ffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) 12:32:11 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e21, 0x0, @mcast2, 0x2b9}, {0xa, 0x4e23, 0x0, @local}, 0x1000, [0x4ab, 0x5091, 0x1, 0x0, 0xbfe, 0x1f, 0x0, 0xffffffffffffffff]}, 0x5c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000040)='./file0/file0\x00') mknod$loop(&(0x7f0000000380)='./file0\x00', 0x400, 0x0) ioctl$TIOCEXCL(r2, 0x540c) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:11 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfffffffe, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:11 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6d803b97a77a2232}}, 0x0, 0x0, 0xffffffffffffffff, 0x1000) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockname(0xffffffffffffff9c, &(0x7f0000000200)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000180)=0x80) connect$caif(r0, &(0x7f0000000280)=@util={0x25, "efec347b8d57080bfd1074ec3242cbca"}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x1) unlink(&(0x7f00000002c0)='./file0\x00') 12:32:12 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x80, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000240)=0x2) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0007ce4a8d84b463b2"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='exofs\x00', 0x108001, 0x0) 12:32:12 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e21, 0x0, @mcast2, 0x2b9}, {0xa, 0x4e23, 0x0, @local}, 0x1000, [0x4ab, 0x5091, 0x1, 0x0, 0xbfe, 0x1f, 0x0, 0xffffffffffffffff]}, 0x5c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000040)='./file0/file0\x00') mknod$loop(&(0x7f0000000380)='./file0\x00', 0x400, 0x0) ioctl$TIOCEXCL(r2, 0x540c) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:12 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x2) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000200)=0x4, &(0x7f0000000240)=0x2) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) sched_setaffinity(r1, 0x4, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) ioctl$KDDISABIO(r0, 0x4b37) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 12:32:12 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x2) 12:32:12 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'gretap0\x00', {0x2, 0x4e22, @local}}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000200)={0x2, 0x7, 0x7861, 0x0, 0x0, 0x9, 0x6}) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000000)={0x5, 0x0, [{0xc0000004, 0x1, 0x7ff, 0xab0, 0x4}, {0xc000000f, 0x58, 0x1400, 0x3, 0x7}, {0x80000019, 0x8000, 0x7, 0x7fff, 0xeb}, {0x0, 0x1, 0xdf, 0x7ff, 0x9}, {0x80000007, 0x5, 0x3ff, 0x3, 0x2ebc}]}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:12 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f0000000000)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000200)={0x7, 0x2, {0x1, 0x0, 0x8, 0x3, 0x1}}) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:12 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000240)={{0xa, 0x4e21, 0x0, @mcast2, 0x2b9}, {0xa, 0x4e23, 0x0, @local}, 0x1000, [0x4ab, 0x5091, 0x1, 0x0, 0xbfe, 0x1f, 0x0, 0xffffffffffffffff]}, 0x5c) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000040)='./file0/file0\x00') mknod$loop(&(0x7f0000000380)='./file0\x00', 0x400, 0x0) ioctl$TIOCEXCL(r2, 0x540c) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:12 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x100000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:12 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x2) 12:32:13 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x7, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f00000002c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x40, r1, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0xc081}, 0x4000) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f0000000180)=0x8) ioctl$RTC_RD_TIME(r2, 0x80247009, &(0x7f0000000200)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:13 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x80, 0x0) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000240)=0x2) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f0000000040)=ANY=[@ANYBLOB="0007ce4a8d84b463b2"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='exofs\x00', 0x108001, 0x0) 12:32:13 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x200000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:13 executing program 5: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xf000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:13 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r0, 0x0, 0x6, &(0x7f0000000040)='ramfs\x00'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001a40)={{{@in=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000001b40)=0xe8) lsetxattr$security_capability(&(0x7f0000000740)='./file0\x00', &(0x7f0000001a00)='security.capability\x00', &(0x7f0000001b80)=@v3={0x3000000, [{0x8001, 0x8}, {0x200, 0x400}], r2}, 0x18, 0x3) process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f0000000200)=""/149, 0x95}, {&(0x7f00000002c0)=""/126, 0x7e}, {&(0x7f0000000340)=""/205, 0xcd}], 0x3, &(0x7f0000001980)=[{&(0x7f0000000440)=""/63, 0x3f}, {&(0x7f0000000480)=""/173, 0xad}, {&(0x7f0000000540)=""/165, 0xa5}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000680)=""/167, 0xa7}, {&(0x7f00000017c0)=""/116, 