, 0x101}, {0x7, 0x10001, 0x200, 0x8, 0x8, 0x4}, {0x2, 0xb03a, 0x9, 0xc01, 0x5, 0x20}, {0x3, 0x1, 0x9, 0x3, 0x8}, {0x8001, 0x7, 0x9, 0x4, 0x1ff, 0x80000000}, {0x117, 0xfffffd23, 0x5f1, 0x3, 0x1, 0x40}, {0xffffffff, 0x1ff, 0x7, 0x9, 0x1, 0x2}, {0x7f, 0xffff8001, 0x4, 0x300000, 0x8811, 0xd2}, {0x8000, 0x6, 0x3, 0x8, 0x7fffffff, 0x8}, {0x400, 0xfffffffb, 0x4, 0x3ff, 0x6, 0x1}, {0x5, 0x9, 0x3, 0x9, 0x80000000, 0xff}, {0x100, 0x311, 0x400, 0x3ff, 0x4, 0x1}, {0x1f, 0x0, 0x2c59, 0x0, 0x0, 0xfffffffb}, {0x2, 0x1, 0x9e9, 0x486, 0x770, 0x3}, {0x5, 0x543f, 0x2, 0x20, 0x0, 0x8}, {0xffff39cd, 0x101, 0x4, 0x7fffffff, 0x8}, {0x9, 0x3d5, 0xe89, 0xd40d, 0x7, 0xddf2}, {0x2, 0x2b3e9718, 0x9, 0x1, 0x8, 0x294}, {0x7, 0x5, 0x512, 0x20, 0x0, 0x6}, {0x0, 0x14, 0x3ff, 0xfffffffa, 0x0, 0x6}, {0xfffffff8, 0x401, 0x7ff, 0x8, 0x101, 0x4}, {0x8001, 0xfffffff8, 0xff, 0x88, 0x0, 0x63}, {0x8, 0x40, 0x0, 0x0, 0x6, 0x1}, {0x1, 0x4, 0x0, 0x7, 0x7, 0x8000}, {0x2, 0x1000, 0x800, 0x3f, 0x800, 0x6cfc}, {0x5, 0x98, 0x1, 0xfffffff7, 0x9, 0x81}, {0x5, 0x1, 0x2, 0x8, 0x8, 0x6}, {0x6, 0x80, 0x9, 0x7ff, 0x1, 0x6}, {0x3, 0x8, 0xa3, 0x8, 0x9, 0x7656}, {0x4, 0x6, 0x0, 0x3, 0xec800000, 0x1}, {0x3ff, 0xffffffff, 0xfffeffff, 0x8, 0x3, 0x1}, {0x9, 0x4, 0x8, 0x5, 0x0, 0x7f}, {0xfff, 0xffffffff, 0x0, 0x7, 0x7, 0x10000}, {0x2641, 0x8, 0x2, 0x55d0, 0x3f, 0xe968}, {0x5, 0xc, 0x8, 0x10001, 0x5, 0x6}, {0x7, 0x6, 0x3441, 0x2, 0x6, 0x40000000}, {0x1, 0x1ca8a3dc, 0x5, 0x5, 0x3, 0x7fffffff}, {0x2dcdfd56, 0x3, 0x5c3e914, 0x3, 0x38, 0x9}, {0xfffffff7, 0x3d1, 0x6f, 0xce49, 0x4, 0x6}, {0x3f, 0x7, 0x8, 0x7fffffff, 0x400000, 0x3}, {0x8, 0x8000, 0x4, 0x3f, 0x2, 0x9}, {0x8d, 0x1, 0x1000, 0x0, 0x12, 0x401}, {0x7f, 0xfff, 0x100, 0x8ba2, 0xcc4, 0x9}, {0x7, 0x3f, 0x1ff, 0x8, 0xff, 0x7ff}, {0x59b, 0x9, 0x1, 0x8, 0xdf400000, 0x80}, {0x2, 0x5, 0x2, 0x0, 0x0, 0xff}, {0x7, 0x12, 0x9, 0x2, 0x5d1, 0x5}, {0x4, 0x4, 0x6, 0x1, 0xffffffe1, 0x1}, {0xffffffff, 0x1, 0x0, 0x4, 0x15, 0x6}, {0x2, 0xff, 0x3, 0xb5, 0x0, 0x3}, {0x6, 0x4, 0x800, 0x10000, 0x8, 0x80000001}, {0x3, 0x7, 0x1, 0x7ff, 0x1a0}, {0xe0000000, 0x5, 0x1, 0x6, 0x400, 0x2}, {0x2, 0x4, 0x5, 0x0, 0xb1e, 0x978}, {0xffff, 0x9, 0xffffffff, 0x4, 0x408, 0x80000001}, {0xfff, 0x5, 0x100, 0x6, 0x5, 0x294819ad}, {0x7, 0x1d2, 0x8, 0x8, 0x20d, 0x858}, {0xffff, 0x80000000, 0x80000000, 0x0, 0x5, 0x401}, {0x4, 0x80, 0xe49, 0x9, 0x1, 0x40}, {0x1, 0x96, 0x7, 0x7ff, 0x6a, 0x5}, {0x4, 0x318, 0xe6c7, 0x1000, 0x40, 0x7}, {0x9cb, 0x397e, 0x3, 0x8, 0x5, 0x4}, {0x9, 0x1ff, 0x1f, 0x5, 0x67d5, 0x81}, {0x8, 0x2, 0x1, 0x20, 0x9, 0x6}, {0x800, 0x1, 0x8, 0x2, 0x4, 0x9b30}, {0x8, 0xc01, 0x7, 0x5, 0x9, 0xb43b}, {0x0, 0x7, 0x101, 0x5, 0x69e87e1e, 0x3f}, {0x7bd8, 0x0, 0x8, 0x101, 0x5, 0xfff}, {0x68, 0x6, 0x8, 0x10001, 0x4e2bd31e, 0x9}, {0x0, 0x9, 0x2, 0x7, 0x9, 0x5}, {0x1, 0x40, 0x1, 0x72, 0x7}, {0x5, 0x313, 0xff, 0x9, 0x4478c93e, 0x4}, {0x833, 0x1f, 0x7, 0x3, 0x4, 0x3f}, {0x3, 0xd3, 0x40, 0x1, 0x4, 0x4}, {0x0, 0x200000, 0xff, 0x0, 0x80000000, 0x81}, {0x7fffffff, 0x2, 0x9, 0x5, 0x7, 0x2}, {0x40, 0xd573, 0x6, 0x48, 0x0, 0x3}, {0x8, 0x6, 0x10, 0xa4e, 0x552a, 0x2}, {0x7fff, 0x9bc, 0x1, 0x1, 0x1fe, 0xffffffff}, {0x7, 0xffffffc0, 0xee8f, 0x5, 0x100, 0x44}, {0x8, 0xff, 0x7fff, 0x81, 0xffffffe1, 0xffff}, {0xfff, 0xfff, 0x2, 0x754, 0x5}, {0x9, 0x1, 0x7fff, 0x4, 0x20, 0xb2}, {0x7, 0x9, 0x3ff, 0x10001, 0x7ff, 0x63}, {0x20, 0x4, 0x8, 0x3, 0x200, 0x800}, {0x1f, 0x9, 0xffff, 0xffffff00, 0xfffffffb, 0x7}, {0x7fffffff, 0x9, 0x20, 0x9, 0x0, 0xf0000000}, {0x7, 0x2, 0x8, 0x8e7, 0x3}, {0x8, 0xfff, 0xb6, 0x6, 0x7, 0x2}, {0x3, 0x20, 0x4, 0xffff8000, 0x400, 0x3a}, {0xa731, 0x7a, 0x1f, 0x3, 0x2}, {0x10000, 0xc21, 0x3f, 0x9, 0x6, 0x1}, {0x0, 0x4, 0x1089, 0x4, 0x81, 0x8000}, {0x6, 0x2, 0x8c, 0x3, 0x1, 0xcac6}, {0x8, 0x2, 0x1, 0x3, 0x2bca, 0x8001}, {0xfffffffb, 0xf1b, 0x1f6, 0x81, 0x5, 0x3}, {0x1, 0x8, 0x1, 0x3, 0x5, 0x100}, {0x40, 0x0, 0x9, 0x1, 0x7, 0x4}, {0x3, 0x0, 0x1, 0x0, 0x5, 0x1}, {0x5, 0x2, 0x2, 0x90000, 0x6, 0x4}, {0x9, 0x4, 0x1, 0x7, 0xc65}, {0xdc, 0x72, 0x5, 0x100, 0x80000000, 0x6}, {0x7f, 0x7, 0xfff, 0x7fffffff, 0x9, 0x4}, {0x5a435d1f, 0x3d0, 0x9, 0x1ff, 0xff, 0x4}, {0x9, 0x6d25, 0x20000, 0x7, 0x1, 0x1}, {0x1f, 0xffffffff, 0x18, 0x6, 0x100, 0x3637}, {0x2ea8cea0, 0x9, 0x0, 0x7, 0x101, 0x7f}, {0x6, 0x7, 0x9, 0x6, 0x80000001, 0x100}, {0x13, 0xf6d, 0x4, 0x2, 0x2, 0x7fff}, {0xffffffff, 0xfffffffc, 0x6, 0x2, 0x100, 0x4}, {0x3f, 0x6, 0x4fd, 0x6, 0x57, 0xfff}, {0x800, 0x2, 0x1, 0x41e, 0x9, 0x7f}, {0x9f, 0x4, 0x7fff, 0x109, 0x1c, 0x4c0}, {0x200, 0x3947a594, 0x7ff, 0x5b, 0x81, 0x1}, {0x1000000, 0x1, 0x0, 0x3, 0x3, 0x7fff}], [{0x5}, {0x4}, {0x5, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x2}, {0x2}, {0x5}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1}, {0x5}, {}, {0x5, 0x1}, {0x3, 0x1}, {0x4}, {0x2}, {0x2, 0x1}, {0x2}, {0x4}, {0x0, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {0x1}, {0x2, 0x1}, {0x4, 0x1}, {0x5}, {0x1, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x5}, {}, {}, {0x0, 0x1}, {0x2, 0x1}, {0x5}, {0x3}, {0x1}, {0x1}, {0x4, 0x1}, {0xdac51197b380c490, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x2}, {0x3}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x6, 0x1}, {0x5, 0x1}, {}, {0x3, 0x1}, {0x1, 0x1}, {0x4}, {0x4}, {0x5}, {}, {0x6, 0x1}, {0x4}, {0x1}, {0x1, 0x1}, {0x4, 0x1}, {0x5}, {0x2}, {0x4, 0x1}, {0x5}, {0x3, 0x1}, {0x4}, {0x5, 0x1}, {0x2}, {0x2, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x5}, {}, {0x0, 0x1}, {0x2}, {}, {}, {0x2, 0x1}, {0x3}, {0x2}, {0x3, 0x1}, {0x4}, {0x4, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {}, {0x2}, {0x5, 0x1}, {0x0, 0x1}, {0x1}, {0x5}, {0x3, 0x1}, {0x2, 0x1}, {0x3, 0x1}, {0x1}, {0x1}, {0x1}, {}, {0x1}, {0x2, 0x1}, {0x6}, {0x3}, {}, {0x4, 0x1}, {0x4}, {0x1}, {}, {0x4}, {0x0, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {}, {}, {0x1}]}}, @TCA_PEDIT_KEYS_EX={0x88, 0x5, 0x0, 0x1, [{0x14, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x4}]}, {0x54, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x2}, @TCA_PEDIT_KEY_EX_CMD={0x6, 0x2, 0x1}]}, {0x1c, 0x6, 0x0, 0x1, [@TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x1}, @TCA_PEDIT_KEY_EX_HTYPE={0x6}, @TCA_PEDIT_KEY_EX_HTYPE={0x6, 0x1, 0x5}]}]}, @TCA_PEDIT_PARMS_EX={0xe68, 0x4, {{{0x4, 0x6, 0x6, 0xe6b6, 0x3ff}, 0x5, 0x20, [{0x56, 0x3, 0x8, 0xfffffff7, 0x40, 0x400}, {0x80, 0x4, 0x9, 0x0, 0x8e6, 0xe96}, {0x2539138b, 0x0, 0xaa, 0x3ff, 0x3, 0x80000001}]}, [{0x2, 0x6, 0x7ff, 0x1ff, 0x5, 0x100}, {0x4, 0x9, 0x5f, 0x7, 0xffffff81, 0x9}, {0x101, 0x81, 0x427, 0x8, 0x8, 0x6}, {0x7, 0x0, 0x20, 0x1ff, 0xffffff81, 0x6}, {0x80000001, 0x6, 0x0, 0x8000, 0x0, 0x1}, {0x100, 0x5, 0x7f, 0x0, 0x8001, 0x4}, {0x8, 0xe541, 0x286, 0x0, 0xd24, 0x1}, {0x7, 0x7, 0x5, 0x6e0, 0x9, 0x8}, {0x4, 0x6, 0xca1, 0xa000000, 0x7}, {0x3f, 0x2, 0x7ff, 0xde, 0x4, 0x6}, {0x0, 0x1, 0x3, 0x2, 0x0, 0x8}, {0x6, 0x7, 0x8, 0x8a22, 0x0, 0x10000}, {0x0, 0x2, 0x0, 0x9, 0x2, 0x4}, {0x7fff, 0x0, 0x26, 0x9, 0x80000000, 0x1}, {0x20, 0xfffffffc, 0x3e18, 0x401, 0x8, 0x1f}, {0x5, 0x5, 0x5, 0x401, 0x2, 0x6}, {0x7f, 0x0, 0x7, 0x6, 0x2, 0xffffff80}, {0x3f, 0x7ff, 0x8, 0xfff, 0x8, 0x8000}, {0x4, 0x5, 0x800, 0x4, 0x5, 0x2}, {0x7edb, 0x9, 0x4, 0xdd, 0x9, 0x8}, {0x3, 0x101, 0x20, 0x6, 0x7fffffff, 0x533}, {0x8000, 0x5, 0x7fffffff, 0x1e, 0x3, 0x5246}, {0x4, 0x100, 0x3, 0x4, 0x0, 0x1}, {0xf9, 0x4, 0x6, 0x132bc344, 0x1, 0x80}, {0x8, 0x1, 0x400, 0xc0000000, 0x3, 0x1}, {0x7fffffff, 0x4, 0x4, 0x28b6, 0x101, 0x9}, {0x76b6, 0x400, 0x9, 0x9, 0xfffffff8, 0x12}, {0x7, 0x4, 0x1, 0x8, 0x5, 0xfffffffa}, {0x0, 0xd00, 0x401, 0x0, 0x9, 0x40}, {0x1, 0xb4ab, 0x0, 0x0, 0x3, 0x31}, {0x8, 0x1, 0x4, 0x7f, 0x0, 0x5}, {0x7, 0x1f, 0x6006, 0x5, 0x0, 0x3}, {0x1f, 0x80000001, 0x9, 0x4, 0x10000, 0x4}, {0x7fff, 0x2, 0x3aec, 0xd0}, {0x1, 0x7, 0x6, 0x7, 0x3, 0x4}, {0x4, 0x1, 0x20, 0x7fffffff, 0x7, 0xffffffff}, {0x4, 0x4, 0x7, 0x0, 0xfffffff8, 0x1ff}, {0x4, 0x8, 0x22, 0x7fff, 0x3ff, 0x4a}, {0x1, 0x2500000, 0x1, 0x7, 0x400, 0x3}, {0x1, 0x5, 0x35d, 0x98a8, 0x8001, 0x5}, {0xffffffc1, 0x7f, 0xfffff6c0, 0x0, 0x3, 0xfffffffb}, {0x10001, 0x9, 0x3f, 0x6, 0x9}, {0x7, 0x101, 0xffff, 0x81, 0x8, 0x631}, {0x5, 0x9, 0x5, 0x5, 0x3, 0x3}, {0x11ff, 0x8, 0x7ff, 0x1f, 0x6, 0x1ff}, {0x6, 0xf7, 0xffff7fff, 0x1, 0x200}, {0x80000001, 0x16, 0x0, 0x1, 0x475, 0xab8}, {0x3, 0x22, 0x9, 0x81, 0x776, 0x81}, {0x4, 0x80, 0x4, 0x4, 0x7f, 0x7}, {0x5, 0x8001, 0x0, 0x800, 0x9f}, {0x9b7e, 0xfffffff8, 0x3ff, 0xffff, 0x7, 0xff}, {0x5, 0x0, 0x3ff, 0x7ff, 0x7f, 0xb47b}, {0x84, 0x3, 0x3, 0xfffffff8, 0x8001, 0x101}, {0x1, 0x6, 0x4, 0x9, 0x5}, {0x8000, 0x1, 0x3c961e09, 0x7fffffff, 0x0, 0x4}, {0x4, 0x101, 0x5, 0x7f, 0xffffffe1, 0x7}, {0x8, 0x3, 0xff, 0x61, 0x2, 0x1ff}, {0x92a, 0x3, 0x6, 0x6, 0x6, 0x7}, {0x1, 0x80000000, 0x0, 0xffff, 0x4, 0x6}, {0x8, 0x0, 0x8, 0x5, 0x9, 0x4}, {0x8, 0xd7, 0x80000000, 0x10000, 0x3}, {0x8, 0x37e, 0x3, 0x4000000, 0x3, 0x5}, {0x80, 0xfffffe00, 0x8, 0xfffffffd, 0x400, 0xfffffffb}, {0x1, 0xdbb3, 0x9, 0xffff8001, 0x8, 0x7}, {0xff, 0x80000001, 0x40, 0x9, 0x8, 0x6c}, {0x10000, 0x20, 0xed, 0x6, 0x7, 0xa694}, {0xac62, 0x4, 0x72d5, 0xfffffffc, 0x80000000, 0x3}, {0x21e, 0xebed, 0x1, 0x2e0e, 0x8000, 0x1}, {0x4, 0xdc2b, 0x1f, 0x8, 0xb3d, 0x8b}, {0x6, 0x800, 0x3ff, 0x5, 0x6, 0x101}, {0x7, 0x6, 0x8, 0x80000001, 0x36e51c6c, 0x10000}, {0x3, 0x101, 0x0, 0x4, 0x2, 0x7}, {0xfffffffd, 0x81, 0x9, 0x401, 0x4, 0x80}, {0x7cd0, 0x80000001, 0x2, 0x0, 0xfffffffc, 0x1}, {0x6, 0x1, 0x6, 0x400, 0x8000, 0x3}, {0x0, 0x1, 0x108, 0xcff, 0x4, 0x6df5}, {0x9, 0x1, 0x1, 0x93da, 0xbffe, 0x400}, {0x800, 0x100, 0x5, 0xfffffff9, 0x3, 0xd9f}, {0x7, 0x0, 0x6, 0x10001, 0x4, 0x400}, {0xf1000000, 0x4, 0x40, 0x4, 0x40, 0x81}, {0xffffffff, 0x6, 0xff, 0x2, 0x10000, 0x8}, {0x329d, 0x3ff, 0x0, 0x8, 0x2, 0x3}, {0xffff, 0x5, 0x1ff, 0x40, 0x20, 0x6}, {0x8, 0x1, 0xffffffff, 0x8, 0x1ff, 0x9}, {0x6, 0x81, 0x7fff, 0x1, 0x7, 0x3}, {0x8, 0x80000, 0x7, 0x3, 0x15d, 0xfffff0f5}, {0xb1a00000, 0x400, 0x4, 0x3, 0x6, 0x1}, {0x85f, 0x4, 0x1, 0x6, 0xf0, 0x3}, {0x8000, 0x9, 0x425, 0x4, 0x2, 0x2}, {0x4, 0x2, 0x3f, 0x1, 0x5, 0x1ff}, {0x3, 0x0, 0x6, 0x1000, 0x8, 0x3}, {0x6d08, 0x800, 0x80000001, 0x85, 0x1181f72, 0x5}, {0xc0ba, 0x80000001, 0x7f, 0x90f8, 0x800, 0xffffffff}, {0xa6, 0x9, 0x4, 0x0, 0x9}, {0x7f, 0x411b, 0x40, 0x80000001, 0x80000000, 0x80}, {0xffff, 0x0, 0x3, 0x2, 0x400, 0x6}, {0x2, 0x401, 0x8, 0xffffffff, 0x6a, 0x100}, {0x2c5, 0x9, 0x5, 0x3, 0x4}, {0x7, 0x3, 0x33, 0x10001, 0x7ff, 0x8}, {0x6, 0x7, 0x3, 0x40, 0x6, 0x20}, {0x10, 0x7, 0x4, 0x6, 0x7d, 0x1}, {0x3, 0x6, 0x52e05502, 0x40, 0x0, 0x4}, {0xff, 0x7, 0x3, 0x400, 0x71f6c9e2, 0x40}, {0x7, 0x5, 0x6, 0x5, 0x2c, 0x80000001}, {0x1ff, 0x401, 0xf48d, 0x200, 0xa71, 0x3ff}, {0xfffffe00, 0x80, 0xb29b, 0xd5cc, 0x3, 0x1867}, {0x800, 0x6, 0x9, 0x568, 0x6f900000, 0x7}, {0x0, 0x2257, 0xbbb, 0xff, 0x6, 0xe8}, {0x5, 0x8, 0x10000, 0xda72, 0x5, 0x5}, {0x7, 0xffff, 0x9, 0x6, 0x9, 0x1}, {0xfffffffb, 0x1000, 0x9, 0x8, 0xffff, 0x9}, {0x7, 0xfff, 0x2, 0x5, 0x8, 0xffffffff}, {0x0, 0xc9d, 0x1f, 0xee, 0x1, 0x2}, {0x6, 0x8, 0x939, 0x20, 0x1, 0x10000}, {0x3ff, 0x6, 0x2, 0x4, 0x8000, 0x4942}, {0x1, 0x10000, 0x9, 0x3, 0x9f7, 0x8}, {0x887d, 0x5, 0x4, 0x20, 0x0, 0xfffffff7}, {0x400, 0x6, 0x7fff, 0x100, 0x1, 0x5}, {0x9, 0x4, 0x7ff, 0xfffffff7, 0x0, 0x81}, {0x800, 0x45, 0x7f0, 0x3, 0xb57, 0x8001}, {0x4, 0xfc85, 0x10000, 0x8, 0x7, 0xe6d6}, {0x7, 0x1ea60eb8, 0x9, 0x2, 0x7, 0x7}, {0x7fff, 0x8, 0x401, 0x1, 0x9, 0x80000000}, {0x7, 0x401, 0x2, 0x8000, 0xffff, 0x5}, {0xffffffff, 0xffffffc8, 0x0, 0x7, 0xa25, 0x9}, {0x1, 0x80, 0x1f, 0x0, 0x0, 0x1f97}, {0x0, 0x1, 0x9, 0x4, 0x6, 0x5}, {0x7, 0x8, 0x10000, 0x8000, 0x5}], [{}, {0x4, 0x1}, {0x1, 0x1}, {0x3}, {0x1, 0x1}, {0x2, 0x1}, {0x5}, {0x4, 0x1}, {0x4}, {0x4, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x4}, {0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x4, 0x1}, {0x3}, {0x3, 0x1}, {0x3, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x2, 0x1}, {0x1, 0x1}, {0xe, 0x1}, {0x5}, {0x3, 0x1}, {0x4, 0x1}, {0x1, 0x1}, {0x1}, {0x4}, {0x5}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x5}, {0x3}, {0x5, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {}, {0x5, 0x1}, {0x5}, {0x4}, {0x5, 0x1}, {0x3}, {}, {0x3}, {0x2}, {0x5}, {0x4}, {0x5}, {0x1}, {0x1, 0x1}, {}, {0x3}, {0x3}, {0x1, 0x1}, {0x2}, {0x5}, {0x5, 0x1}, {0x1}, {0x1}, {0x2, 0x1}, {0x5}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x792d834ea2c0054b, 0x1}, {0x5}, {0x1, 0x1}, {0x5}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x2}, {0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3, 0x1}, {0x3}, {0x4}, {0x3}, {0x2, 0x1}, {}, {0x2}, {0xa17db718b6aa37b6, 0x1}, {}, {0x2, 0x1}, {0x1}, {0x5, 0x1}, {0x3, 0x1}, {}, {0x5}, {0x3}, {0x4}, {0x3}, {0x1, 0x1}, {0x5, 0x1}, {0x4}, {}, {}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x5, 0x1}, {0x5, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3}, {0x2, 0x1}, {0x4, 0x1}, {0x0, 0x1}, {0x2}, {0x5, 0x1}], 0x1}}]}, {0xe0, 0x6, "1fdd54a7ee74fb3150e26edad5265270a14aebe9a3b7da7fbfce1b7f73f7f6c7cf99337768f09bdc3689248945dbff5e72df001c4bc80e8e3ebdf0b1f00eeeaa830e902143f77e702745724e474c94fe0afac5b2fc2cea10d4ac0757d30a9b5b42a405c60944e811cb36904dc69390874e8c10d3934422467f748afc021e16ffe4838cf143a6c5df6e3dd8b8415c54a3d2a7d5ff954541eb44eb8dc260c14e2d7d53f1454596d00b609c77bd717d8742a99e40be9462a946495abdaf67d08a7117fc08394e13fc56b35e2d27fbfbcf6e58baf3d75d8593e58dab88be"}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ctinfo={0x88, 0xd, 0x0, 0x0, {{0xb}, {0x34, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x4, 0x10000, 0x8, 0x3, 0x8}}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x2}, @TCA_CTINFO_PARMS_DSCP_MASK={0x8, 0x5, 0xff25}, @TCA_CTINFO_PARMS_DSCP_STATEMASK={0x8, 0x6, 0x10001}]}, {0x2a, 0x6, "683f1953253a60017aec84b03846faf2cecbaa17fc78009227686cb026f8803b49de37443130"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_police={0x104c, 0x6, 0x0, 0x0, {{0xb}, {0x20, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x8, 0x1}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffff}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x7fff}]]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_bpf={0xf0, 0x1f, 0x0, 0x0, {{0x8}, {0x3c, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_PARMS={0x18, 0x2, {0xffffffff, 0x2, 0x2, 0x8001, 0x10001}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0xb60f1bf, 0x2, 0x20000000, 0x1000, 0x5}}, @TCA_ACT_BPF_FD={0x8, 0x5, r0}]}, {0x8f, 0x6, "e0ddd76b9dee25f5a7cf77976d557669727046c27fc3701d4f571418827c06d5b95bf1e217e7a643ddaf756ab6871573c80b4b02312f330a0b26a6a8ff6ec8f05a01374dc1a28ba5a525ff36c4898ed1580e36b85b5e8f63de3959f233ae034a52541b917ca37f6b3c7e9f363457d73a891856e7e8732c8d8920880eea4a65a0d7839e7112542e1e3238de"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_mpls={0x1040, 0x1e, 0x0, 0x0, {{0x9}, {0x14, 0x2, 0x0, 0x1, [@TCA_MPLS_TC={0x5, 0x6, 0x4}, @TCA_MPLS_LABEL={0x8, 0x5, 0x1ed4d}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_vlan={0xb8, 0x7, 0x0, 0x0, {{0x9}, {0x44, 0x2, 0x0, 0x1, [@TCA_VLAN_PARMS={0x1c, 0x2, {{0xa4, 0x2, 0x0, 0x8, 0x34eb91b3}, 0x3}}, @TCA_VLAN_PUSH_VLAN_PRIORITY={0x5, 0x6, 0x4}, @TCA_VLAN_PARMS={0x1c, 0x2, {{0x7, 0xfffffbff, 0x0, 0x8, 0x7}, 0x3}}]}, {0x4a, 0x6, "b5d37eec7ff64af1734654880cbabc97763dfd31dc911d3e65a77ad43106d0c2a305ea87dbd3c3f65ce21fd2274b6edf7e543248b604dcb7c5f1d09305d8e5da35228fcdb218"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_FW_POLICE={0x420, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x200}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x10001}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7fff}, @TCA_POLICE_RATE={0x404, 0x2, [0x0, 0x81, 0xfffffffb, 0x5e9, 0x6, 0x80, 0x5, 0x2, 0x3, 0x737be2a8, 0x40, 0x81, 0x1f, 0x0, 0x480, 0xfffffffe, 0x2, 0x1, 0x7, 0x6, 0x5, 0x6, 0x1, 0x0, 0x8, 0x376f, 0x6, 0xd1, 0x7, 0x6, 0xffffff80, 0x7ff, 0x1, 0x400, 0x1ff, 0xffff, 0x533058a6, 0xfffffffe, 0x1af2, 0x80000000, 0x1000, 0x3ff, 0x6, 0x1, 0x250c, 0x3, 0x5, 0x3, 0x0, 0x9, 0x4, 0x7, 0x7, 0x8, 0x5, 0x9, 0xfffffeff, 0x9, 0xffffffff, 0x5, 0x3, 0x101, 0x6, 0x0, 0x9, 0x0, 0x9, 0xfffffff7, 0xf361, 0xfffff001, 0x6, 0xfffffffc, 0x0, 0xc5f2, 0x6f, 0x6, 0x2, 0x279e, 0x80000001, 0x8, 0x7fffffff, 0x2a48000, 0x1, 0x8, 0xfffff001, 0x101, 0x6, 0x6, 0x2, 0x40, 0x4, 0x1, 0x9, 0xc3, 0x1, 0x101, 0xebd9, 0xffffff71, 0x6a, 0x800000, 0x627, 0x7, 0x0, 0x1, 0x7, 0xb69, 0xc0000000, 0x8, 0x3f, 0x9, 0x9, 0x1, 0x7, 0x100, 0xe35b, 0x80000000, 0x8, 0x6, 0x8, 0xf8000000, 0x7fff, 0xcf0, 0x6, 0x6, 0x32, 0xa7, 0x5, 0x8001, 0x81, 0x2, 0x3c0, 0x0, 0x5, 0x1, 0x6, 0x9, 0x9, 0x20, 0x1000, 0x9, 0xb29b, 0x3, 0x5, 0x0, 0x5, 0x9, 0x0, 0x800000, 0x5, 0x80000001, 0x8, 0x5c, 0x401, 0x6, 0x7f, 0x401, 0x0, 0xd4, 0xe91, 0x20, 0xffff, 0xa2c6, 0xfffffffd, 0x800, 0x0, 0x6, 0x7fff, 0x100, 0xba, 0x4ec, 0x8, 0x6, 0x1, 0x5, 0x5, 0x401, 0x3ff, 0x40, 0x101, 0x2, 0x1, 0x9, 0x10001, 0xb7d, 0x4, 0x4, 0x63, 0x52, 0x4, 0x8, 0x80000001, 0x5, 0x40, 0x4e424240, 0x0, 0x0, 0x2, 0x420edf4d, 0x9b, 0x5, 0x62bf, 0x858, 0x4a28, 0x1, 0x1, 0x7, 0x1000, 0x8, 0x9, 0x1, 0x7, 0x7, 0x3, 0x2, 0x7, 0x80000000, 0x1f, 0x3ff, 0x7fff, 0x40a, 0x4, 0x3, 0x7, 0x6e0d, 0x4, 0x6, 0x1, 0x7ff, 0x54b, 0x8, 0xfff, 0x1, 0x8001, 0x7, 0x4, 0x3ff, 0x100, 0xfffffffe, 0x14d, 0xffff, 0x9, 0x5, 0x6, 0x8, 0x4, 0x12, 0x3000000, 0x101, 0x2, 0x9, 0x81, 0x200, 0x5ae2, 0x3, 0x5d8d5992, 0x101]}]}, @TCA_FW_INDEV={0x14, 0x3, 'wlan0\x00'}, @TCA_FW_CLASSID={0x8, 0x1, {0x5, 0x2}}, @TCA_FW_INDEV={0x14, 0x3, 'caif0\x00'}]}}, @TCA_CHAIN={0x8, 0xb, 0x2}, @TCA_RATE={0x6, 0x5, {0x4, 0x8}}, @filter_kind_options=@f_matchall={{0xd}, {0x3d8, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x5, 0xf}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x6}, @TCA_MATCHALL_ACT={0x3b4, 0x2, [@m_mpls={0x68, 0x16, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_MPLS_BOS={0x5, 0x8, 0x1}]}, {0x34, 0x6, "84a349649ae2c5380511c9a2aa0a10a21728ea5c012b33b7538d7dffee942f4d9455a73c23cbba915fead2586826d17e"}, {0xc}, {0xc, 0x8, {0x1, 0x1}}}}, @m_gact={0x1c0, 0x1d, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x22f5, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0xbeb, 0x0, 0x4, 0x4ff, 0x7b5e}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x1862, 0x60000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x7ad, 0x2}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1, 0x0, 0x0, 0xfff, 0xffffff01}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0xc20, 0x1}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x2293, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x2, 0x80, 0x1, 0x1, 0x4}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0x26a1, 0x4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x92, 0x80, 0x10000003, 0x0, 0x200}}]}, {0xe9, 0x6, "ef6b43f237d8b60b903ae44e0a9fe0428900cf9d242b0808fcf49fe79f779ac7b5f2ba497cecd956a8289ad6731a90364f3d8d4d87b4943ed51549a3701283b0d7448a40644adf53a39e7a14c5b94dc51484a137bfc52fcad7ec95cced05109df741246f02bd87658cf5f6a49929ed57b5e5a6747389eda69434f11a6b797fcada2999dc08aa112a3c1fddd65375b10aa622323cbc499a9de6c451f5d998135414b95136a23c68f79f54f85dfe8a70687079b82267bd5d54b788cb78216ed1f712dbc98a6652e99ab8affb23b0e42a24de62b76195f1fa3bcaa8c7282b44e17fb541e26268"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_mirred={0x188, 0x1d, 0x0, 0x0, {{0xb}, {0x64, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1ff, 0x3, 0x10000002, 0x4, 0x80000000}, 0x2}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x401, 0x3, 0x9dd46c4751faa760, 0x0, 0x8001}, 0x1, r6}}, @TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x80000001, 0x8, 0x9, 0x7}, 0x1}}]}, {0xfa, 0x6, "36e19078b8d4cbc225c7b93770908d4c36e4f3e7dd4eace845fd2d04677b4c5f10fd67536462e070b973b357a6ad09366b78d0a6b0d93e025c8c74a6fa5248d975b3b58d91a4b7944ae140e9b037a5fa8faaf80c8c899bdcce36558065f0a7dc1511887d4226ca82f08c64d796e2723769388ce458a7209009389d6d8f7daea8b6e986bd3c6d5b3853f9ab3e10eb4692ab86aca585d452878aaae61ab9c2bcab3ff3da36def4c45382c733dcaee6ae6690d73e79394e554ea4d0ef7850702d5e69652d6193a8b842e80e5bbc9790f6e278825a2f31b1635958608d9fdabd9eeb6248698f3769335bb09813695f8a7fbb02654e654157"}, {0xc, 0x7, {0x0, 0x1}}, {0xc}}}]}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x8}]}}]}, 0x6798}, 0x1, 0x0, 0x0, 0x80}, 0x800) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000180)='./control\x00', &(0x7f00000001c0), 0x9002, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@fsmagic}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@appraise_type}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@subj_user={'subj_user', 0x3d, '/sys/kernel/debug/binder/transactions\x00'}}, {@fsname={'fsname', 0x3d, ' }!}]^'}}]}}) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:47 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r') execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:47 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 118.670077][ T2925] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:47 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x408cc00, &(0x7f0000000080)="ac3e662042574c74f3b41bfa69311394180032adadb679584199a8e5528964b569b7bcfc80ab63e8e6416c02fd08e788ee38d160c312c05737558d67adeb4b1733bdcecc9c307c6ba3a802543f6c1ac6bcdd583a44cbb514a36be2dfcdafce6b6f1216bed93972b236b73e24776dc751c64a6b27b5fe74d98fabae063a5d0296f2a250203e772ddc317b3f4249a82afb0234a7f143d65e00c1ea92a6a452a760babbdfedf2a0d74f3375dd45a2c0c010293948972147760c6ff06b706b1aea9e60fb6eba64446ebdb3ab50a603552f62d5326b1b23c0a261d8", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0)="e547fc3a84c690b32008066b0813b6e0fe5c1806109b2823e2bac7f2d8aae93e777c6292a294214ca68c567118c945a934be11dc5e27a1c815b583829dcc904502b569ed56dd461aa675ecf519655fb173f56d82bc90e276eed2c0b3f39059f81f8c1b93931d0fda73d04b34c101f1ff325bb7a6dec90f142f089c16ee39543c51095653d81bf13b61acbde7860c61ee19729f9827e6518fff732fc84d77f494ea21a629fa65939ad33b3a8f7f1204dad6422c2e7e17ccda576d8ca30227e5398418ffa68a06a40839ed8982") r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) clone(0xd6a26ed771ae00b8, &(0x7f00000003c0)="c52a250ae3b67c33d0555346a47283dc643ef7e9e06be9c04156c2e392937b23b36e21f994bc392b82817ed5b5f3985e39225b1db364c8696ab19bb4c16d5987d1c067c996abbd235bcb6fdafa661666dedc845405009a35ff4440115b1b9f5b3d4198d1ee410e938b96d1be43e2d5c538c24e09320ab57ad65f0c045ef827edac2d0c60228097dbf419984e1cdef546dc2358f93852cb3518ea5d6c1c4fb893739861fdb4baf4d9de991dc721205c8823bdb710576b68d1690a890185d26a94a24565cdd895c5a4822a5c95a891b478e5b59cca4a80", &(0x7f0000000200), &(0x7f00000004c0), &(0x7f0000000500)="89be7754f10b90c7f72cfd50f10900fafa1a484846fa158ef7429400ff41f557e0ced2591cdd596c62974b6be65410e7e6b01da6e90d7c684982517ecdfa1ac07bfca2e75c6c10edfd243d6d80b3e4a7e32209c058542eae63433de7352eb62870188c52991f24b401c2060c2824269189a66245a8ba46") getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0}, &(0x7f0000000640)=0xc) perf_event_open(&(0x7f0000000580)={0x3, 0x80, 0x0, 0x5, 0x5, 0xf0, 0x0, 0x0, 0x800, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffff, 0x0, @perf_config_ext={0x6, 0x5}, 0xb0, 0x100, 0x3, 0x2, 0x0, 0x858, 0x9, 0x0, 0x4182, 0x0, 0x3}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x800) 17:16:47 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x90000000, &(0x7f00000000c0)="2041c1d7d94bdbe3535ca06d50c31506c153370cc6cc7039dbd1fd8402a6216f3b33ce7a27362c71d06036e63b913bebb1fd92f3b028c0016bb0712f9cc87e00bbe20d4ae64a3086a12114fa5783fda38c1371c3b962af3aa77e", &(0x7f0000000040), &(0x7f0000000140), &(0x7f00000002c0)="fca8e13d0bc553678e77293423fadcd17d3bf9b3e1de025be5d8305a4310e00e0b5d29ca559ad64e93cdca194684d6b2b3d65e3d9087ab17b897193f59e0f513b1533a547f0e35a5afefe96f4554d270760b0e44c97ba62dc31544970af5c70a9a2812c2487f9b0de155cb8f822901ad907e2524774bb4e16890671b99806163ad78f695befef429202869cc835d9059efd84fee5e243e21cfc9ee352fb18be21069cd974a02f628e2d4f392bec2b57268ab084fe80b150b73d3396a70e7fa5d6c1738e0ec339c04f4d853db27782068eda66719073f85ee029d297a47014cae56a51a56bb6b2c38803834e3f8de109d") 17:16:47 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0x0, 0xffff}, {0xf}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x10) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) [ 118.721487][ T2946] SELinux: duplicate or incompatible mount options 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = open(&(0x7f0000000080)='./file0\x00', 0x4000, 0x48) execveat(r2, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000200)=[&(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec8\r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x9d\x15\x0fX\x94\x98\xf1$+\v\xbf\xe17\x1eO/\x8f\xa1\xa9*\x1e\x1b\xe6\x82E\x92\x8a\xcd\xd7\xf2lV\x82\xc9\x19\xac\xa8\xaaJ', &(0x7f0000000180)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'], &(0x7f0000000440)=[&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000340)='.}\x00', &(0x7f0000000380)='\x99\x00', &(0x7f0000000480)='%,]\'', &(0x7f0000000400)='-]\\,&)\x00'], 0x1000) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x0, &(0x7f0000000080)="225c2f21b4cef3d3cf78ba50fbb193f99545697134c390da95c06a7326d210cd0392daecd99f2a34c330830d2dc63a59750e30c496bd26021ed20308caee1388ade2db16d4d64752f5b01146ae7642a30143f6cc9169806fec04faf18128bc3106f06a13dc2c8062687b5a37af22fccc42e3fda37bc5e210d20123e8a5ad26726d6e22f8793fe6e83779c080b7fe16d58fe8b952114f", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="41568efd54744f6b4f1fad471fc6268f321976af9311b22a6ebfe4d870b7a233739d098a11f10c7c3e5d55c6f7721473a7c417ffe5d977d1f0514fefdcf304ef0fdd714489c1b4287c7c") [ 118.781615][ T2966] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 118.792316][ T2965] SELinux: duplicate or incompatible mount options [ 118.800006][ T22] audit: type=1400 audit(1622308608.026:11): avc: denied { sys_admin } for pid=2958 comm="syz-executor.5" capability=21 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=cap_userns permissive=1 17:16:48 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'os2.', '+))\\-},\x13\x00'}, &(0x7f00000000c0)='-\'$!@:.+-+]:\x00', 0xd, 0x2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x2) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r6 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000240)=r6, 0x4) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 118.960680][ T3005] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:48 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000180)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xd7B\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\xe3\x16\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xac\xa0u\xdd\x99\xe2uB\xda\xd0\xbc\x89\xfc\x1f6\xee\xe9\x8e\xdfV\xc0\xa6\v\xe1\xe3\xc7\xda\x94\xe6\x82=\xdd\x99\x8fv6J\'\x802\x1eK\\\x15[\xdc\xb3w\xca\xea\xb5\xf2\xf6|B<\'\xe5\xc2,\x19&\xf3\xae\x19\x1c\xeau\xfd\xd4L\xc9\xdccpS\x1f\x03\xd1\x95P\xcd=\xc6E\xeb\x9e\xda\xe7\xfb\xdf?\xfb-L\xab\xcf\"\x92PgL`2h\xc6*\xb3{\xbd\x90\xd9\xce\xb6D', 0x3) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = fcntl$dupfd(r0, 0x0, r0) dup(r1) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) writev(r2, &(0x7f00000002c0)=[{&(0x7f0000000080)="236f5c2c80ff4c728f378d462cb329f7da54c00a3760ba97e614191837e69b0702efb57e6caaa7adeb4cba156897ca02229ec7269efa349925b33fcc5c81b580501a8aeedc152e9e2efb4031cc785e4863e09e3c519691da49014dceb82aa264391cc5f16209badbab056c2b1b250ca2238e2c0983fc9f4fc9c825d9cf1721649e82fa002d29156b724ba61d35e6cdc19448", 0x92}, {&(0x7f0000000140)="f067818eb3a5b07aa98b98a2b68e7c613237cf2a283b7cfc29b75fc370eb65b29668c170b449136d5c05837ef18613082b7ebfd6ba501b74f172f05c2ed4b1cba9dd70abd15005975b2f649a0556cd84976e55667296883760869f6552f7331a0c60161c5defe028d237f06903791cc526887362237a881a6e2bd47ba8a6e7a8edf132e8d5b1d47698881c0828754437c020cdcb5560a8018ae00e7809556d44410fc6227f443a0091325881e4595537a190c765f0f92ab1a043e4019fbe01ae20b0e86839908e7a055fb852f10cafc2fe351fddec52a3792418ea38ff7a6cb1323527e8919d3cf22e73097cf1872d", 0xef}], 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 17:16:48 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r1 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r2, 0xf501, 0x0) fchdir(r1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f00000002c0)={0x3ff, 0x1000, "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"}) 17:16:48 executing program 3: sendmsg$DEVLINK_CMD_SB_POOL_GET(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x18c, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x8001}, {0x6, 0x11, 0xfffd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x5}, {0x6, 0x11, 0x400}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xd12f}, {0x6, 0x11, 0x2}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}, {0x6, 0x11, 0x6}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0x27}, {0x6}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x8}, {0x6, 0x11, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}, {0x6, 0x11, 0xfffa}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xfffffffe}, {0x6, 0x11, 0x8}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x4001}, 0x4000814) r0 = syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_HARDIF(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x7}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x40040c1}, 0xa0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) open(&(0x7f0000000040)='./control\x00', 0x4e21c2, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r2, 0x4, 0x1000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) pwritev(r3, &(0x7f0000000380)=[{&(0x7f0000000340)}], 0x1, 0x6, 0x1ff) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c6a) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x11) 17:16:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/class/rc', 0x101000, 0x2) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:48 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) symlink(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./file0\x00') mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_io_uring_setup(0x4488, &(0x7f00000000c0)={0x0, 0x98de, 0x10, 0x1, 0xa2, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000122000/0x2000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, 0x0, 0x0, 0x0, 0x1100) 17:16:48 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ftruncate(r2, 0x401) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x7f) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x7f, 0x40, 0x81, 0x0, 0x0, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffb38, 0x4, @perf_bp={&(0x7f0000000080), 0xb}, 0x10, 0x4, 0x5, 0x2, 0x80000000, 0x3, 0x555, 0x0, 0x8, 0x0, 0xc51}, 0x0, 0x1, r2, 0xa) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20004}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000008c0)={0x3, 0x80, 0xf0, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000880), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000040)={0x80000001, 0x7fffffff, 0x4}) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x8c00, &(0x7f0000000240)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x205}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x400) 17:16:48 executing program 5: flock(0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) clone(0x3a3dd4008400ad01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%&\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\xe7A\xf8\xd2~\x13:p\x06\\8\r', 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x20000000, &(0x7f0000000080)="53b922d7ff918368b21a9de4ff6a019a600830dfb918d9f16b59f2e825dfa12ca615f19b3eac1c8648814555fe791b822a35fd9333e47dab50376ad3e21d9c8cbee9c23ec926abc0ff54dc3dd6d28c69d093f9909cef7012c69c3a9a1bac6f993d4c93aa5b877c634541b95cfa0e2461e189b07232b9a494616ed18954b8c85e8ecc3baf7f6b3fb8f9d4170911abf7bab48e6047ea9ad860f0b4ec2e76361d4723b7be5575e00f9cf68cdda9487153a9a7dba4e22bd908d56b7933096ca5457f7b335219666fcc769bbbce1db055b077127f935b16b86c9024b1a0fe1fe916d784528f7b1c0c1a897fee71461b4b40a0e4", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)='0x0, &(0x7f0000000240), {0x29}, &(0x7f0000000280)=""/124, 0x7c, &(0x7f0000000300)=""/2, &(0x7f0000000340)=[0x0], 0x1, {r0}}, 0x58) r3 = perf_event_open$cgroup(&(0x7f0000000440)={0x4, 0x80, 0x20, 0x6, 0x80, 0x5, 0x0, 0x6, 0x80000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000400), 0xc}, 0xa003, 0x1, 0x13, 0x6, 0x8001, 0xffff, 0x240, 0x0, 0x1, 0x0, 0x101}, 0xffffffffffffffff, 0x9, r0, 0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x2, 0x36, 0x2, 0x15, 0x0, 0x5e83, 0x20008, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x20, 0x1, @perf_config_ext={0xb31, 0x4000000000000}, 0x8801, 0x3, 0xfffffff7, 0x5, 0x6, 0xb56, 0x7ff, 0x0, 0x5, 0x0, 0x7}, r2, 0xffffffffffffffff, r4, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x1, 0x80, 0x81, 0x81, 0x0, 0xffffffffffffad18, 0x4800, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000100), 0x5}, 0x18830, 0x4, 0x200, 0x0, 0x3, 0x101, 0x0, 0x0, 0x3, 0x0, 0x80000001}, r2, 0xf, r3, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 119.239082][ T3054] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.246451][ T3054] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.312243][ T3055] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.319313][ T3055] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.327936][ T3055] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.334957][ T3055] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.352951][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.360606][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.368349][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 119.377054][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 119.385680][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.394601][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 119.402976][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 119.411379][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 119.419901][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.428416][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.436871][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.444957][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.453150][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 119.461585][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 119.469685][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 119.483121][ T3082] bridge0: port 2(bridge_slave_1) entered disabled state [ 119.490333][ T3082] bridge0: port 1(bridge_slave_0) entered disabled state [ 119.521825][ T3084] bridge0: port 1(bridge_slave_0) entered blocking state [ 119.528881][ T3084] bridge0: port 1(bridge_slave_0) entered forwarding state [ 119.537274][ T3084] bridge0: port 2(bridge_slave_1) entered blocking state [ 119.544292][ T3084] bridge0: port 2(bridge_slave_1) entered forwarding state [ 119.560125][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 119.570711][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 119.578388][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 119.586887][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 119.595171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 119.603846][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 119.612450][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 119.620736][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 119.629013][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 119.637660][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 119.645982][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 119.654193][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 119.662416][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready 17:16:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:48 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24cf) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x20000, &(0x7f00000000c0)={[{@nfs_export_on}, {@xino_auto}], [{@fsuuid={'fsuuid', 0x3d, {[0x35, 0x36, 0x65, 0x64, 0x36, 0x31, 0x65, 0x32], 0x2d, [0x37, 0x6, 0x61, 0x64], 0x2d, [0x36, 0x34, 0x37, 0x35], 0x2d, [0x61, 0x39, 0x31, 0x64], 0x2d, [0x61, 0x36, 0x45486f99d7eed4cd, 0x39, 0x63, 0x6c, 0x62, 0x63]}}}, {@uid_lt={'uid<', 0xee00}}]}) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:48 executing program 5: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = accept(r0, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000140)=0x80) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x1, 0x4) flock(r0, 0x3) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41002, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x6}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x373, 0x0, 0x3, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x40, 0x8, 0x3, 0x2, 0x0, 0x7, 0x80600, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0xd9, 0x2, @perf_config_ext={0x7fff, 0x401}, 0x200, 0xff, 0xd8b0, 0x9, 0xe36, 0x8, 0x8, 0x0, 0x7d05, 0x0, 0x8}, r2, 0xd, r0, 