0x74}, {&(0x7f0000001840)=""/91, 0x5b}, {&(0x7f00000018c0)=""/155, 0x9b}, {&(0x7f0000000600)=""/61, 0x3d}], 0x9, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:13 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f0000000480)='./file0\x00', 0x2) 12:32:13 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x300000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:14 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040), &(0x7f0000000280)=[&(0x7f0000000200)='ramfs\x00', &(0x7f0000000240)='self*nodev)eth1]\x00']) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x88000001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:14 executing program 5: mkdir(&(0x7f0000000200)='./file1\x00', 0x40000000000) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_bnep(0x1f, 0x3, 0x4) socketpair(0x1, 0xb, 0x40, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000040)={0x33, @multicast1, 0x4e23, 0x0, 'dh\x00', 0x10, 0x7fffffff, 0x6a}, 0x2c) r3 = dup(r0) getsockopt$inet_mreqn(r3, 0x0, 0x27, &(0x7f0000000240)={@remote}, &(0x7f0000000280)=0xc) ftruncate(r2, 0x9) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:14 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:14 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000000)) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:14 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r1 = dup2(r0, r0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000040)={{0x3, 0x6}, 0xa}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:14 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x400000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:14 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:14 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:14 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:14 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x500000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:14 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='gfs2\x00', 0x1, &(0x7f00000002c0)='/dev/vga_arbiter\x00') r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x400, 0xa) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:14 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000)='TIPCv2\x00') r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:15 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) clock_gettime(0x7, &(0x7f0000000000)) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:15 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x40) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x600000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:15 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40047602, &(0x7f0000000000)=0x5) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:15 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='dgvt|pfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, [], 0x2a}, 0xb0}}}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @empty, 0x100}, r1}}, 0x30) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000440)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000002c0)=0x3f, 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x2) write$P9_RREAD(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8c00000075010081000000343bee2eccea6c77e3bb3bf94bab172430bf43550cb71222cd7af8dce84e19b168bf7633316980e27ba045c782d8db10a96045968ce8789b13e1f2ddb8e49c58741e06bf14479e1aef5b012345176d302673323fc3d4fb2cde18e112e260e3fe1ae4f7745bf71f10b04a347c512be26768631d49aeaaf8ba020000000000000000"], 0x8c) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000300)='./file0\x00', 0x2) 12:32:15 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:15 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x700000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:15 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000040)='efs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000240)=ANY=[@ANYBLOB="00fb30000081f05a797ec703ad0eff61d6d593f92c0379a6782af1a5fcfa929c9fbb8b62005e3493eea4984234ec870ec6ba226977552ff52780"], 0x30, 0x1) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f0000000200)={0x1, 0x0, 0x0, 0x4, {0xffffffffffffffc1, 0x0, 0x7fffffff, 0x4}}) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:16 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x100, 0x0) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0245629, &(0x7f0000000200)={0x0, 0xfb, 0xfff, [], &(0x7f0000000180)=0x6}) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:16 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dlm-control\x00', 0xa000, 0x0) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000440)=0x1000, &(0x7f0000000480)=0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000004c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x2, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.upper\x00', &(0x7f0000000340)={0x0, 0xfb, 0x56, 0x1, 0x8, "0287e444aa6d03138b82d1f35c1fe602", "f49a9bd253181a8b1bb96ac9a77f061af4e463e48ebc153cd094aef03746cd209a9c188890a937b1c11b6bcf9870b7b6459bb21eefdcf906fb366e4d19eee10fec"}, 0x56, 0x2) r2 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5229, 0x80900) renameat(r1, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') chdir(&(0x7f00000003c0)='./file0/file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000000480), 0x5, 