0x3) clone(0x80108000, &(0x7f0000000080)="c1b290ab084c26b87ab88f2f05eefc2d1a9176199c7835d0ec30f3cf6f8cf07e998c3c5dd9834a3ded3482d8e2cf5f808d40a697abe2eb565dbd17db1a7c5a8c4dfa7a24c5cb28522e81a06348048bb2b7b18b71a3b3aa5bfe9fe84de5370e8a068d3ca2e7f03401e592795791336b1f8c13001a7563727cd0fabaae708ccbb96908", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="31cec9545a76528c1e4af33953b43d0d0fdb23c4cf49990779d86a3b2a269a5c1f79d3d81143a0f25b4ac7e29ccad206dd8c692168fa1af4fa1b39f6e4a4b814e539ca446f2889446d82fac98df540bcb4bd2d697ef4f056b75d96c1fc9c49f555afc8febcce52c947") execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 0: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x2) flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r1 = perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x4, 0xff, 0x6, 0x9d, 0x0, 0x8ec9, 0x40, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000140)}, 0xc0, 0x3, 0xff9, 0x1, 0x2, 0x8, 0x4, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x6, 0x80, 0x3, 0x5, 0x0, 0x400, 0x21000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000080), 0x9}, 0x80, 0x5, 0x0, 0x9, 0x8001, 0x0, 0xd2, 0x0, 0x8, 0x0, 0x4fd5}, 0x0, 0x10, r1, 0x1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1100) 17:16:48 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) [ 119.670971][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 119.678993][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready 17:16:48 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x0, &(0x7f0000000080)="d16942f3aa044c1b5d87077eda9526b0bcbb149d930e76824ec496fa2ab1247dd899680f0641ac30c1ea1c82e5574afd1cf2f17b685f6e03523df1cd10266627e13dc8047525b591b8d78729c8eab10c3d291a8ab38f946344a057ce9b88b7091c25db55f008cf22a5e279c217ef6230d059fbf3c416fecf25317473120cd15f9d16746576a1f0aa887db1794e9344c50a8a6deaf903efe52d53cd386e59d26b3ecccc914d4ce077521dd85f6cf22e96cd1362f176c7f99e3650b6403c2b3ed8b35ce7295d6d61804afc4b5899583e0dbe2d1261f987e4e9", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0)="f6271bee2aca53bb1663706c329ee7cf489d2da5c2fa6a0f15a8b733d22ca7ff0301fc9f3c807fc74b45dab453afa7e4520a4df457b2c339ff03c536dfb13d7b6dc90a2e680c4b0767f1941edb8280bc697b4b299898bdec43177fbc2abbaf7c76f3") 17:16:48 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008710ad01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080), 0x6c882, 0x0) execveat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000100)='#&\x00', &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000001c0)='${-\x00'], &(0x7f0000000580)=[&(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000340)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000003c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000440)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f00000004c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', &(0x7f0000000540)=':\x00'], 0x400) 17:16:49 executing program 3: mkdir(&(0x7f0000000080)='./control\x00', 0xcc) chmod(&(0x7f0000000940)='./control\x00', 0x1a1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) connect(r0, &(0x7f00000000c0)=@phonet={0x23, 0x1, 0xff, 0x70}, 0x80) 17:16:49 executing program 1: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = accept(r0, &(0x7f00000000c0)=@sco={0x1f, @none}, &(0x7f0000000140)=0x80) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x1, 0x4) flock(r0, 0x3) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 119.750197][ T3103] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:49 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41002, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x6}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x373, 0x0, 0x3, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41002, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x6}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x373, 0x0, 0x3, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8, 0x1, 0x5, 0x7, 0x0, 0x800, 0x8, 0x5, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x100000001}, 0x50008, 0x6, 0x1, 0x7, 0x7fff, 0x1ff, 0x100, 0x0, 0x1000000, 0x0, 0x1}, r2, 0x5, r1, 0x8) r3 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) write(r0, &(0x7f0000000040)="2722e436cb1928558704ae17a3bff6c8b041df2eee07dbe2c3e16700b46b72ce68ab6705646e9f", 0x27) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) syz_open_dev$vcsn(&(0x7f0000000080), 0xec, 0x400000) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) clone(0x3a3dd4008400ad01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%&\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\xe7A\xf8\xd2~\x13:p\x06\\8\r', 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x20000000, &(0x7f0000000080)="53b922d7ff918368b21a9de4ff6a019a600830dfb918d9f16b59f2e825dfa12ca615f19b3eac1c8648814555fe791b822a35fd9333e47dab50376ad3e21d9c8cbee9c23ec926abc0ff54dc3dd6d28c69d093f9909cef7012c69c3a9a1bac6f993d4c93aa5b877c634541b95cfa0e2461e189b07232b9a494616ed18954b8c85e8ecc3baf7f6b3fb8f9d4170911abf7bab48e6047ea9ad860f0b4ec2e76361d4723b7be5575e00f9cf68cdda9487153a9a7dba4e22bd908d56b7933096ca5457f7b335219666fcc769bbbce1db055b077127f935b16b86c9024b1a0fe1fe916d784528f7b1c0c1a897fee71461b4b40a0e4", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)='0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x7, 0x81, 0x40, 0x96, 0x0, 0x3, 0xa0020, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4a05, 0x2, @perf_config_ext={0xc48, 0x1}, 0xc121, 0xea, 0x3, 0x0, 0xd946, 0x300000, 0x5, 0x0, 0x3b, 0x0, 0x8309}, r5, 0x6, r2, 0x8) write$binfmt_elf64(r4, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x7f, 0x7f, 0x3, 0xa3, 0x7ff, 0x3, 0x6, 0x9, 0x3ce, 0x40, 0x10f, 0x3, 0xff, 0x38, 0x2, 0x9, 0x1, 0x5}, [{0x5, 0x4, 0x8, 0xfffffffffffffffd, 0x6, 0x63, 0x94a, 0x3f}, {0x70000000, 0x10001, 0x30, 0x2, 0x48, 0x0, 0x4, 0x3}], "947a1c4c211789da6afbe34def7d07313354dc9a2fd5e94cd1652ee6ce72857c0a2ce1e98952540a0a", ['\x00']}, 0x1d9) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) clone(0x3a3dd4008400ad01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%&\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\xe7A\xf8\xd2~\x13:p\x06\\8\r', 0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) clone(0x20000000, &(0x7f0000000080)="53b922d7ff918368b21a9de4ff6a019a600830dfb918d9f16b59f2e825dfa12ca615f19b3eac1c8648814555fe791b822a35fd9333e47dab50376ad3e21d9c8cbee9c23ec926abc0ff54dc3dd6d28c69d093f9909cef7012c69c3a9a1bac6f993d4c93aa5b877c634541b95cfa0e2461e189b07232b9a494616ed18954b8c85e8ecc3baf7f6b3fb8f9d4170911abf7bab48e6047ea9ad860f0b4ec2e76361d4723b7be5575e00f9cf68cdda9487153a9a7dba4e22bd908d56b7933096ca5457f7b335219666fcc769bbbce1db055b077127f935b16b86c9024b1a0fe1fe916d784528f7b1c0c1a897fee71461b4b40a0e4", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)='r0, 0x1, 0x5, 0x2}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r3) chown(&(0x7f0000000100)='./control\x00', r3, 0x0) preadv(r1, &(0x7f0000000280), 0x0, 0x8, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) r5 = accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) shutdown(r5, 0x1) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x95cf, 0x1, &(0x7f0000000140)=[{&(0x7f0000000100)="e5a222b20e8b76cbae867445bf9a114f77f8793a2706a011957067828dc5bb11679ebe6433f103555f77f7c406f284", 0x2f, 0x7c}], 0x84000a, &(0x7f0000000440)=ANY=[@ANYBLOB='huge=within_size,gid=', @ANYRESHEX, @ANYBLOB=',mpol=bind=relative,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d6f64653d30303030303030303030303030303030303030303030352c687567653d77697468696e5f73697a652c687567653d616c776179732c687567653d6164766973652c687567653d616c776179732c657569643d1ce2081adbf1a9402112fbac50d4c0d2ffa07464eb65039c05ead87a612f1aad4ef037b93e56ca7148fd2ddd38bb7719419eb9f88c39c94e7b00bd68a79201eb34bdf41f14e76b7a228c29d690e3cf1c1a4d2a", @ANYRESDEC=0xee01, @ANYBLOB="2c736d61636b6673726f6f743d0000000000007a9bb6e87425fc964c82db39a08b1464a2a1a821e8d1a08ace301cb7f1cc6dced4db89e58fe2b6d69c46bdff14ecd4448a1f1bf618f3dc9127065c380d2c66756e633d46494c455f4d4d41502c00"]) execveat(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) clone(0x20200000, &(0x7f0000000080)="f09b760bd55f132c11839c1072ec09a3140396d982809b76706eccf7937c8faf7bdf803aa9b4ceb2b9b47d", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f00000002c0)="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") clone(0x80c0000, &(0x7f0000000140)="db21d71ba88e1ef59ae8b372bc5c4264ec756ffe4d4d6efb47c1fc6066400c75c09316f9b7c9a73c019f041f23e33158539712bb2ceb1f1259933d00264dee476d6d989df846964c8effdb91831b8e4e24b707d472de7425e30eb6e36d3b599df036", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000001380)="dd61aa862989a60a61316f0f27a761d19ed6b342e8608e58110d5b9eb69700000000007313f5c69a9c173d2429477e2ac5ff493e94b9fe110c7df35a6e6afa4277ceb6d97fdd1aff9da09977755cb563c298adf6b9e63198dfc425db445e8086009c749c6f6e5291f21844fd96a7ef51b9041d2277722e26c9938be162c21ebc529ec100"/145) r2 = syz_open_dev$char_raw(&(0x7f00000012c0), 0x1, 0x4000) sendfile(r2, r0, 0x0, 0x5) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400), 0xc, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYBLOB, @ANYBLOB="00022dbd7000ffdbdf25110000000c0003800800030000000000240007800c000300ff030000000000000c00030008000000000000000800010080ffffff2001058008000100776470002c000280080002000800000008000300ffffffff0800020004000000080002000800"], 0x164}}, 0x20004010) sendmsg$TIPC_NL_BEARER_DISABLE(0xffffffffffffffff, 0x0, 0x20008100) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040), 0x0, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x7f, 0x40, 0x81, 0x0, 0x0, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffb38, 0x4, @perf_bp={&(0x7f0000000080), 0xb}, 0x10, 0x4, 0x5, 0x2, 0x80000000, 0x3, 0x555, 0x0, 0x8, 0x0, 0xc51}, 0x0, 0x1, r2, 0xa) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x81, 0x6, 0x3, 0x0, 0x10000, 0x81080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1667fa26, 0x4, @perf_config_ext={0xfff, 0x101}, 0x10010, 0x9, 0xd2, 0x4, 0x200, 0xc0000000, 0x8, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5) r2 = gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x43, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'}, 0x30) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000340)={0x0, 0x100000000, 0x8000}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000440)={{}, {@val, @actul_num={@void, 0x100000001, 0x45}}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000015c0)={0x0, "5d14c3c88e62a750aad979eaecc04692"}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000480)={0x1, 0xffffffff, @start={0x0, 0x1, "0a5e8763b9963f376b00cf92e1f7bbae60cb9e8081867c70b297b585e5eea5656b3854eaac5686041dad90ae0c4d4b374711995ee6930973c1617fdc784344f86a10685f8e8c7a37ceb4a293e60feecd2477d3b3c57d5d9bee80d03f9dc9d5329a05646f4e8305caa605b64d80d5084148a22c0a1e65b2e65ee4540e2a68adcaa69205fd6b47504888a954f211d9fa369908416fb098d23d0e3a6733fd96ebbaec6a75a20f4ba4348d0ece82a6d1d39842b9a301a035068f01f53bd31ce6cd545635442aa17c23e94ff3a45e466f3020cc3f15446b7cbdf00995b37ad69a91ec7177e9d772d7895ae46d259f0f1a3cfbaa392369d73352c7a8110e30bd301e1a192d88749ad58fc95d41fc675142713e3bed1841e6011bf7f49e216754c98172c7d6fa36c3cbed3b5718834824121821a0d638d1a80eb2446ccd5ba2edbe24d75ef7a74a7d7ac52cad8ec4f7fb6bd377d948c252666ba0710900bf9b15436c93a1b1401994ac8415610d466755e599b03db0685368e65eb8f61eda90efdcec01b1b27315aa34913c81d4f62e01cb89ab80042cda1efd2ce290d1c4eb153d29e45d63d906449c6e2b43f18cad00f85b3570e90ccaac81b2a422a503ba37804cdadf5ffd0e1403e56c5ab1e3a55e2fe4c32cabf991cc1759a14def25e6832ef21ef2d2a09db844eafc21d1f271061664a3d74541bcdfa891ca0c12276db7d57770e9e783f33f59754171be2ca2d8081c09518afe2ceb46c7765af4b469b67e08932022fd1865dbd00459f5d15093dc43293f91accbb137b16771124dc4457a899f56c3388378b8e0fbf2d2a18b2ece0eba951d0389bcaaa51f5a0fa189f13934ddd661ab7ce9a5a20c72d992a092d0f1cd5f3f32c2a0111c36ad16932b56fb4b05e9919b14a9efea7c6686cde6dd3a1434124b105aa9b3a8529e00b06f7146c4f3bce964ba669834fa973264aafb030b4d5c30169f83a2375cac14312976d62af53ad5595b4db14c58a9d9f2838f3fc1947c0c691b73c6e94350aec00d0e0cf98b5631a965d91c5fe14aa2e136bf7d658c26344251358b82f9378904ef07f1d0500e4de7500784dc1ed9db94cd3f8a6db9298ce9242846e87737ac914989a65d733e95b59fa80e2f176aff53fad8e69ed4d33567689423cbda990c6fa7eb24c9b5a128681ea33b9295d597b15cde827634d8792d0fb7cb7f880c01035ebc4de928e81e919e5e4b7302605676f2cb627870caefa3917d049c97aa9440e66a1342b9a35a76f58d8d4c744f315fb83d6e1debdb216343235c335749c129baa50212722cb9968ed56ee055e062f8acdb44be9d3b7e3cca25070a3dfa56cd7aed6897acff9c4aab4b08b8986af27c870f108668a6a228c141ac6a42778469e2607b417347f022145005036a1747dcc2d997b77a90820cc76205fff0b20e8df673e862c2f0", "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"}, [0x94, 0xffffffffffffffff, 0x6, 0x5, 0x800, 0xffffffffffff8001, 0xac, 0xcb20, 0x9, 0x9, 0x7, 0xffffffffffff7fff, 0xfffffffffffff001, 0x4, 0x4, 0x3, 0x4, 0x5, 0x2, 0x6, 0x7, 0x5, 0x101, 0x0, 0x8000, 0x2, 0x0, 0x20, 0xe2, 0x9, 0x1000, 0x6, 0x4, 0x1000, 0x81, 0x6, 0x3, 0x1, 0x655, 0x4, 0x100000000, 0x7, 0x1619, 0xffffffffffffffe0, 0x4d4, 0x17, 0x8, 0x1f, 0x5, 0x5, 0x9, 0x7f, 0x8, 0x9, 0x81, 0x1, 0x0, 0x4, 0x7, 0x6000, 0x0, 0x0, 0xfffffffffffffffc, 0x400]}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000006c0)={0x0, "6f854baf87aa642c14ae3970888b58ad"}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000002c0)={0x0, 0xefe, 0x1, [0x800, 0x20, 0x9, 0x800000000000009, 0x80000001], [0x7, 0x8, 0x81, 0x8, 0xda8, 0x872, 0xad, 0x2, 0x4, 0x1, 0x1000, 0x8, 0x7ff, 0x6, 0x9434, 0x7fff, 0x0, 0x1, 0x3, 0x1, 0x100, 0x9, 0x61e7f386, 0x40, 0x1, 0x5, 0x80000001, 0x87, 0x3f, 0x672f, 0x1f, 0x0, 0x2, 0x5, 0x1, 0x20, 0x2, 0x1f, 0x3, 0x9a4, 0x6, 0x8000, 0x5, 0x10000, 0x5, 0x5, 0x3, 0x9, 0x3ff, 0x4a, 0x7f, 0x2c, 0xc3, 0x8, 0xfffffffffffffffc, 0x9, 0x1, 0x5977, 0x3, 0x6, 0x6, 0xffffffffffff7304, 0x1, 0x2, 0x550f, 0x1, 0x8b, 0x4, 0x8, 0x5, 0xe75, 0x6, 0x4, 0xffffffff, 0x6, 0xffffffff7fffffff, 0x800, 0xe9b, 0x4, 0x2, 0x0, 0x35f, 0x1, 0x72, 0x4, 0xfffffffffffffffd, 0x4, 0x8, 0x20, 0x4, 0x200, 0x3fffffff80000000, 0xc82d, 0x1, 0x5, 0xffffffffffffffe1, 0x10, 0x1, 0x4, 0x2, 0x19d, 0x8, 0x6bf2, 0x6, 0x4, 0x20, 0x7fff, 0x3f, 0x6, 0x7f, 0xfffffffffffffff9, 0x1f, 0xfffffffffffffff9, 0x2, 0x1ff, 0x1, 0x1, 0x0, 0x2, 0x8]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) accept4$nfc_llcp(r4, &(0x7f0000000300), &(0x7f0000000140)=0x60, 0x800) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:49 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x7f, 0x40, 0x81, 0x0, 0x0, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffb38, 0x4, @perf_bp={&(0x7f0000000080), 0xb}, 0x10, 0x4, 0x5, 0x2, 0x80000000, 0x3, 0x555, 0x0, 0x8, 0x0, 0xc51}, 0x0, 0x1, r2, 0xa) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) openat$null(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r2 = signalfd(r1, &(0x7f0000000100)={[0x401]}, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0xd9f, 0x10400) sendmsg$nl_route(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=@ipv4_newnexthop={0x54, 0x68, 0x200, 0x70bd2c, 0x25dfdbfd, {0x2, 0x0, 0x4, 0x0, 0x8}, [@NHA_GROUP_TYPE={0x6}, @NHA_ENCAP_TYPE={0x6, 0x7, 0x2}, @NHA_GROUP_TYPE={0x6}, @NHA_GROUP={0x1c, 0x2, [{0x0, 0x7f}, {0x1, 0x3f}, {0x1}]}, @NHA_ID={0x8, 0x1, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x400c084) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0xf) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x3) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000080)={0x2e, 0x13, 0x11, 0x13, 0xb, 0x3, 0x5, 0xc7, 0x7ffffffffffffffe}) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.246419][ T3223] fuse: Bad value for 'fd' 17:16:49 executing program 1: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x3f, 0x7f, 0x40, 0x81, 0x0, 0x0, 0x400, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffb38, 0x4, @perf_bp={&(0x7f0000000080), 0xb}, 0x10, 0x4, 0x5, 0x2, 0x80000000, 0x3, 0x555, 0x0, 0x8, 0x0, 0xc51}, 0x0, 0x1, r2, 0xa) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) wait4(0xffffffffffffffff, &(0x7f0000000080), 0x2, &(0x7f00000000c0)) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x81, 0x6, 0x3, 0x0, 0x10000, 0x81080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1667fa26, 0x4, @perf_config_ext={0xfff, 0x101}, 0x10010, 0x9, 0xd2, 0x4, 0x200, 0xc0000000, 0x8, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5) r2 = gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x43, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'}, 0x30) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000340)={0x0, 0x100000000, 0x8000}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000440)={{}, {@val, @actul_num={@void, 0x100000001, 0x45}}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000015c0)={0x0, "5d14c3c88e62a750aad979eaecc04692"}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000480)={0x1, 0xffffffff, @start={0x0, 0x1, "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", "eda4b7c5eac43605e76226413a1b1793d2ba28ffc3dc95cb4d8b644d19279afe270db243291a52f0786d6a8a1e382681b701af7c068fe5d729cb0491a774d220ad7e1fedab8b7e75bd50c8a1fbe2e548c734059ea7fd05683155f25f1b5c6d6d692d0cf14639a3db67d8563ab2e64a7de426c2cef714bf2d71d3f69893c707086c4e08f58c7be4d3c3ae3d824a5025282d3ef5bd869cf6a433c70e73af13a5dbfb03572629ea4d5789b3bca8902f4253387a8d3a6582ebeae6102195ffe7fb256fc8137c168df7604adf36f6ec315eeabc673f65affd1dd2825a156ff941b7d2b02c29d0c9456b471d74b053bf574accc7f857a16bc8b64e099d8b7463f43c736097ff962217b989fa7f36bef2069fbf28250063da1bedaddb12576016937665451f13d2d9b560240b0f20e15a82420ec5115103f1ea2860fc71f8c0bcc89d009e17e2fa1ee8c5a5558e582bc6e9c508ab2f785776b07b85668ea1d6eee333edcca452de7a3ccb44f39f0f1ceb058095b352a4449dd8822c82c44b94cf6886f28b143e2ccd4b0f981310a8cacefa309b2b3828a202fb23d0f78d63dfabb36fc963bfd4cb5538f8d426a9fbe6eddc235ca67b8b64272d4909a472dca5c621cea19fac7dee91db75b74d5e80ec84a278782a0c5fbe10567461748c98da506227eb7708dc8e970eb55b419f45f0915d84da2ee4837392f2ff10492fe7dc0d55e6203aa74e380364749292c73bc7f2a0bf627a6ad4faecf091a6f2912b365b3db1eac7e0be6a5556a2fdbd627bfe033f55b811b0628b564298c0a04c8367d27c979213c97b694bceac02f8b4eb8942c88f00059d079508acdf398db750482b0170b3ac63f5621badb563e88dd0dbf2067706a7f5a316bb0f0719cf57ed28438603a8a36695cd5eefc8fb9aec4e6accf6e93df43b9144bbb322386318a2503fa11bdd1a4b25d42d8071e120bf2e5ec190fb36fd695e7cc85aa12a2a190817435a498d89b36cd29eca08b0e1faac8e8c109fb3c8617b74025009e78b44f714b38cabe5c73302ec39f52a370fb10fe32a768a542a6cc6622a8db3e8234f13f504373880dd860aac5ee04a88c406d7770c50a81f9ac8e2b3bbef4e5aa2b45c3baeeec62f2b8de6eb88e350db8628871768ba276e5206466d6873292558d2d2743fba1106e43a812bd0c18ab53550a042bf1d485e8a6b6ae731021cb5a083284f7d7f3bf09705332aadc236d9b8c476434ecac098d9adc6cf7e095b907640eee66f696cbd25bbc77dcc1b341229ef3947ab8594c9b9f46a86b78650c56d93ac0b3369f68755d735b02c815877c6bc44683a05aac60d92a39c84a906d86fc1961c41f57dc8db5048d8b8949e94ca3935f31dc4f0fddf2df809aa21f78a752d8f7cf712032ac7068d48bf11e91cf7340ec60ee428d61ef0d505e85dc621c57390ba979a3fee14"}, [0x94, 0xffffffffffffffff, 0x6, 0x5, 0x800, 0xffffffffffff8001, 0xac, 0xcb20, 0x9, 0x9, 0x7, 0xffffffffffff7fff, 0xfffffffffffff001, 0x4, 0x4, 0x3, 0x4, 0x5, 0x2, 0x6, 0x7, 0x5, 0x101, 0x0, 0x8000, 0x2, 0x0, 0x20, 0xe2, 0x9, 0x1000, 0x6, 0x4, 0x1000, 0x81, 0x6, 0x3, 0x1, 0x655, 0x4, 0x100000000, 0x7, 0x1619, 0xffffffffffffffe0, 0x4d4, 0x17, 0x8, 0x1f, 0x5, 0x5, 0x9, 0x7f, 0x8, 0x9, 0x81, 0x1, 0x0, 0x4, 0x7, 0x6000, 0x0, 0x0, 0xfffffffffffffffc, 0x400]}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000006c0)={0x0, "6f854baf87aa642c14ae3970888b58ad"}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000002c0)={0x0, 0xefe, 0x1, [0x800, 0x20, 0x9, 0x800000000000009, 0x80000001], [0x7, 0x8, 0x81, 0x8, 0xda8, 0x872, 0xad, 0x2, 0x4, 0x1, 0x1000, 0x8, 0x7ff, 0x6, 0x9434, 0x7fff, 0x0, 0x1, 0x3, 0x1, 0x100, 0x9, 0x61e7f386, 0x40, 0x1, 0x5, 0x80000001, 0x87, 0x3f, 0x672f, 0x1f, 0x0, 0x2, 0x5, 0x1, 0x20, 0x2, 0x1f, 0x3, 0x9a4, 0x6, 0x8000, 0x5, 0x10000, 0x5, 0x5, 0x3, 0x9, 0x3ff, 0x4a, 0x7f, 0x2c, 0xc3, 0x8, 0xfffffffffffffffc, 0x9, 0x1, 0x5977, 0x3, 0x6, 0x6, 0xffffffffffff7304, 0x1, 0x2, 0x550f, 0x1, 0x8b, 0x4, 0x8, 0x5, 0xe75, 0x6, 0x4, 0xffffffff, 0x6, 0xffffffff7fffffff, 0x800, 0xe9b, 0x4, 0x2, 0x0, 0x35f, 0x1, 0x72, 0x4, 0xfffffffffffffffd, 0x4, 0x8, 0x20, 0x4, 0x200, 0x3fffffff80000000, 0xc82d, 0x1, 0x5, 0xffffffffffffffe1, 0x10, 0x1, 0x4, 0x2, 0x19d, 0x8, 0x6bf2, 0x6, 0x4, 0x20, 0x7fff, 0x3f, 0x6, 0x7f, 0xfffffffffffffff9, 0x1f, 0xfffffffffffffff9, 0x2, 0x1ff, 0x1, 0x1, 0x0, 0x2, 0x8]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.287967][ T3223] fuse: Bad value for 'fd' 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r4, 0x4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000180), 0x10) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x3, 0x36, 0x7, 0x40, 0x0, 0xc3a1, 0x200, 0x7, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0xd0, 0x2, 0x8, 0x9, 0x0, 0x4, 0x8, 0x0, 0x7f, 0x0, 0x40}, r1, 0xd, r2, 0x8) r3 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r4 = syz_open_dev$mouse(&(0x7f00000002c0), 0xa61, 0x400) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x40, 0x3f, 0x80, 0xf8, 0x0, 0xff, 0x1, 0x6, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x8000, 0x2, @perf_config_ext={0x2, 0x10001}, 0x420b, 0x549b, 0x4, 0x540974e18e6d986a, 0x1ff0000, 0x400, 0xcc8, 0x0, 0x8000, 0x0, 0x80000000}, r1, 0xb, r4, 0xb) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r6, 0x0) preadv(r6, &(0x7f0000000280), 0x18, 0xd9f, 0x0) dup3(r5, r6, 0x80000) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) openat(0xffffffffffffffff, &(0x7f0000000040)='./control\x00', 0x200, 0x24) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000080)=""/127, 0x7f}, {&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000400)=""/105, 0x69}, {&(0x7f0000000380)=""/91, 0x5b}, {&(0x7f00000007c0)=""/128, 0x80}, {&(0x7f0000000480)=""/126, 0x7e}, {&(0x7f0000000500)=""/104, 0x68}, {&(0x7f0000001980)=""/4096, 0x1000}, {&(0x7f0000000580)=""/149, 0x95}, {&(0x7f0000000640)=""/138, 0x8a}], 0xa, 0xd9f, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000980)={0x0, 0x400}) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000100)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\x00\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce\xad\"\xe4oJmd\xb50`>\xe7\x890\x1c\xb7\xf1\xccm+\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\a\x00\x00\x00\ri]\x1a\xf5\'\xe0WH\xc9\x0f\xf1\xe2\xe7\x10V\x00\x14\xb1\xac\x1a\x98A\xf3\t\x9cL\xb3\xae\x18v\xb0gf*\xd3\xfc({x\x1e\x84T\xba\tD\xe9o\xa4{e\xb0\xe1%\x1cf*?\xce\x9d\xc9\xf6\x0fpk\xae\xe2<\xd3\xc9\x9c\xdd\xe0\xab2\x90\x17\xdf\xb5\x0f\x8c6\x80\t:\nu\x9d\xd9\xd9o\xad\x95\xe8\\\xc2GN\xbe\xd4\xd5\xe2\x7fDL(\x95d\xc4$\xf8\x02\xcc\xdf\xec[\x87\xc4\x01m\"\xad\x99\x89@u\x04[\x95y\x13\xd8t\x85\xa5ZL(\xf6zvGC(\xee\x86\xb0\xc6\xd8\xbb\xdd\x887\xe9\xd54\xbab\xde)\xcaS\xa9wc\x8d<\xd0c\xd8\x00E\x11\x1d\xed\x1c\xd8\xe5O\xea|\xcf\xfe\xf0+!\xa5\x9e,(\x1c7\x80\x0e\xe3\xab\x8b\xf1\x8dS\xee\x005G\xc9\x1c\xb1\xde\x82\xfe\x02\x80\x0eY\xd2S\xbd\xc1\xdc6\x1eA\xc4\xc3d\xcd\xc95e\x86f\xdb\x9cY\xd3OO\x80\xa2\x188', 0x7) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x1000) open$dir(&(0x7f0000000080)='./file0\x00', 0x26ca00, 0xabc8d76f123c6d46) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x6) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) clone(0x32850000, &(0x7f0000000080)="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", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="a3b2868d4df630a729e2893cec07115208905482030bddb363c0bc18ec802e182288744db9") execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x81, 0x6, 0x3, 0x0, 0x10000, 0x81080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1667fa26, 0x4, @perf_config_ext={0xfff, 0x101}, 0x10010, 0x9, 0xd2, 0x4, 0x200, 0xc0000000, 0x8, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5) r2 = gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x43, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'}, 0x30) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000340)={0x0, 0x100000000, 0x8000}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000440)={{}, {@val, @actul_num={@void, 0x100000001, 0x45}}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000015c0)={0x0, "5d14c3c88e62a750aad979eaecc04692"}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000480)={0x1, 0xffffffff, @start={0x0, 0x1, "0a5e8763b9963f376b00cf92e1f7bbae60cb9e8081867c70b297b585e5eea5656b3854eaac5686041dad90ae0c4d4b374711995ee6930973c1617fdc784344f86a10685f8e8c7a37ceb4a293e60feecd2477d3b3c57d5d9bee80d03f9dc9d5329a05646f4e8305caa605b64d80d5084148a22c0a1e65b2e65ee4540e2a68adcaa69205fd6b47504888a954f211d9fa369908416fb098d23d0e3a6733fd96ebbaec6a75a20f4ba4348d0ece82a6d1d39842b9a301a035068f01f53bd31ce6cd545635442aa17c23e94ff3a45e466f3020cc3f15446b7cbdf00995b37ad69a91ec7177e9d772d7895ae46d259f0f1a3cfbaa392369d73352c7a8110e30bd301e1a192d88749ad58fc95d41fc675142713e3bed1841e6011bf7f49e216754c98172c7d6fa36c3cbed3b5718834824121821a0d638d1a80eb2446ccd5ba2edbe24d75ef7a74a7d7ac52cad8ec4f7fb6bd377d948c252666ba0710900bf9b15436c93a1b1401994ac8415610d466755e599b03db0685368e65eb8f61eda90efdcec01b1b27315aa34913c81d4f62e01cb89ab80042cda1efd2ce290d1c4eb153d29e45d63d906449c6e2b43f18cad00f85b3570e90ccaac81b2a422a503ba37804cdadf5ffd0e1403e56c5ab1e3a55e2fe4c32cabf991cc1759a14def25e6832ef21ef2d2a09db844eafc21d1f271061664a3d74541bcdfa891ca0c12276db7d57770e9e783f33f59754171be2ca2d8081c09518afe2ceb46c7765af4b469b67e08932022fd1865dbd00459f5d15093dc43293f91accbb137b16771124dc4457a899f56c3388378b8e0fbf2d2a18b2ece0eba951d0389bcaaa51f5a0fa189f13934ddd661ab7ce9a5a20c72d992a092d0f1cd5f3f32c2a0111c36ad16932b56fb4b05e9919b14a9efea7c6686cde6dd3a1434124b105aa9b3a8529e00b06f7146c4f3bce964ba669834fa973264aafb030b4d5c30169f83a2375cac14312976d62af53ad5595b4db14c58a9d9f2838f3fc1947c0c691b73c6e94350aec00d0e0cf98b5631a965d91c5fe14aa2e136bf7d658c26344251358b82f9378904ef07f1d0500e4de7500784dc1ed9db94cd3f8a6db9298ce9242846e87737ac914989a65d733e95b59fa80e2f176aff53fad8e69ed4d33567689423cbda990c6fa7eb24c9b5a128681ea33b9295d597b15cde827634d8792d0fb7cb7f880c01035ebc4de928e81e919e5e4b7302605676f2cb627870caefa3917d049c97aa9440e66a1342b9a35a76f58d8d4c744f315fb83d6e1debdb216343235c335749c129baa50212722cb9968ed56ee055e062f8acdb44be9d3b7e3cca25070a3dfa56cd7aed6897acff9c4aab4b08b8986af27c870f108668a6a228c141ac6a42778469e2607b417347f022145005036a1747dcc2d997b77a90820cc76205fff0b20e8df673e862c2f0", "eda4b7c5eac43605e76226413a1b1793d2ba28ffc3dc95cb4d8b644d19279afe270db243291a52f0786d6a8a1e382681b701af7c068fe5d729cb0491a774d220ad7e1fedab8b7e75bd50c8a1fbe2e548c734059ea7fd05683155f25f1b5c6d6d692d0cf14639a3db67d8563ab2e64a7de426c2cef714bf2d71d3f69893c707086c4e08f58c7be4d3c3ae3d824a5025282d3ef5bd869cf6a433c70e73af13a5dbfb03572629ea4d5789b3bca8902f4253387a8d3a6582ebeae6102195ffe7fb256fc8137c168df7604adf36f6ec315eeabc673f65affd1dd2825a156ff941b7d2b02c29d0c9456b471d74b053bf574accc7f857a16bc8b64e099d8b7463f43c736097ff962217b989fa7f36bef2069fbf28250063da1bedaddb12576016937665451f13d2d9b560240b0f20e15a82420ec5115103f1ea2860fc71f8c0bcc89d009e17e2fa1ee8c5a5558e582bc6e9c508ab2f785776b07b85668ea1d6eee333edcca452de7a3ccb44f39f0f1ceb058095b352a4449dd8822c82c44b94cf6886f28b143e2ccd4b0f981310a8cacefa309b2b3828a202fb23d0f78d63dfabb36fc963bfd4cb5538f8d426a9fbe6eddc235ca67b8b64272d4909a472dca5c621cea19fac7dee91db75b74d5e80ec84a278782a0c5fbe10567461748c98da506227eb7708dc8e970eb55b419f45f0915d84da2ee4837392f2ff10492fe7dc0d55e6203aa74e380364749292c73bc7f2a0bf627a6ad4faecf091a6f2912b365b3db1eac7e0be6a5556a2fdbd627bfe033f55b811b0628b564298c0a04c8367d27c979213c97b694bceac02f8b4eb8942c88f00059d079508acdf398db750482b0170b3ac63f5621badb563e88dd0dbf2067706a7f5a316bb0f0719cf57ed28438603a8a36695cd5eefc8fb9aec4e6accf6e93df43b9144bbb322386318a2503fa11bdd1a4b25d42d8071e120bf2e5ec190fb36fd695e7cc85aa12a2a190817435a498d89b36cd29eca08b0e1faac8e8c109fb3c8617b74025009e78b44f714b38cabe5c73302ec39f52a370fb10fe32a768a542a6cc6622a8db3e8234f13f504373880dd860aac5ee04a88c406d7770c50a81f9ac8e2b3bbef4e5aa2b45c3baeeec62f2b8de6eb88e350db8628871768ba276e5206466d6873292558d2d2743fba1106e43a812bd0c18ab53550a042bf1d485e8a6b6ae731021cb5a083284f7d7f3bf09705332aadc236d9b8c476434ecac098d9adc6cf7e095b907640eee66f696cbd25bbc77dcc1b341229ef3947ab8594c9b9f46a86b78650c56d93ac0b3369f68755d735b02c815877c6bc44683a05aac60d92a39c84a906d86fc1961c41f57dc8db5048d8b8949e94ca3935f31dc4f0fddf2df809aa21f78a752d8f7cf712032ac7068d48bf11e91cf7340ec60ee428d61ef0d505e85dc621c57390ba979a3fee14"}, [0x94, 0xffffffffffffffff, 0x6, 0x5, 0x800, 0xffffffffffff8001, 0xac, 0xcb20, 0x9, 0x9, 0x7, 0xffffffffffff7fff, 0xfffffffffffff001, 0x4, 0x4, 0x3, 0x4, 0x5, 0x2, 0x6, 0x7, 0x5, 0x101, 0x0, 0x8000, 0x2, 0x0, 0x20, 0xe2, 0x9, 0x1000, 0x6, 0x4, 0x1000, 0x81, 0x6, 0x3, 0x1, 0x655, 0x4, 0x100000000, 0x7, 0x1619, 0xffffffffffffffe0, 0x4d4, 0x17, 0x8, 0x1f, 0x5, 0x5, 0x9, 0x7f, 0x8, 0x9, 0x81, 0x1, 0x0, 0x4, 0x7, 0x6000, 0x0, 0x0, 0xfffffffffffffffc, 0x400]}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000006c0)={0x0, "6f854baf87aa642c14ae3970888b58ad"}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000002c0)={0x0, 0xefe, 0x1, [0x800, 0x20, 0x9, 0x800000000000009, 0x80000001], [0x7, 0x8, 0x81, 0x8, 0xda8, 0x872, 0xad, 0x2, 0x4, 0x1, 0x1000, 0x8, 0x7ff, 0x6, 0x9434, 0x7fff, 0x0, 0x1, 0x3, 0x1, 0x100, 0x9, 0x61e7f386, 0x40, 0x1, 0x5, 0x80000001, 0x87, 0x3f, 0x672f, 0x1f, 0x0, 0x2, 0x5, 0x1, 0x20, 0x2, 0x1f, 0x3, 0x9a4, 0x6, 0x8000, 0x5, 0x10000, 0x5, 0x5, 0x3, 0x9, 0x3ff, 0x4a, 0x7f, 0x2c, 0xc3, 0x8, 0xfffffffffffffffc, 0x9, 0x1, 0x5977, 0x3, 0x6, 0x6, 0xffffffffffff7304, 0x1, 0x2, 0x550f, 0x1, 0x8b, 0x4, 0x8, 0x5, 0xe75, 0x6, 0x4, 0xffffffff, 0x6, 0xffffffff7fffffff, 0x800, 0xe9b, 0x4, 0x2, 0x0, 0x35f, 0x1, 0x72, 0x4, 0xfffffffffffffffd, 0x4, 0x8, 0x20, 0x4, 0x200, 0x3fffffff80000000, 0xc82d, 0x1, 0x5, 0xffffffffffffffe1, 0x10, 0x1, 0x4, 0x2, 0x19d, 0x8, 0x6bf2, 0x6, 0x4, 0x20, 0x7fff, 0x3f, 0x6, 0x7f, 0xfffffffffffffff9, 0x1f, 0xfffffffffffffff9, 0x2, 0x1ff, 0x1, 0x1, 0x0, 0x2, 0x8]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 5: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x8c, 0x3, 0x8, 0x801, 0x0, 0x0, {0x1, 0x0, 0x1}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6b}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xdacb}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_UDP_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x377308ec}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0xfffffffe}]}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @udp=[@CTA_TIMEOUT_UDP_REPLIED={0x8, 0x2, 0x1, 0x0, 0x80}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0xc, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7ff}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x886c}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88e7}]}, 0x8c}, 0x1, 0x0, 0x0, 0x8000}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003c40)={'veth1_to_team\x00'}) flock(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000003c80)=ANY=[@ANYBLOB="07000000000000000200000000000000000000000400000005000000000000001f00000000000000060000000000000005000000000000000000000000000000000000000000000003210000000000000000000000000000040000000000000000000000000080000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000400000000000000ff0700000000000000000000000000000000000000000000000200000000000000000000000000003e0b0000000000008000000000000000fdffffffffffffff0000000000000000000000000000000000000000000000000000000000000000b30600000000000002000000000000000800000000000000000000fb0000000400"/303]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000003ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003f00)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000003f40)={@empty, 0x2, r2}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x200000, &(0x7f0000003b00)="954d2203f8cdf6925354e929af71", &(0x7f0000003b40), &(0x7f0000003b80), &(0x7f0000003bc0)="eebd17b993e592b309821aade15c0d40e2ec8cfe39ffb2b713564d9100616e1e6b0e274380fdb9b6ae5824e25b4bf6856a8e362690e8afddeea245206d41a3eeec") clone(0x80000000, &(0x7f0000000200)="1d40281d101d152d89feef569751a5a3ee816c75da64fb0968", &(0x7f00000002c0), &(0x7f0000000300), &(0x7f0000000340)="ced1f9fe50475188f1a6122ce189f0fb6667b48483a7297a270b527eaa2e0cbb8d9ea3b6faec4cd512a042a65a5a2bfa2bfbfc21ba913ba713d4c41c6ee9be17b0bc936c55fc1269f72a86e147d9b36cfce2b649feffd24e73574ba85ce4bf714f908e80c16bd73ec2e2cc009566b161e71185fbe78e09d8e4b3dee5f100c198ab") sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000003ac0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000003a80)={&(0x7f0000000440)={0x360c, 0x0, 0x5, 0x3, 0x70bd2d, 0x25dfdbfb, {0xa, 0x0, 0xa}, [@generic="07ed4f4ea496ddf9d4f3e865c68ab65b99c22a885140b5ad957588a3f5dd3b54959dd12a0446981894acf7158d1208845c6aa3a2ea08f5cf3ad03c847da38d824dcdd00ba862e2764e12f9601c4d2a5f8235b9bb6934d1b60ac99aa02f43b37c372e299b7f29", @generic="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", @nested={0x11de, 0x42, 0x0, 0x1, [@generic="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", @typed={0x4, 0x7e}, @typed={0xa4, 0x8e, 0x0, 0x0, @binary="0226d90f8f48dc5fd8852fe670e2a408ab94998d055e31cd556c8468b271ba0623259a3c448e41c441a2ee268e05fdf21e767e6262debb27f4e3adf268e1ddf9754080329248a184a23c9ae5d5936ea1ca8dd7162ca638a2a41f9157e6c9121ef7bc255da1af7305162dca1a720c063e047a42d3368287c9bacb6ee002932401b5ffaa098e982e5e02ceb7c842a54abed40e344268e6946392c249fb136bbe43"}, @typed={0x8, 0x1f, 0x0, 0x0, @ipv4=@empty}, @generic="3e0925ef5d5c8f1dc9dd43507b44648d856ce9451c7f8ba06588d1ae669b16d6066199b4eff28cf6cfec7b8f9e3d797ef420d6a673675a25a5ac24cd680bc18b59f51f2140a0a26e008e1c20af15d0", @typed={0x47, 0x75, 0x0, 0x0, @str='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'}, @typed={0x4, 0x1c}, @generic="7958d6ec7774d200cc901516e3d268e056bf3d66c006217c256af1e2c12b026c786ae3df2671e7984d970b2e0a431c40be81a80a46a4a74eef1cfb1350d3b1ef1e2ed22e47dca76f64bb3d68511a7f0d6a69b84b15e4df1cc082a1460fb2beef0f5144cfc50e0cb8cb4694af6d940b38e7fa98b4f11a5b06de1bd2b77a5ada28dbcbaf3024155591b9753e340a5d4a"]}, @nested={0x1088, 0x38, 0x0, 0x1, [@typed={0x84, 0x28, 0x0, 0x0, @binary="f9e851b874566e827dc13eeaafb3b9e0d5449aa6cfdb05905400cb9acdd67fcd0be0b470ab099ef8663e433aea2ad37ca57b96eca8a2d9b713f77fd668b626675178f7bf101f7f972b854ffcc3e316d283f33982d0f83e33557e86a49d695c0767c6ef8a4f77d2d7264777b3e8035099aaeaba42d97ef569f07eb76b9ff82e6a"}, @generic="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"]}, @typed={0x8, 0x1a, 0x0, 0x0, @u32=0x4}, @nested={0x79, 0x4b, 0x0, 0x1, [@generic="f64231da75d369604320198ad8c45045fffb8b4d099a96879d6fc0e6e882769bec593b60c1763e0eb3c17033b1d68c14195fd2929f89879f8bd239c7edad7f623786743ea86c8f9d513aa7b3180ec10a6adcc087e4615626c4c6da38e256647694cd98ed9a32944affe94b37feb89e6d21bed8e8e7"]}, @nested={0x2a4, 0x64, 0x0, 0x1, [@generic="b481502e77137f5b8320a76d989c58309e0def8a56e913a07ccf45f8778ab4f6e981326cd60dfbcd7796a0a537bb139223984fb4c8d2ffbe0764c2240112bb4fbf2e6bafa2674b78d3c4968b994001d2c7e08f1d9322c8c27ff163cf8b5e5d270a1412401f00", @generic="69193ba35f77ef31a9a96a9b7890ac5e80aa9b24ab2b758e42035f7a7eae89f8bcea15a0043347632a1a04450bb119cdb93d5cda6fe4f8ed81755a307ca01a2db63f9b18ab45deb5e3abec462b6c9611bbc1f06c6d71c3820b0af15fd3ba0f2ffc9e2d92308497485830429c3c6efe5b5f9442711b3b42af31740d1d55d5710c7bf8387737ff3ae7625e19bba8fde8200b1b6b88cc0db390829baf17cf066d7bb6cac1496e582143be9e22401bc9d684e7c4a3e469bd18f745dba2", @generic="cbfdb1f04875ccc1428c6306962ddaadb33f091af9dd985cde8f580611a9ccfc4a2dbaba4278195a9ff919d73cedbe9422822bfd370b4c620cd2439ecdd4f7f361062fce0a34bb4fe9c29939fd37cb1d3b131771e4006323beaf8e3df86c337f14b9a6642bb8980efb5eaa92635ff48e0cb37288281e62dc0680de4ddc3d7fe270548c54c31118e9b1b69aaddbb283f0a146fede3f110fbe5224d6731cbc75a577235a6ea729749a6c6e07934281b7f5012ca4f2e15f6ca55700a89b515c2715324fa15f90cebf25d5d836cfe4ce033d58e7a7685174d7f87578f5", @typed={0x8, 0x94, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x14, 0x65, 0x0, 0x0, @ipv6=@mcast1}, @generic="16c4b0e00fd8c9f334d7988e52a1636b4d1f6f1e09a17c29e531307346bee06367f3d6d663efe264d96551ad2ad9d2c68036d3fbded9d75d19eee09e5ad7c9527f0f204a484f506d1917432a9895d3637d011ac1cdf4b7e89770304b284694e8b2396af406100b339995d1b4bca9a013f64756fe4305ca6cf186797ccb663d74e8cd2ac95934cbaa"]}]}, 0x360c}, 0x1, 0x0, 0x0, 0x4}, 0x20000881) r3 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0x81, 0x6, 0x3, 0x0, 0x10000, 0x81080, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1667fa26, 0x4, @perf_config_ext={0xfff, 0x101}, 0x10010, 0x9, 0xd2, 0x4, 0x200, 0xc0000000, 0x8, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xd, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0x5) r2 = gettid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r3, 0x0, 0x43, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r'}, 0x30) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16, @ANYBLOB="a5002bbd7000ffdbdfa06b00000c080002149ae1b57c95a5296b00000080000000007ec3127c8201609150ddfd000000", @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f836eaf0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001bc0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000340)={0x0, 0x100000000, 0x8000}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000440)={{}, {@val, @actul_num={@void, 0x100000001, 0x45}}}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000015c0)={0x0, "5d14c3c88e62a750aad979eaecc04692"}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000480)={0x1, 0xffffffff, @start={0x0, 0x1, "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", "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"}, [0x94, 0xffffffffffffffff, 0x6, 0x5, 0x800, 0xffffffffffff8001, 0xac, 0xcb20, 0x9, 0x9, 0x7, 0xffffffffffff7fff, 0xfffffffffffff001, 0x4, 0x4, 0x3, 0x4, 0x5, 0x2, 0x6, 0x7, 0x5, 0x101, 0x0, 0x8000, 0x2, 0x0, 0x20, 0xe2, 0x9, 0x1000, 0x6, 0x4, 0x1000, 0x81, 0x6, 0x3, 0x1, 0x655, 0x4, 0x100000000, 0x7, 0x1619, 0xffffffffffffffe0, 0x4d4, 0x17, 0x8, 0x1f, 0x5, 0x5, 0x9, 0x7f, 0x8, 0x9, 0x81, 0x1, 0x0, 0x4, 0x7, 0x6000, 0x0, 0x0, 0xfffffffffffffffc, 0x400]}) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f00000006c0)={0x0, "6f854baf87aa642c14ae3970888b58ad"}) ioctl$BTRFS_IOC_GET_DEV_STATS(r1, 0xc4089434, &(0x7f00000002c0)={0x0, 0xefe, 0x1, [0x800, 0x20, 0x9, 0x800000000000009, 0x80000001], [0x7, 0x8, 0x81, 0x8, 0xda8, 0x872, 0xad, 0x2, 0x4, 0x1, 0x1000, 0x8, 0x7ff, 0x6, 0x9434, 0x7fff, 0x0, 0x1, 0x3, 0x1, 0x100, 0x9, 0x61e7f386, 0x40, 0x1, 0x5, 0x80000001, 0x87, 0x3f, 0x672f, 0x1f, 0x0, 0x2, 0x5, 0x1, 0x20, 0x2, 0x1f, 0x3, 0x9a4, 0x6, 0x8000, 0x5, 0x10000, 0x5, 0x5, 0x3, 0x9, 0x3ff, 0x4a, 0x7f, 0x2c, 0xc3, 0x8, 0xfffffffffffffffc, 0x9, 0x1, 0x5977, 0x3, 0x6, 0x6, 0xffffffffffff7304, 0x1, 0x2, 0x550f, 0x1, 0x8b, 0x4, 0x8, 0x5, 0xe75, 0x6, 0x4, 0xffffffff, 0x6, 0xffffffff7fffffff, 0x800, 0xe9b, 0x4, 0x2, 0x0, 0x35f, 0x1, 0x72, 0x4, 0xfffffffffffffffd, 0x4, 0x8, 0x20, 0x4, 0x200, 0x3fffffff80000000, 0xc82d, 0x1, 0x5, 0xffffffffffffffe1, 0x10, 0x1, 0x4, 0x2, 0x19d, 0x8, 0x6bf2, 0x6, 0x4, 0x20, 0x7fff, 0x3f, 0x6, 0x7f, 0xfffffffffffffff9, 0x1f, 0xfffffffffffffff9, 0x2, 0x1ff, 0x1, 0x1, 0x0, 0x2, 0x8]}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 1: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) wait4(0xffffffffffffffff, &(0x7f0000000080), 0x2, &(0x7f00000000c0)) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x581002, 0x15) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x10000000, &(0x7f0000000040)="80db6e7245e686a1134364c1c762a249ff4a2ae2ef60d42b4c98", &(0x7f0000000200), &(0x7f00000002c0), &(0x7f0000000300)="5887f2a33fafd7f8fd19835e722d0253b6e0b8deb2693acc5e6d3ba731efaa0787244c3db3633e8cde09da56c4b8fae309369bbb832090fbef7f0a3c78e9ac2c7977e3467ef6d8b48d07660bb64c026fb25ff3e3eb1b6b5ba9e6f68847dd3bc099bcbee9be4793364e22e1fddf62fda75f52dd55cb2afdc3590996d8d97dbf7b9a8ae8c6c887391868dd4b511cb7") r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x18, 0x3f9, 0x400, 0x70bd2c, 0x25dfdbff, {0x1}, ["", "", "", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4040800}, 0x4048880) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r4, 0x4b32, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000080)=0xc0500000000c) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r5, 0xc0c89425, &(0x7f0000000100)={"7a2e12ff83693b10e0cbd41acd177581", 0x0, 0x0, {0x0, 0xd1d}, {0x5, 0x8}, 0x0, [0x10000, 0x5, 0x2, 0x6, 0x2f, 0x7, 0x6, 0x5, 0x8002, 0xb, 0x671d70bc, 0x9, 0x101, 0x4cdb, 0x1, 0x6]}) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1008000, &(0x7f0000000080)="626d761159b1ee5d61f4007152742a391961eeb04dd4b95d2174a7cafc4489771ab2069f34e70b87a5d42eba668d32ea9e40ea3799883a0e95d80af2180c40dc66b776a91d8ef4301d121eb4223612c662e70df0941cee0572ad5f4b", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="9afce6d1a1294ef83ebc06f1b77ee54f") r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r2}}, 0x20}}, 0x10) 17:16:49 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)=[{{&(0x7f0000000300)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={""/10, ""/2, @loopback}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000380)=""/190, 0xbe}, {&(0x7f0000000440)=""/218, 0xda}, {&(0x7f0000000540)=""/148, 0x94}], 0x3, &(0x7f0000000600)=""/244, 0xf4}, 0x7}], 0x1, 0x40000000, &(0x7f0000000740)={0x0, 0x3938700}) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) chown(&(0x7f00000001c0)='./control\x00', 0xee01, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(r0, &(0x7f0000000040)='./control\x00', 0x301, 0x82) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) fstat(r2, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./control\x00', &(0x7f00000000c0), 0x830020, &(0x7f0000000200)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@allow_other}, {@default_permissions}]}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r2}}, 0x20}}, 0x10) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x1009000, &(0x7f0000000380)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1600}}], [{@hash}]}}) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$BTRFS_IOC_SET_FEATURES(r4, 0x40309439, &(0x7f00000000c0)={0x0, 0x2, 0x14}) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x4) execveat(r4, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.518092][ T3316] fuse: Bad value for 'fd' 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r1 = gettid() ptrace$setregs(0x2, r1, 0x7, &(0x7f0000000080)="44f536e55ce28251f73b464d52897ec95b81b65c22828d08ab48fa50b55e05254863f3f6877f58b6d0e5e980978b791dff983bd91778c8f0fe18c19c3fbd6767a490d9c474cdbb5e969baa9a1b15c95f225a5a5d0a5d89fabce2b75c2e3a574b60473a39f7d3a3ac00f2fabf9d320ee50336cc69b46e1bb97dbb99ecb880a994657e73182eff00715653277614eea5d06a469837f28c25aea4c58a75e47f54af4c397384d3b261") execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x21, &(0x7f0000000180)={[{@index_off}, {@index_off}, {@xino_off}, {@nfs_export_off}, {@nfs_export_on}, {@xino_auto}, {@xino_off}, {@workdir={'workdir', 0x3d, './control'}}, {@metacopy_off}], [{@fowner_lt={'fowner<', 0xee01}}, {@seclabel}]}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080)=r3, 0x4) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r2}}, 0x20}}, 0x10) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x16, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="850000000700"/18], &(0x7f0000000240)='GPL\x00', 0x1, 0x348, &(0x7f0000000280)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff60}, 0x48) flock(0xffffffffffffffff, 0x0) sendmsg$tipc(r0, &(0x7f00000015c0)={&(0x7f0000000080)=@id={0x1e, 0x3, 0x3, {0x4e24, 0x2}}, 0x10, &(0x7f0000001540)=[{&(0x7f0000000380)="db141491ef3218fe6fb81c6843b0d6764d29beeb680f219132950b7b53b77a0f333c7f0baa484551f89a9e79d80ad1a3457a279cc44431aeb65870022b2a404fcfcf7a16b06a35907abe69a4ddf0ef5ec44c33faec6928ec04fac589c34dec8198a09fb7998bd2cf364eca4c7469c6b5b6348c7a84900fb4c61ee1ce1130856803b8158620c8a7c4e6db78a8ea6b0f64b20df98b13ab606dc8e6656f67f3eee2b1b4a2ff752a57ed4473860289ed45eb83b4f600e20a1378bac45b02b0afca7f157cd853d143e5161a0e32bcb260d616b92e8c4cbf30c8841d0ca36132d3bc76cd92", 0xe2}, {&(0x7f0000000180)="8ae9fe4d1e45e188589b0f73545d04be4518e27382a1f86d37b3919e6b0bf465cddec478cd19c64bb13e939951bd321fe36336108d6d3e9f5577395d5b1953075714933e92e0e0bdd1", 0x49}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="ebbbaff1726525425863b8c1897def79c81e9a0cb985458eec317cfe3aed42af87831dcb69eff414da02a826232451e47961dd73e6be2d6c9ffa134cb4ebaebccb2a586fa58dc0546a1514086774297b5b972f110bb72868e8ee8e081a366a14c4fb6e2aedfdbb2ef5057ae8598e0a46b748a1e3e5e450edd6bd2d7895fe1e47bfc0f25ae96879fa00b733c242d1d49515cf8147a2b5cdaf984c85164aef98f1814acfc0074961be646ab4fbbe30799a87f102d1f1c44286905b6d63ea302d", 0xbf}, {&(0x7f00000000c0)="b647636f564d889f", 0x8}], 0x5, 0x0, 0x0, 0x2064000}, 0x40000) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.624129][ T3338] fuse: Bad value for 'fd' 17:16:49 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) mmap(&(0x7f0000138000/0x2000)=nil, 0x2000, 0x1800001, 0x80010, 0xffffffffffffffff, 0xffffd000) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000136000/0x4000)=nil, 0x4000, 0x1000000, 0x2010, 0xffffffffffffffff, 0xd4763000) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:49 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/snmp\x00') close(r1) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:49 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r3 = openat$cgroup_ro(r2, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000000c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r') ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0xffffffffffff8001, 0x4, 0x4, 0x263}) 17:16:49 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x80000, &(0x7f0000000080)="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", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)="8694507263be674afe66eb8c0370b664aecfc6b8c1b188029f6d4bae64268ee2096c32d5b1355d717537ef7e2f193bc6bf7b") r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x4) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) ftruncate(r0, 0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.752058][ T3365] fuse: Bad value for 'fd' 17:16:50 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone3(&(0x7f0000000700)={0x4000, &(0x7f0000000080)=0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100), {0x21}, &(0x7f0000000180)=""/127, 0x7f, &(0x7f0000000200)=""/28, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x58) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r2, 0x50009418, &(0x7f0000000980)={{r3}, 0x0, 0x0, @unused=[0x7, 0x20, 0x1000, 0x4], @subvolid=0x800}) r4 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$BTRFS_IOC_FS_INFO(r4, 0x8400941f, &(0x7f0000000300)) openat(r1, &(0x7f0000000040)='./file0\x00', 0x4000, 0x118) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x99\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\rH\xa5\xd8\xce\xdd\x9btBkA\xa0\x9aT\xbe\xe5G\x93\xdd#\xc2\f`\xd6\xe2O\xf9N\xb1\x98\x02W\xbbe\x9c_\xf6Y<\xbe\x9dN\xa3\x14\xbc\xd5\xefd\xb0\xda_\xc16\xcbO`\x18\x02\xc9\xf6\xf4\x95\x9f\xe6]\xa0o\xec\xf4\xe9\xbe\xff\xe6\x1e\x9a\x01,eB\x1f\x1d\"\xf3s\xd8\b}!\x84\xaf\xf4\xa2#,L\x84\xf1\xbd\xd9\x1a\xb0\xd3:e>\x8aV{\x87m\xabAE\xce.\xbc\xa4\x1e\xbe\x89\xe1P\xe0', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x0, &(0x7f0000000040)="ed19277afd434e8a010e4def8d", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a232e9ba3c18ecd03906ac29674cfe062ea64f8f518d84fa3276e37f70e0ad90473a018d2752ee6e42c3d67ad2f03c260ce6c93fece34145226ff9b2bccf56b92da016b3955a1a83461a47e878263e4e80b8a63169aa51e70c4b67d8ad6d6701ca2ce4a712859985468d3c353388cb55b8d5fcdec6d9b65a46a5e97dfacf008c3a967a7c56a2750e023efe6ffbcc74eef0f93549f10c3be6117955") r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000200)=0x5, 0x4) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) sendfile(r0, r0, &(0x7f00000002c0)=0x6c4, 0x100000001) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x1000) clone(0x11000000, &(0x7f0000000080)="4c5a09f3d18342356961c02c54951d83c94245c81f70922c06c64f6e843e71185480f16e589a8583fd3260e12b10684a27254dad21a24444d7b2830577fe3c13a07f95127f27b93ac8eb938651820468a97d51cc27a0d4103d05034199e4db5a85416985eea406169abd77a2eae93b0064c74b476f8e7f4be380622c", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="f9e6706e94567b0c9d97b0cda9822f470807d1fa01d6d6e53f0a1ea3293d003492825648861ef370aae7d16a5ab0b5d58cd802aff5706c79e6655379247afb50cab5332009b48b58260a388d4e1dbefe066861eab43cdfeb354338511069d2b5") 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) [ 120.863450][ T3398] fuse: Bad value for 'fd' 17:16:50 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) io_setup(0x3f, &(0x7f0000000080)=0x0) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffe]}, 0x0, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r3, 0x0, 0x0) io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0}]) r6 = perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r7, 0x0) preadv(r7, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x3f, 0x6, 0x4e, 0x3, 0x0, 0x1ff, 0x18021, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x10121, 0xbf, 0x2, 0x1, 0x7, 0x1048, 0x8, 0x0, 0x9, 0x0, 0x7}, 0xffffffffffffffff, 0xffffffffffffffff, r7, 0x2) r8 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000040)=0x7) execveat(r8, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x9d, 0xf8, 0x6, 0x20, 0x0, 0x1000, 0x10402, 0x7, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_config_ext={0x100, 0x200}, 0x800, 0x4, 0x7, 0x9, 0x1, 0x5, 0x3, 0x0, 0x2}, 0xffffffffffffffff, 0x3, r7, 0x0) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 0: clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000080)=0x3, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474dfd42a, 0xb4) syncfs(r1) 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) clone(0x40000, &(0x7f0000000080)="2d85b48a973d128e7fdf2bb9ea15bc1d963cdaf48dd1075f5ec76c00b9a057bc4a6be21bed28c772480688827d7f1b789609347b0d9fc616ef63a9987de8b3dd514149ddcacc2832c0c1b3c21b80ae275b2436aaa3bd22d2986ae35c228f47c65b04f0515174ae1376de14666773ee6e39f6854d5942d89d8b1e1829ffd8c1d49d6739a135544d36ef3a6e71475bc07e66afdda2b3d04f0a439b5d8c5ad47f41ac84067f242a374f9f80557c937b016b75f3d1b8c6a7e65540f442", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="270f46b27d3f1db10621dd3b7441c8") ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 120.955134][ T3427] fuse: Bad value for 'fd' 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0xe4800, 0xc4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) flock(r0, 0xd) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 121.042890][ T3445] fuse: Bad value for 'fd' 17:16:50 executing program 0: write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000140)={0x2b, 0x4, 0x0, {0x0, 0x1, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) flock(0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x34, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x111, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5}]}]}, 0x34}}, 0x0) sendmsg$NL80211_CMD_ASSOCIATE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)={0x1ac, r1, 0x800, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x80000000, 0x7a}}}}, [@crypto_settings=[@NL80211_ATTR_CONTROL_PORT_ETHERTYPE={0x6, 0x66, 0x8100}, @NL80211_ATTR_CIPHER_SUITE_GROUP={0x8, 0x4a, 0xfac09}, @NL80211_ATTR_CONTROL_PORT_NO_PREAUTH={0x4}, @NL80211_ATTR_PMK={0x102, 0xfe, "1ed6e28271518d689788551dd524d8779a3ad1ff414698450d6cd0c8bcc9bf89586dc65b1441f3926b2489e802df60f0a8fc84c44d753bc436e84b1bea6a42e8b0037065aa6668e270f976347b3e0dc767956c3dbd821f1d0d58f9bb5bec2df525558ad1c711e170651507324e4e7d6d6c3b21c40ab4ebf910cfc5caeb4262f12ea97697dc26c6b807f07b1df694b6d0fc422f8b86f49f7bfe01efe1024622b0729c6259174e834fe29e74b582272aa4b6637449a57f400b1769b92da19b467eaae92bacadc991132f5046bad44a2c124798cfc3f4420c79f482661a0c8d6f3d01b74eec0e95adf7c48d0f677c73b112e6000145af12c08f3d8a749428e9"}, @NL80211_ATTR_WPA_VERSIONS={0x8, 0x4b, 0x4}, @NL80211_ATTR_SAE_PASSWORD={0x3d, 0x115, "8e3530d98106ddaf36590fac2c9e73b868444229f92b8fef610fc318f109bcdae16f5fab27d9b3e7eedb9a3b733cd99958203b0c5df71f3ecb"}], @NL80211_ATTR_HT_CAPABILITY={0x1e, 0x1f, {0x20, 0x0, 0x4, 0x0, {0x1, 0x2, 0x0, 0x4, 0x0, 0x1, 0x1, 0x2}, 0x400, 0x6, 0x4}}, @NL80211_ATTR_PREV_BSSID={0xa, 0x4f, @random="85f0c4320fab"}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x8000}, 0x20000840) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)=0x4) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x40) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f00000005c0)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r') clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000540)=[{&(0x7f00000000c0)="54f32bf3fee5264edea11028da5e22b9cfaf5aa5b9a252814a709506256d22aa04c509812d3611304485a5b26150a03b3d0efa3735c136ec9903353a497a0beff14f8042faa6849ef3028046611ce236f6a2e107739e430db29fa6c4dd4d8b453f3233bb77b226856b56c81e8e0147307c3e54d68f8b410f332db106b29cebe38c0bf832b3fd261d7958a37234d56b6440e689ef0f010a0621b6e13efc77f60af7bfa316b507d6d9dba513dcd2ff74ac120c5f6915e46f526ebfd69289747a429353", 0xc2}, {&(0x7f00000002c0)="42112ab70523778972cfd3693bf29a48fd51d635757a4f2d029cb60986b761a52264839c6bd21232a69e952f8b86e5f7f2138946ae863cc1d9e26a020965ab4116c7d5d2e6e6868042d169913ff5959b47d60232ecf4f86103a4ebf599d13592f126b86bc8cf45bf7194ef7a330d53ed8b8def043247d02dd4c0c7c83eebd5f38fc47d26de9a4a0dcf4dbbeafede02e511ccc3693e526cfe4777393f39d414a594320ef390bdf0ff0ef057eafa2b69a3d66c2289e5253f895f04cbe95040", 0xbe}, {&(0x7f0000000380)="0b639d081230ec28124fdcbbb09335a7d800d1cb1d0606d6c4b4c82fb17a43331308f5aded2bc2ef621aa1c72c47631911c9affda5b50f2a06d53ad1429ce0eacfd00ed10fa369b12af4b3f664be7e52c3e1ff56f126498b7d319d823fe56ab0fecd0180a97a66245954cf5b6a7d5d814cdbd1b39c4a30a721fb6a2ebd7b182b3ec2f4df01d2c84d9be4f3e68f54878795782f05fb178cdfa6c6904ef8372d9cbe4fd2596e6a5d4f048a9de9a62a522631f055dfa7e14594", 0xb8}, {&(0x7f00000001c0)="70dbcf2fdf8849a73fe3893fbe38c373de11de29f14a75ed3db8e6930692a2", 0x1f}, {&(0x7f0000000440)="dce80b5faa6579672dca210046e99adf8db6f8167d7e8996e25d21b8f41cf47b59a0b506b1a82f98878f2a9b42d9e48876e855a5a466d3425baaf817049f5dfdab39b945cb0252127e23e90dba57aa3625198640c6a79c72cb784d34a24dd583a4fa899f7d20781b34b6575b83138ea7d12821fa03febfd8c1405495b600ac2918bca5703c39a2c826fbb5efbe1827714fe774b72083e3bfa6f25d2e501372722084335b2881e5906e49a4543307ca98d25f877eac81ca718a47438f2e38f2104d9699b14d7d537c84895bb3100183e841347f72f3c54da89b6cfa060d11554a4c4db7a9cd5c27f1d988e429ffd9a556d3c1", 0xf2}], 0x5, 0x1, 0x9) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:50 executing program 5: prctl$PR_GET_IO_FLUSHER(0x3a) flock(0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x20300, 0xb0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x40402, 0x0) wait4(0xffffffffffffffff, &(0x7f0000000000), 0x40000000, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x100) prctl$PR_GET_IO_FLUSHER(0x3a) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x400) 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) [ 121.163274][ T3469] fuse: Bad value for 'fd' 17:16:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82001, 0x9, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x6}, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x373, 0x0, 0x3, 0x0, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x1) syz_open_procfs(r1, &(0x7f0000000080)='net/ip6_mr_vif\x00') clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000002, 0x4000013, r1, 0xbe37f000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f0000000180)={0xfffffffd, {{0xa, 0x4e20, 0x5, @mcast1, 0x9}}}, 0x88) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0xffffffff) r3 = memfd_create(&(0x7f0000000080)='(.[@\x00', 0x0) flock(r3, 0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r4 = accept$unix(r2, &(0x7f00000000c0)=@abs, &(0x7f0000000140)=0x6e) fallocate(r4, 0x44, 0x7ff, 0x6) 17:16:50 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ftruncate(r0, 0x100000001) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000049180)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r1}], 0x0, "dc66b42d73a84c"}) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000000980)={r1, 0x100000001}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000180)=""/214, 0xd6}, {&(0x7f0000000300)=""/187, 0xbb}, {&(0x7f00000003c0)=""/167, 0xa7}], 0x3, 0x34, 0x6) mknod(&(0x7f0000000080)='./control\x00', 0x10, 0x20) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f0000000100)='./control\x00', 0x0, 0xa8) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2000, &(0x7f0000000080)="4ef18213bb5c9d6aea4e278d084cf3d471c8bedb20e014acb06442d2828390fc7d2ad33d5e6f808a3fb4d06c85aa957c9b66aa48d3e30b041b0acaa7afc28d1abbd0c45df795359b08cdd7b5f2b52ab92487435d53d28c3d04ba27470aebc01c33ad707f61e3a4575fab2d3b65b3bef1644936d591f7f9a3a513e8dff19cfae02569e15d6405c41b3aeee828689312ce0e4955e0e844bc66eb5a0e58790e2409c6aa65e2d431cab9cacc2c48f6925ea701a12477eee32cb3026ee6f88d7d1a8037894c", &(0x7f0000000180), &(0x7f00000001c0), &(0x7f00000002c0)="57291787e70a1f4c9e057d73579583495b4794e59d11778e4780b07644abf245242d90a3df8ebe1a8229283f188d066daef98279364f91e0d7bb23a5de5b6f9eafbbe189b2717c667b850a0e6cff7d1f1f28ae2c575e89435484f73dfdcac6e176c5f32447e95e49d6401e14aa5a96cbb9cb81bc03b060e7c2a10cc7101efaede5831c7a1ba25f802ee8e14092c6d5469b9c62dfa1053f8c3e7a7fcd6f5517467dab86d9d8a02e402179be7f08501146d1fb02aefadcdb62873235c6e65be7d3c6d60a98122bd8a2f5ff6cc27b784b26c3aa448c33f45fa86dfb97c6be3dbb24c506fc68db70223c59") r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x40000000006) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = syz_open_dev$ptys(0xc, 0x3, 0x0) r3 = dup(r2) perf_event_open(&(0x7f00000003c0)={0x5, 0x80, 0x4, 0x7f, 0x8, 0x0, 0x0, 0x0, 0x1408d, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x2, @perf_config_ext={0x0, 0x5}, 0x42408, 0x1, 0x1000, 0x0, 0x6, 0xc0, 0x835, 0x0, 0x3, 0x0, 0x8}, 0x0, 0xa, r3, 0x2) [ 121.264726][ T3489] fuse: Bad value for 'fd' 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_io_uring_complete(0x0) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r3) setgroups(0x1, &(0x7f0000000000)=[r3]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r5) mount$fuse(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x800800, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x10001}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x7}}, {@blksize={'blksize', 0x3d, 0x200}}, {@allow_other}, {@allow_other}], [{@fsname}, {@uid_gt={'uid>', r5}}, {@fowner_gt}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000002c0)={{}, "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"}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setlease(r0, 0x400, 0x2) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x3ff, 0x4c0401) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 121.349732][ T3510] fuse: Bad value for 'fd' 17:16:50 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=@ipmr_getroute={0x1c, 0x1a, 0x20, 0x70bd26, 0x25dfdbff, {0x80, 0x10, 0x20, 0x7, 0x7d, 0x4, 0xff, 0x4, 0x1400}}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c800, 0x112) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r1, 0x3, 0x0, 0x200, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x5}, 0x20) 17:16:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r2, 0x40806685, &(0x7f00000001c0)={0x1, 0x3, 0x1000, 0x12, &(0x7f0000000080)="cbd6526a5d26e914efd0b65d731098a41b7e", 0xe1, 0x0, &(0x7f00000000c0)="337cbf679d1a4f4fe843f081c9b5d82e354c3b536a7465788d9fe4c5f2bbb274ed890a61778454931c7c5e6b38ba771c18d5fa8c28a4df4585fa0b995cba20747b54fbef2a2df7b0f0577a013c80eaedfeaf7ec840af92f76b65c627a782dbaecfa848bb771a3b49b18ddb476dd3506a4d36bfe434454180c4b7271379a28a787f7f61c9e54affc836caa912b88dbc0cbef5eaea8f24a3c2f96998218248ac325de920c1a0a36500397a2aa7771ed89435c2590f6489af693906ad9f86058414cc288cdf8a7409118b4e85378a653fc76a4369c947c34b97908f7f3043b7356c7a"}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, &(0x7f00000002c0), &(0x7f0000000300)=0x4) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) setgroups(0x1, &(0x7f0000000000)=[r2]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000000)=0xc) setuid(r4) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:50 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./control\x00', &(0x7f00000000c0), 0x80040, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './control'}}, {@metacopy_off}, {@index_on}, {@default_permissions}, {@nfs_export_on}, {@lowerdir={'lowerdir', 0x3d, './control/../file0'}}, {@xino_on}], [{@smackfsdef={'smackfsdef', 0x3d, '.'}}]}) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) rmdir(&(0x7f0000000100)='./control\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r1, 0x8010671f, &(0x7f00000007c0)={&(0x7f0000000700)=""/166, 0xa6}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000200)='./control/../file0\x00', &(0x7f0000000240), &(0x7f0000000280), 0x2, 0x2) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) chdir(&(0x7f0000000040)='./control/../file0\x00') syz_mount_image$vfat(&(0x7f0000000300), &(0x7f0000000340)='./control\x00', 0x9, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000380)="b9eafc6375df41ed0b9939e6150820864196c4f8282512f62727e90291d71198a48492ea0f07cfced121de05526dd461aeba5613505e3064ee63b425d9f58836e05f0d88f5bf6905e38716b46ced610318cadd73edf306afe87657c37022beee29febb76045eb8f88f6c3ab62df927734b31f0efbb57cc01f58a33dee05283f84dd6aed8223e428400d37bbd59c74e454fcfcee8e83022709ecbd9912b52e786", 0xa0, 0x2}, {&(0x7f0000000440)="1f0705c409fc605f087d1dddf2b33afbf9ee8eff29b9caf87e76758ed8314d9f67185ffd79bde2b76562a026c2f76255c932c1fe58a68363c7aa94215696ebc252e69f5ce1d6fc89617aa3fec4dbebdef7b503a55407d2ed1ac9b89e884b4fc9f301afa307cc35d66311575c533c80495b62366d5a9da1f8ea2d5b97b581", 0x7e, 0x9}, {&(0x7f00000004c0)="fc2422cd032e8da38447b1a56240ddd8f2fa4339afa1e179edcb03c4de2acbb1984d26ee68972ad5bf10a470ed597d9e196b5ac97410394bc81a6a209f1eaa8d5b12121d965aed0a177251ce7dbd9ac4ec994392a9046ccb72f88e3d5c1e780edb871d16fdb3b7f9ef0b6d4b4ce3d0f7898ed4fc04b414eb6295622c1fc67f", 0x7f, 0xcf}, {&(0x7f0000000540)="13e870422c7add2d28fadb823813fd2636930e409c04a6e1de4f63a41864f110f1a138e4e7e31c2b80e7640bcc8073f9b41e3f1ad7d20f1938918ddfe1f5d39bfa4637d6f0665c994534de18c67dce8a822af88ddc3485b8391e214466fea67e107ff20e7acc918e4f53cd40", 0x6c, 0x2}, {&(0x7f0000000980)="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", 0x1000, 0xfffffffffffffffb}], 0x200080, &(0x7f0000000640)={[{@iocharset={'iocharset', 0x3d, 'koi8-r'}}, {@shortname_winnt}, {@nonumtail}], [{@dont_measure}, {@euid_eq}, {@fsmagic={'fsmagic', 0x3d, 0xffffffffffffffc0}}, {@smackfsroot={'smackfsroot', 0x3d, 'trusted.overlay.origin\x00'}}]}) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) setgroups(0x1, &(0x7f0000000000)=[r2]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000000)=0xc) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) clone(0x91020900, &(0x7f00000002c0)="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", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000540)="d40ff000f20e60907e3ebda04a69dca5e7143701b7f90054b3bded796274555f04b156f3b5d81d184817a21ab15edcd20273a6fd56c19372bb3b3d1a78ad156b801ece19a92603dfb67ea1b860759cf71ef05c2dd76f4fa5ea0071169b373b504ffeef293fae483ac8d372bfa231f1e6f5369ff6f18966303d80aaeb8c09d4e3a94c0a904d112d791233560cfe08679144b8d24e33600c84bdf54fedb674b956ad44062fc86e0a2ad6dd1d818cd6b9cbef02a9f5f108a09409115565b26be43c045d2fd4945da13be7fae49278c5ab11683f6f6746e21698c37e396a293c") pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="4145cc8cd26c3619513a889f96715f11e82c4ce186b1508b9a339e66cefd359394b8198c67a09822ce9845a0498dbfe5ed55283ccecfd0815308cf53b203529ac38b45474867edc8e13e744fd16e88d4c1a9a0c1d5bdf6f811318ce6e0b56b8d4e726b6e9cdb17e18fbc8ed3e98f8051cfa89be913da86d30ee82ffe869ccc18483b5b6ad8d3f848bb077b9d2e0ec042fe12638574149337cf8bba1261b8e645ba7935d6f8138d424e281579c417458e66beabc8682c0345e7e2798d29c03340e9dbc297d31ab80c6ad2e50d4603682e1b", 0xd1}, {&(0x7f0000000180)="12bf2695d9959818e87efb7a571448771fffb4027156546f22b85efc739e17eddbce1994e26a551c657abf11287d60a3f666b050dbadb3de07c05326655fe630e44d5c8100b7cb1cd0ed6f5ac166f0b7", 0x50}], 0x2, 0x7, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000480)={0x2, 0x10, 0x1, 0xffffffffffffffff}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r5 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f00000004c0), &(0x7f0000000640)=0x60) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f00000006c0)={0x4a, 0x0, &(0x7f0000000680)=[r1, 0xffffffffffffffff, r0, r2, r0, 0xffffffffffffffff, r3, r4, r5]}, 0x9) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000700)=0x4000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0xa, 0x10, r1, 0x60b2000) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000240)) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x281}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000040)=0x7) execveat(r2, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1100) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) socket$xdp(0x2c, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sync_file_range(r0, 0x1, 0x4, 0x1) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) setgroups(0x1, &(0x7f0000000000)=[r2]) socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:50 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) [ 121.540672][ T3543] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value 17:16:50 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) clone(0x40010080, &(0x7f0000000080)="573bb27652c39d9bd8c1c9b4f004dc45b1e2", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="d68b04d0f57fe0a5f1fe8ffda03bdf5e18bcd94ba6b06f57e31aa792c178b1699dc381e1830a0977ca23ab080da86ac647b3d5a812dc8d9fc4857f185d9524df21f4f9e4730178da27ddeb975cd1c08c6a7ae3c7657a695cd39990589394026755cd25fc985364c82f9884c9ce3c94d22083a56d28ed120ff3a74fde7fef70eb2cc6bfe4393a643a9197527c3b27cd608e92e4363c0948fcbbbc332b2f62041c5d40a11816a31c8f4fc868842fbf98025005594dc7a135ac4fca6bbe55a39498c49a2841538cf85be83b") ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) flock(r0, 0x1) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 0: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup(r0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) clone(0x400, &(0x7f00000002c0)="2394f1a75ad6769029579ff7ea85237d071e7659e5de62716cda8f6f1d3b34181ef12e96e297b250c56e3d1c6ae2be336ca89ca5a0fb866e96a0bdfbb9dcea127bc22680575c417bfe2581ad671638b0b512d54b113e96548926cfc2fabc18990a5b3ff290caf100bf577eab96f55edb31288fbb26dd924e0a7d483a8f2dea52c4392ebe531bd493b24bc5a083e9f7ccf56ead049e5d03446a9284821152f058dfa437337ad122a353888a143c", &(0x7f0000000200), &(0x7f0000000380), &(0x7f00000003c0)="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") preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ftruncate(r1, 0x2) clone(0xa000, &(0x7f0000000080)="9b2aa6d2b2844df37a6ec7babd52fb5ff9de1d9fc5aa15ac15d5c0a492fe44224806904419167298d1c078913151302ff4d95d13955ac50e2d5ad7ce942ffb86982cd921fa0f519b05dc48f06529723507590508fa2c051e79198e827b156499a9329e41ebd94ba08b23f5a38ae1fc064b1faec4b25e59491df97fdf2dcc69bbf4b513b13cb1cee436cff7c9fe1dde193bf788a7792bca4d", &(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)="6333c9b565ea43444cfe96e917d531e198d8701a8b2f00fef237af7aa4d178b2d58c2f2541337982ef065ffdb2b4cca1cc541e7d7068a4523819846dfea8") ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:50 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) setgroups(0x1, &(0x7f0000000000)=[r2]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 121.660179][ T3570] FAT-fs (loop3): Unrecognized mount option "nnonumtail=1" or missing value 17:16:51 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chdir(&(0x7f0000000480)='./control\x00') chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000000000000000000000691870000000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat(0xffffffffffffffff, &(0x7f0000000680)='./control/file0\x00', 0x80040, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./control\x00', 0x2be8, 0x7, &(0x7f00000004c0)=[{&(0x7f00000000c0)="f456858bab6e4f1524e9430f3e85557d7fc5a3a3d05d628faf5c519c9647f015cc88af4c2f4daa5b4bf222e515039b494707f2f9012cb9e567c10daa81d185777e16", 0x42, 0x2}, {&(0x7f0000000180)="df5faebe7afa48d3b5145d", 0xb, 0x3}, {&(0x7f00000001c0)="5d9b0390bdf720eb5e18724ed128a515cb5e0c447c93b43196a12383f5adcfd2e18116483583675d1f1bc8861e7ed9213662218591f0e36fa65752604e8a04424de28922a237302d116c1c45325bbf968bb91090e01e1ab5a8a0b8478c018898f7db70448e1c557f9998acd822b5a2b2dce595d2bf67e9d16db7", 0x7a, 0x6}, {&(0x7f0000000300)="bd7863c55934278230eb9081e34e0b16ae2cc78a489fceef821af30357c0bc410fe7771f88b8daac5c11529be27a43a68087883540bd523c243e91891559d25a681f1df0f94fff6f2f6d1b8c90b7b4dfef9eb70800a0ff83d93b3b644b6c86108a075a8b81ff95c3067efd1d54b480befdcc83d1166960cdb58165c1fd0bc9ba8121e91f5c3e23e62147073c480d26e9b73ab7eecb64e4b2d08b6488090c1fb91371d8750a1bfd38f18e05b46f2ce841095477787529f52661f183775210ae37", 0xc0, 0x2}, {&(0x7f0000000240)="82dda7f731fce08e951ee8c67a86c8da5b7439d991e50039e7e6a5836bc33a33f22e5f864ce18d9b8ba85202fc399ee77531e15378e704611ea7e0152f5070bf93c346adc436bce92c3ad4fbed5fb21ca351f6c991181423092d", 0x5a, 0x8}, {&(0x7f00000003c0)="d045f5dec31d779322d3e9d810e4e73f125b1f5db7ab90c1abf10a30a922d73b81069ac67f941eb9de73c5d1190222f940ea56896fd42c577ae456a8f426675679f37dfda2e86562fae34dfa30ecb3de62fb36b9cf7ba35f087d0f77289cf40c3c049789ab411a083fd79f68e500e2f44483d6b7989aa9bd31a84f84767ab113ff7ae7b07b2bf235bdaebb207cfc14fe65aa736c75", 0x95, 0x9}, {&(0x7f0000000480), 0x0, 0x8}], 0x100000, &(0x7f0000000800)=ANY=[@ANYBLOB='inode_readahead_blks=0x0000000000080000,nomblk_io_submit,delalloc,sysvgroups,sysvgroups,delalloc,barrier=0x0000000000000002,nouser_xattr,euid>', @ANYRESDEC=0xee00, @ANYBLOB="11ae626a5f757381b08e6885723d5d2c646f6e745f6dd06c3ad77bebdb83416f9f47c316ea716df6d5be5f2a754a7103d6b20b9810f0b5971933122224e790b250357ad9184ace8eace27e9b82275dc899b8e56f15625f10676e4d7a985be9b0502475fe8b4e3bde331d013c7c3c173a3c1f12c01b7c63c8c821f63cd4379660e25eefddd879beb7489a1f6b408e9a0813b75989fe244307"]) openat(r1, &(0x7f0000000640)='./control\x00', 0x20400, 0x2) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:51 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x7f, 0x1, 0xfb, 0x0, 0x8000, 0x58004, 0xb, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x1000000000000000, 0x40}, 0x40800, 0x5, 0x7fff, 0x9, 0x3, 0x7ee0e05b, 0x9, 0x0, 0x20, 0x0, 0xc840}, r1, 0xa, r2, 0x2) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r3, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:51 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:51 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x6, 0x2, 0x3e, 0x9, 0x0, 0x0, 0x1180, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fffffff, 0x0, @perf_config_ext={0x66, 0x6}, 0x4, 0x714a05, 0x101, 0x7, 0x7057, 0x6, 0x8000, 0x0, 0x1, 0x0, 0x800}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x2) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:51 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000080)={0x8, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:51 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:51 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x0, 0x1000) 17:16:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:51 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x2f0, 0xffffffff, 0x0, 0x1c0, 0x0, 0xffffffff, 0xffffffff, 0x258, 0x258, 0x258, 0xffffffff, 0x4, &(0x7f0000000040), {[{{@ip={@multicast2, @broadcast, 0xffffff00, 0xffffffff, 'nr0\x00', 'sit0\x00', {0xff}, {}, 0x6c, 0x3, 0x2}, 0x0, 0x90, 0x100, 0x0, {}, [@common=@socket0={{0x20}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x6, 0x9, 0x0, 0x0, 0x0, "629ba41505ae613e6264da61882f556cae00e2d90d52d5164a941358af8fb02d2f99d121e5d749ae62844efa841959858dc7e83358e62f664bbaf336f24c4833"}}}, {{@ip={@local, @loopback, 0xffffff00, 0x0, 'ip6tnl0\x00', 'bridge_slave_1\x00', {0xff}, {}, 0x5e, 0x3}, 0x0, 0x98, 0xc0, 0x0, {}, [@common=@inet=@length={{0x28}, {0x7, 0xb2e2}}]}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x1}}}, {{@ip={@multicast2, @dev={0xac, 0x14, 0x14, 0x18}, 0xffffffff, 0xff000000, 'team_slave_0\x00', 'dummy0\x00', {0xff}, {0xff}, 0x11, 0x2, 0x2}, 0x0, 0x70, 0x98}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x350) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 123.337097][ T659] device bridge_slave_1 left promiscuous mode [ 123.343358][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.351420][ T659] device bridge_slave_0 left promiscuous mode [ 123.357880][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.642412][ T3623] cgroup1: Unknown subsys name 'perf_event' [ 123.648952][ T3623] cgroup1: Unknown subsys name 'net_cls' [ 123.687814][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.694864][ T3623] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.703100][ T3623] device bridge_slave_0 entered promiscuous mode [ 123.710816][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.717863][ T3623] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.725214][ T3623] device bridge_slave_1 entered promiscuous mode [ 123.764799][ T3623] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.771857][ T3623] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.779142][ T3623] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.786274][ T3623] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.807992][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 123.815917][ T144] bridge0: port 1(bridge_slave_0) entered disabled state [ 123.824875][ T144] bridge0: port 2(bridge_slave_1) entered disabled state [ 123.846806][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 123.854942][ T144] bridge0: port 1(bridge_slave_0) entered blocking state [ 123.861996][ T144] bridge0: port 1(bridge_slave_0) entered forwarding state [ 123.870162][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 123.878618][ T144] bridge0: port 2(bridge_slave_1) entered blocking state [ 123.885641][ T144] bridge0: port 2(bridge_slave_1) entered forwarding state [ 123.893090][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 123.901166][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 123.912519][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 123.926053][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 123.939100][ T484] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 123.953846][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 123.962945][ T144] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 17:16:53 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400ae01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) open$dir(&(0x7f0000000000)='./file1\x00', 0x521a02, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_tcp(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x1004, &(0x7f00000002c0)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@cache_mmap}, {@cachetag={'cachetag', 0x3d, '$!'}}, {@access_user}, {@noextend}, {@noextend}, {@access_uid={'access', 0x3d, 0xee01}}, {@version_9p2000}, {@access_uid={'access', 0x3d, 0xee01}}, {@version_u}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsuuid={'fsuuid', 0x3d, {[0x31, 0x30, 0x5d, 0x31, 0x35, 0x38, 0x34, 0x62], 0x2d, [0x34, 0x36, 0x36, 0x35], 0x2d, [0x35, 0x61, 0x39, 0x34], 0x2d, [0x61, 0x35, 0x0, 0x35], 0x2d, [0x30, 0x30, 0x31, 0x66, 0x64, 0x64, 0x36, 0x66]}}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}, {@obj_role={'obj_role', 0x3d, '-(,,$-:'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}, {@euid_lt={'euid<', r2}}, {@smackfstransmute}]}}) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x1000) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r2) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5, 0x0, r3}}, 0x20}}, 0x10) 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 3: getsockopt(0xffffffffffffffff, 0x100, 0x7f, &(0x7f0000000080)=""/77, &(0x7f0000000100)=0x4d) mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) open(&(0x7f0000000040)='./control\x00', 0x0, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000200)=[{&(0x7f0000000180)=""/110, 0x6e}], 0x1, 0xd9f, 0x1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000000)=[r2]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x9, [@enum={0xf, 0x6, 0x0, 0x6, 0x4, [{0x2, 0x1}, {0x9, 0xdb7}, {0x10, 0xfff}, {0xe, 0x4}, {0x8, 0x8000}, {0x4, 0x1}]}, @ptr={0xa, 0x0, 0x0, 0x2, 0x3}]}, {0x0, [0x2e, 0x2e, 0x61, 0x61, 0x61, 0x2e, 0x30]}}, &(0x7f0000000100)=""/195, 0x69, 0xc3, 0x1}, 0x20) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x4, 0x80, 0x2, 0x7, 0x4, 0x3f, 0x0, 0x42c8, 0x1000, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000002c0), 0xc}, 0xa80, 0x1, 0x7fff, 0x4, 0x1, 0x1, 0x0, 0x0, 0xacc, 0x0, 0x5}, r2, 0xc, 0xffffffffffffffff, 0x2) 17:16:53 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) [ 124.036191][ T3642] __nla_validate_parse: 13 callbacks suppressed [ 124.036199][ T3642] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000000)=[r2]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2000008, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) rename(&(0x7f0000000040)='./control\x00', &(0x7f0000000080)='./control\x00') open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0xfffff000) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r2, 0x5000940a, &(0x7f0000000980)={{r3}, "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"}) 17:16:53 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) syz_io_uring_setup(0x6349, &(0x7f0000000080)={0x0, 0xa882, 0x2, 0x0, 0x326}, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)) clone(0x10200000, &(0x7f0000000380)="8fa288", &(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)="3125d6a40cd820499157f414548172bbb9c6c294594e3f3a767fc0647ceea16a6821b1a76a87c4432a2cd1ea62faebcacb31f86cbb93b11b02d9c700dee9662b406094bcbfe4afc478609e41e38ad0621c5888a4677a45584b81c8f375286e4951ce1c934e58ba764ea727f5814d412f05ef26386f612e5428197b70d378c1ce8a9fed8891aacf2f63a497c1f4483b6feb324075886598e62108d39b2ed69a6d3b49414b93c71cd13e3f74f730") syz_io_uring_setup(0x27c, &(0x7f0000000180)={0x0, 0x29e7, 0x20, 0x2, 0xe2, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f00000002c0)=0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) syz_io_uring_submit(r2, r3, &(0x7f0000000340)=@IORING_OP_CLOSE={0x13, 0x3, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x8) 17:16:53 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) dup(r0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x7) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:53 executing program 5: flock(0xffffffffffffffff, 0x0) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x3ff, 0xfffffffffffffffd}) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x3c5, 0x484640) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000001480), 0xffffffffffffffff) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xa) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000015c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010700000000000000000e00000008000300", @ANYRES32=r6, @ANYBLOB="a75211244323d57e8a5a8bbb2760ad70059b858867030982a26347859973ed204e9fe79d5650a66bdf5bb67423d052d9e4b1c5b4601276c72cf7fb443855992c453399b9fb9ef69d9e47d97c91ac6b988741aa17096b2c1d5641cb722c48b9a0d52f54db01d527604b0e6ce7ef480e228abf363ef72e8735ad687d4399c53c919af6ca7b82672a7a02a1b2a0a6e2fb61653a639d8fb0891f3a10855c382007d843ca08fa48ce586b6cb08e38761eb81ea997f0b9c24a66f49e7fa1e809caf27ca95fd6734062c9"], 0x1c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000500)={&(0x7f0000000380)=@delqdisc={0x154, 0x25, 0x8, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x0, r6, {0xffff, 0x2}, {0x0, 0x9}, {0x8, 0x3}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4c, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8, 0x5, 0xfffffff9}, @TCA_CODEL_TARGET={0x8, 0x1, 0xdd4}, @TCA_CODEL_INTERVAL={0x8, 0x3, 0x1}, @TCA_CODEL_ECN={0x8}, @TCA_CODEL_CE_THRESHOLD={0x8, 0x5, 0x69}, @TCA_CODEL_ECN={0x8}, @TCA_CODEL_CE_THRESHOLD={0x8, 0x5, 0xcded}, @TCA_CODEL_TARGET={0x8, 0x1, 0x8}, @TCA_CODEL_TARGET={0x8, 0x1, 0x1ff}]}}, @TCA_EGRESS_BLOCK={0x8}, @TCA_RATE={0x6, 0x5, {0x2b, 0x80}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xd1}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x5}, @TCA_STAB={0x98, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xbc, 0x1f, 0xffff, 0x2, 0x0, 0x400, 0x2, 0x4}}, {0xc, 0x2, [0x9, 0x5, 0x7, 0x1000]}}, {{0x1c, 0x1, {0x92, 0x6, 0x3, 0x2, 0x2, 0x7, 0x80000000, 0x1}}, {0x6, 0x2, [0x3]}}, {{0x1c, 0x1, {0x3, 0x81, 0x7ff, 0xfffffff8, 0x0, 0x0, 0xfffff9d9, 0x2}}, {0x8, 0x2, [0xf4, 0x1]}}, {{0x1c, 0x1, {0x2, 0x0, 0x8, 0xa0, 0x1, 0x0, 0xffff517b, 0x2}}, {0x8, 0x2, [0x2, 0x3]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x6c}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x9}]}, 0x154}, 0x1, 0x0, 0x0, 0x4000}, 0x24000005) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000100)=0x48) clone(0x170000, &(0x7f0000000140)="fdef9e98a1030bff6041155df1ef7f558cd7b0267ef1bd2f1b89aa07dd3a5e1baf80711b154f8b3fb6be25e30a4ce2b610ca142662ba96ab9f2ed549789fb74aff9021d5b1d097eb17907dcf3e150cae9573d749d9c5bba0a2fe98710a1a8033f2b143d8790b5c9d926ad8149330845f4b0ffb0ac75f99b95397273a31fc4b4f1a98e5d3efd14974e0cc52174dfc253ba461ae4e80c583421a18c191450b8158508519b98875c1e406b92ced5ad6febb8cc22b5b8f1b8e26f63dbb6159835dab25515e0747aa76717e08ebcff8c032e937595e3eb745398fba1e3f6084bd088067162f117627656ce1949069b0c7b59f4eaaca75a833d12f4a4d8e7a3cc52b", &(0x7f00000000c0), &(0x7f00000002c0), &(0x7f0000000300)="fffbbcd8861cb3d7fd25362e699d35169e5d03499d6c88ae01899887ca94c263f4219bc2513aaa3843caaf8b2962100113203e1e2698b27ab9df133ebf5afd") execveat(r0, &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x1100) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x1, &(0x7f0000000000)=[r2]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5}}, 0x20}}, 0x10) 17:16:53 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x10, 0xffffffffffffffff, 0x8) clone(0x3a3dd4008400af01, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) memfd_create(&(0x7f0000000240)='\x00\x00\x00\x00\x00\x00z\x9b\xb6\xe8t%\xfc\x96L\x82\xdb9\xa0\x8b\x14d\xa2\xa1\xa8!\xe8\xd1\xa0\x8a\xce0\x1c\xb7\xf1\xccm\xce\xd4\xdb\x89\xe5\x8f\xe2\xb6\xd6\x9cF\xbd\xff\x14\xec\xd4D\x8a\x1f\x1b\xf6\x18\xf3\xdc\x91\'\x06\\8\r', 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000040)=0x7) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x46dcd000) preadv(r0, &(0x7f0000000280), 0x0, 0xd9f, 0x1) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) socket(0x10, 0x2, 0x0) setregid(0x0, 0x0) setgroups(0x1, &(0x7f0000000000)=[0x0]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./control\x00', 0x10100, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1800003, 0x12, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) creat(&(0x7f0000000400)='./control\x00', 0x114) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvmsg(r1, &(0x7f0000000280)={&(0x7f0000000040)=@caif=@util, 0x80, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/31, 0x1f}, {&(0x7f0000000180)=""/247, 0xf7}, {&(0x7f0000000100)=""/38, 0x26}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000000980)=""/4096, 0x1000}], 0x5}, 0x40002120) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) socket(0x10, 0x2, 0x0) setregid(0x0, 0x0) setgroups(0x1, &(0x7f0000000000)=[0x0]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 124.335512][ T3705] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000040)={0x20000008}) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x28048089}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) preadv(r3, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x400, 0x0, {0x10, 0x5}}, 0x20}}, 0x10) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) socket(0x10, 0x2, 0x0) setregid(0x0, 0x0) setgroups(0x1, &(0x7f0000000000)=[0x0]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) setgroups(0x1, &(0x7f0000000000)=[r1]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 3: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) mount$overlay(0x0, &(0x7f0000000040)='./control\x00', &(0x7f0000000080), 0x2, &(0x7f00000000c0)={[{@upperdir={'upperdir', 0x3d, './control'}}, {@redirect_dir={'redirect_dir', 0x3d, './control'}}, {@default_permissions}], [{@fsmagic={'fsmagic', 0x3d, 0x800}}, {@seclabel}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = socket(0x23, 0x2, 0x29492c55) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2, 0x30, r1, 0x3e059000) mmap(&(0x7f00005fd000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x59710000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) setgroups(0x1, &(0x7f0000000000)=[r1]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 124.598941][ T3723] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 124.630171][ T3728] overlayfs: unrecognized mount option "fsmagic=0x0000000000000800" or missing value 17:16:53 executing program 1: mkdir(&(0x7f0000000140)='./control\x00', 0x0) chmod(&(0x7f0000000940)='./control\x00', 0x9c32f69e6caa24ef) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) syz_io_uring_complete(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0x0, r1) setgroups(0x1, &(0x7f0000000000)=[r1]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) open(&(0x7f00000002c0)='./control\x00', 0xc40beb2474df942a, 0x5f37900f6c944c2a) [ 124.678747][ T3732] overlayfs: unrecognized mount option "fsmagic=0x0000000000000800" or missing value [ 125.295519][ T659] device bridge_slave_1 left promiscuous mode [ 125.301667][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 125.309520][ T659] device bridge_slave_0 left promiscuous mode [ 125.315769][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.213061][ T3738] cgroup1: Unknown subsys name 'perf_event' [ 126.219288][ T3738] cgroup1: Unknown subsys name 'net_cls' [ 126.258675][ T3738] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.265857][ T3738] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.273436][ T3738] device bridge_slave_0 entered promiscuous mode [ 126.280273][ T3738] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.287333][ T3738] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.294767][ T3738] device bridge_slave_1 entered promiscuous mode [ 126.334654][ T3738] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.341681][ T3738] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.349054][ T3738] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.356106][ T3738] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.378297][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 126.386563][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 126.394719][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 126.404163][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 126.412363][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 126.419427][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 126.433223][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 126.441340][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 126.448411][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 126.462961][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 126.470834][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 126.483298][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 126.502853][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 126.511318][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 126.519920][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 126.529503][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 127.452625][ T659] device bridge_slave_1 left promiscuous mode [ 127.458874][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 127.466864][ T659] device bridge_slave_0 left promiscuous mode [ 127.473015][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.042608][ T3747] cgroup1: Unknown subsys name 'perf_event' [ 128.048722][ T3747] cgroup1: Unknown subsys name 'net_cls' [ 128.087946][ T3747] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.095190][ T3747] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.102933][ T3747] device bridge_slave_0 entered promiscuous mode [ 128.109803][ T3747] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.116859][ T3747] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.124256][ T3747] device bridge_slave_1 entered promiscuous mode [ 128.171378][ T3747] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.178429][ T3747] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.185713][ T3747] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.192761][ T3747] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.215578][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 128.224034][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 128.231635][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 128.241192][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 128.249330][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 128.256373][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 128.265937][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 128.274272][ T833] bridge0: port 2(bridge_slave_1) entered blocking state [ 128.281301][ T833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 128.294860][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 128.312084][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 128.320346][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 128.332035][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 128.350715][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 128.359021][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 128.368644][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 129.290603][ T660] device bridge_slave_1 left promiscuous mode [ 129.296777][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.304347][ T660] device bridge_slave_0 left promiscuous mode [ 129.310559][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.838392][ T3756] cgroup1: Unknown subsys name 'perf_event' [ 129.844617][ T3756] cgroup1: Unknown subsys name 'net_cls' [ 129.884490][ T3756] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.891665][ T3756] bridge0: port 1(bridge_slave_0) entered disabled state [ 129.898949][ T3756] device bridge_slave_0 entered promiscuous mode [ 129.906514][ T3756] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.913724][ T3756] bridge0: port 2(bridge_slave_1) entered disabled state [ 129.921250][ T3756] device bridge_slave_1 entered promiscuous mode [ 129.968641][ T3756] bridge0: port 2(bridge_slave_1) entered blocking state [ 129.975711][ T3756] bridge0: port 2(bridge_slave_1) entered forwarding state [ 129.983019][ T3756] bridge0: port 1(bridge_slave_0) entered blocking state [ 129.990065][ T3756] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.014906][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 130.022470][ T67] bridge0: port 1(bridge_slave_0) entered disabled state [ 130.030616][ T67] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.040071][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 130.048268][ T833] bridge0: port 1(bridge_slave_0) entered blocking state [ 130.055326][ T833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 130.069764][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 130.077985][ T67] bridge0: port 2(bridge_slave_1) entered blocking state [ 130.085045][ T67] bridge0: port 2(bridge_slave_1) entered forwarding state [ 130.092505][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 130.102283][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 130.119697][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 130.140694][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 130.149894][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 130.157964][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 130.176107][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 130.868633][ T660] device bridge_slave_1 left promiscuous mode [ 130.874900][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 130.882653][ T660] device bridge_slave_0 left promiscuous mode [ 130.889309][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.666599][ T3765] cgroup1: Unknown subsys name 'perf_event' [ 131.672817][ T3765] cgroup1: Unknown subsys name 'net_cls' [ 131.711700][ T3765] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.718920][ T3765] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.726212][ T3765] device bridge_slave_0 entered promiscuous mode [ 131.733736][ T3765] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.740979][ T3765] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.748688][ T3765] device bridge_slave_1 entered promiscuous mode [ 131.787659][ T3765] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.794706][ T3765] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.802063][ T3765] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.809362][ T3765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.831647][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 131.839683][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 131.846838][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 131.857233][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 131.865691][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 131.873976][ T17] bridge0: port 1(bridge_slave_0) entered blocking state [ 131.881032][ T17] bridge0: port 1(bridge_slave_0) entered forwarding state [ 131.897500][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 131.905917][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 131.914434][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 131.921528][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 131.928918][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 131.936940][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 131.944973][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 131.953551][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 131.967663][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 131.975992][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 131.989544][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 131.997886][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 132.018484][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 132.026611][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 132.034802][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 132.043322][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 132.052352][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 132.060842][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 132.647525][ T660] device bridge_slave_1 left promiscuous mode [ 132.653902][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 132.661882][ T660] device bridge_slave_0 left promiscuous mode [ 132.668445][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.567536][ T3777] cgroup1: Unknown subsys name 'perf_event' [ 133.573760][ T3777] cgroup1: Unknown subsys name 'net_cls' [ 133.613265][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.620350][ T3777] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.628219][ T3777] device bridge_slave_0 entered promiscuous mode [ 133.635044][ T3777] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.642348][ T3777] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.649830][ T3777] device bridge_slave_1 entered promiscuous mode [ 133.689117][ T3777] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.696178][ T3777] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.703429][ T3777] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.710477][ T3777] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.732196][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 133.739879][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 133.747794][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 133.757324][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 133.765545][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 133.772602][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 133.781287][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 133.789537][ T101] bridge0: port 2(bridge_slave_1) entered blocking state [ 133.796677][ T101] bridge0: port 2(bridge_slave_1) entered forwarding state [ 133.810168][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 133.826744][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 133.835021][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 133.846605][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 133.860606][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 133.876385][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 133.884673][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 134.566211][ T660] device bridge_slave_1 left promiscuous mode [ 134.572492][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 134.580463][ T660] device bridge_slave_0 left promiscuous mode [ 134.586792][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.366575][ T3788] cgroup1: Unknown subsys name 'perf_event' [ 135.372727][ T3788] cgroup1: Unknown subsys name 'net_cls' [ 135.413018][ T3788] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.420173][ T3788] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.428130][ T3788] device bridge_slave_0 entered promiscuous mode [ 135.435274][ T3788] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.442293][ T3788] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.449953][ T3788] device bridge_slave_1 entered promiscuous mode [ 135.489340][ T3788] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.496419][ T3788] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.503676][ T3788] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.510840][ T3788] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.532856][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 135.540981][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 135.550174][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 135.559920][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 135.568398][ T833] bridge0: port 1(bridge_slave_0) entered blocking state [ 135.575441][ T833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 135.585317][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 135.593580][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 135.600662][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 135.616152][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 135.624125][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 135.646160][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 135.654463][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 135.662781][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 135.680851][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 135.689445][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 136.405045][ T659] device bridge_slave_1 left promiscuous mode [ 136.411291][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 136.419132][ T659] device bridge_slave_0 left promiscuous mode [ 136.425569][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.142058][ T3797] cgroup1: Unknown subsys name 'perf_event' [ 137.148225][ T3797] cgroup1: Unknown subsys name 'net_cls' [ 137.187177][ T3797] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.194657][ T3797] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.201998][ T3797] device bridge_slave_0 entered promiscuous mode [ 137.210753][ T3797] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.217870][ T3797] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.225335][ T3797] device bridge_slave_1 entered promiscuous mode [ 137.264733][ T3797] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.271769][ T3797] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.279058][ T3797] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.286104][ T3797] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.307933][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 137.316804][ T17] bridge0: port 1(bridge_slave_0) entered disabled state [ 137.324520][ T17] bridge0: port 2(bridge_slave_1) entered disabled state [ 137.333545][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 137.341855][ T101] bridge0: port 1(bridge_slave_0) entered blocking state [ 137.348905][ T101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 137.364743][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 137.372883][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 137.380027][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 137.387409][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 137.395509][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 137.414183][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 137.422647][ T101] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 137.436927][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 137.453079][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 137.461996][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 138.164854][ T660] device bridge_slave_1 left promiscuous mode [ 138.171028][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 138.179137][ T660] device bridge_slave_0 left promiscuous mode [ 138.185787][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 138.973558][ T3806] cgroup1: Unknown subsys name 'perf_event' [ 138.979828][ T3806] cgroup1: Unknown subsys name 'net_cls' [ 139.019369][ T3806] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.026559][ T3806] bridge0: port 1(bridge_slave_0) entered disabled state [ 139.034523][ T3806] device bridge_slave_0 entered promiscuous mode [ 139.041466][ T3806] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.048657][ T3806] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.056162][ T3806] device bridge_slave_1 entered promiscuous mode [ 139.109181][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 139.117226][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 139.127073][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 139.135593][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 139.143838][ T67] bridge0: port 1(bridge_slave_0) entered blocking state [ 139.150852][ T67] bridge0: port 1(bridge_slave_0) entered forwarding state [ 139.158581][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 139.173737][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 139.181976][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 139.190453][ T833] bridge0: port 2(bridge_slave_1) entered blocking state [ 139.197505][ T833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 139.204873][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 139.214598][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 139.233164][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 139.241478][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 139.254905][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 139.271590][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 139.280320][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 140.042917][ T659] device bridge_slave_1 left promiscuous mode [ 140.049045][ T659] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.056592][ T659] device bridge_slave_0 left promiscuous mode [ 140.062814][ T659] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.855668][ T3817] cgroup1: Unknown subsys name 'perf_event' [ 140.861889][ T3817] cgroup1: Unknown subsys name 'net_cls' [ 140.901438][ T3817] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.908652][ T3817] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.916624][ T3817] device bridge_slave_0 entered promiscuous mode [ 140.923949][ T3817] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.930958][ T3817] bridge0: port 2(bridge_slave_1) entered disabled state [ 140.938678][ T3817] device bridge_slave_1 entered promiscuous mode [ 140.978454][ T3817] bridge0: port 2(bridge_slave_1) entered blocking state [ 140.985507][ T3817] bridge0: port 2(bridge_slave_1) entered forwarding state [ 140.992811][ T3817] bridge0: port 1(bridge_slave_0) entered blocking state [ 140.999823][ T3817] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.022715][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 141.030525][ T833] bridge0: port 1(bridge_slave_0) entered disabled state [ 141.038423][ T833] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.063783][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 141.072645][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 141.080768][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 141.087814][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 141.096298][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 141.104607][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 141.111634][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 141.119169][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 141.127259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 141.143275][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 141.151122][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 141.168437][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 141.177371][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 141.942099][ T660] device bridge_slave_1 left promiscuous mode [ 141.948592][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 141.956155][ T660] device bridge_slave_0 left promiscuous mode [ 141.962457][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.691793][ T3826] cgroup1: Unknown subsys name 'perf_event' [ 142.698151][ T3826] cgroup1: Unknown subsys name 'net_cls' [ 142.737146][ T3826] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.744653][ T3826] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.752628][ T3826] device bridge_slave_0 entered promiscuous mode [ 142.759461][ T3826] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.766950][ T3826] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.774641][ T3826] device bridge_slave_1 entered promiscuous mode [ 142.814615][ T3826] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.821722][ T3826] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.828955][ T3826] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.835989][ T3826] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.857777][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 142.865942][ T3688] bridge0: port 1(bridge_slave_0) entered disabled state [ 142.874934][ T3688] bridge0: port 2(bridge_slave_1) entered disabled state [ 142.885268][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 142.893748][ T833] bridge0: port 1(bridge_slave_0) entered blocking state [ 142.900765][ T833] bridge0: port 1(bridge_slave_0) entered forwarding state [ 142.912341][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 142.920627][ T833] bridge0: port 2(bridge_slave_1) entered blocking state [ 142.927967][ T833] bridge0: port 2(bridge_slave_1) entered forwarding state [ 142.941936][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 142.949856][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 142.971847][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 142.982035][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 143.001884][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 143.010239][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 143.019522][ T67] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 143.761534][ T660] device bridge_slave_1 left promiscuous mode [ 143.767966][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 143.775461][ T660] device bridge_slave_0 left promiscuous mode [ 143.781671][ T660] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.456736][ T3837] cgroup1: Unknown subsys name 'perf_event' [ 144.463066][ T3837] cgroup1: Unknown subsys name 'net_cls' [ 144.503306][ T3837] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.510378][ T3837] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.518302][ T3837] device bridge_slave_0 entered promiscuous mode [ 144.525605][ T3837] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.532849][ T3837] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.540213][ T3837] device bridge_slave_1 entered promiscuous mode [ 144.580576][ T3837] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.587735][ T3837] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.595030][ T3837] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.602099][ T3837] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.623968][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 144.632757][ T372] bridge0: port 1(bridge_slave_0) entered disabled state [ 144.639899][ T372] bridge0: port 2(bridge_slave_1) entered disabled state [ 144.661544][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 144.669676][ T372] bridge0: port 1(bridge_slave_0) entered blocking state [ 144.676748][ T372] bridge0: port 1(bridge_slave_0) entered forwarding state [ 144.684403][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 144.693368][ T372] bridge0: port 2(bridge_slave_1) entered blocking state [ 144.700382][ T372] bridge0: port 2(bridge_slave_1) entered forwarding state [ 144.708043][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 144.716220][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 144.727789][ T3688] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 144.741034][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 144.753892][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 144.770288][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 144.779359][ T833] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 2021/05/29 17:17:14 executor 2 failed 11 times: executor 2: exit status 67 SYZFAIL: mmap of output file failed (errno 13: Permission denied) SYZFAIL: child failed (errno 0: Success) loop exited with status 67 [ 145.950863][ T660] device bridge_slave_1 left promiscuous mode [ 145.957066][ T660] bridge0: port 2(bridge_slave_1) entered disabled state [ 145.965517][ T660] device bridge_slave_0 left promiscuous mode [ 145.972130][ T660] bridge0: port 1(bridge_slave_0) entered disabled state