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f0000000000)={0x3, 0xe0}) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:16 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:16 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:16 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') mkdir(&(0x7f0000000000)='./file2\x00', 0x20) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000080)={0x7ff, 0x800, 0x9, 0x86, 0x10, 0x7ff, 0x7, 0x80000001, 0x8691, 0x101, 0x74, 0x2}) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) write$vhci(r1, &(0x7f0000000040)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) sysfs$2(0x2, 0x2, &(0x7f0000000200)=""/173) 12:32:16 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x800000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:16 executing program 2: mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000180)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:16 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:16 executing program 5: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000080)='dgvt|pfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x106, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000380)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @in6={0xa, 0x4e24, 0x80000000, @dev={0xfe, 0x80, [], 0x2a}, 0xb0}}}, 0x90) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e23, 0x0, @empty, 0x100}, r1}}, 0x30) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000440)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) setsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f00000002c0)=0x3f, 0x4) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x2) write$P9_RREAD(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="8c00000075010081000000343bee2eccea6c77e3bb3bf94bab172430bf43550cb71222cd7af8dce84e19b168bf7633316980e27ba045c782d8db10a96045968ce8789b13e1f2ddb8e49c58741e06bf14479e1aef5b012345176d302673323fc3d4fb2cde18e112e260e3fe1ae4f7745bf71f10b04a347c512be26768631d49aeaaf8ba020000000000000000"], 0x8c) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000300)='./file0\x00', 0x2) 12:32:16 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) sendmsg$rds(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000680)=""/131, 0x83}, {&(0x7f00000007c0)=""/241, 0xf1}], 0x2, &(0x7f0000000cc0)=[@rdma_dest={0x18, 0x114, 0x2, {0xb2be, 0x57d7}}, @mask_fadd={0x58, 0x114, 0x8, {{0x4, 0x1f}, &(0x7f0000000600)=0x765f162b, &(0x7f0000000740), 0x0, 0x5f96, 0x20000000000000, 0x6, 0x0, 0x4}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8001, 0x3}, &(0x7f00000008c0)=0x3, &(0x7f0000000900)=0x8, 0xde, 0x7, 0xffffffffffffff00, 0x101, 0x8, 0x6}}, @cswp={0x58, 0x114, 0x7, {{0xaba8}, &(0x7f0000000940)=0x20, &(0x7f0000000980), 0x7, 0x5, 0x3, 0x0, 0x40, 0x8}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f00000009c0)=""/225, 0xe1}, &(0x7f0000000ac0), 0x7a}}, @mask_cswp={0x58, 0x114, 0x9, {{0xffff, 0x4}, &(0x7f0000000b00)=0x6, &(0x7f0000000b40)=0x80000000, 0xae, 0x8001, 0x2, 0x9, 0x0, 0x7}}], 0x1a8, 0x800}, 0x41) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000540)={@rand_addr, @initdev}, &(0x7f0000000580)=0xc) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(r2) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000040)) connect$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x2711}, 0x10) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xe8) recvfrom(r3, &(0x7f0000000200)=""/242, 0xf2, 0x10040, &(0x7f0000000340)=@xdp={0x2c, 0x3, r4, 0x38}, 0x80) 12:32:16 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x900000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:16 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000600)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='keyringeth1self!\x00', &(0x7f0000000200)='ramfs\x00', &(0x7f0000000240)='&]trusted/$$\'\x00', &(0x7f0000000280)='ramfs\x00', &(0x7f00000002c0)='ramfs\x00'], &(0x7f00000005c0)=[&(0x7f0000000340)='ramfs\x00', &(0x7f0000000380)='ramfs\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='&]\x00', &(0x7f00000004c0)=')#%$\xe8\x00', &(0x7f0000000500)='ramfs\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='&user\x00']) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:17 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) setxattr$system_posix_acl(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000001000200000000708cb9585a44dcef866503f1ebe9d13391ed8c730f7e74e7644d234fc2e212c7904a1013d5f4a51f49722fce8f3c5eaf575d6fad9d7ef07fabe53ee8669e45ba8533cdacc6ad4618d5eb0881f646bbed1c12cc2dd793ae162f8c0767a868d0936ac5de05b29be73a9d21b7946d5822cd39d968b93dd9ee9170162e1df7119116692e2f4bbf8b8ef4f9aa2e7f9c8512e986", @ANYRES32=r0, @ANYBLOB="040002000000000008000700e149de4c1d4fecbaaf65b8c973aad0475a157e2b918fbff2c14c3c7e5ba209cd3d9ce4a8a66ad76de6d205e264b158c528e1ba60f2c6f1359b629b9f16cf430b7c4f0885701dd29a3d3ea3f2febdaa31921ea02370798c2bbe7c3c94f50c69446a9e4b7061b12c4a2cc2f5ea", @ANYRES32=r1, @ANYBLOB="00b42000070000000000"], 0x34, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) link(&(0x7f0000000040)='./file1\x00', &(0x7f0000000180)='./file0/file0\x00') execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0xa0000, 0x4}, {0x8000, 0x7ff}], r0}, 0x18, 0x2) 12:32:17 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffe) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000180)) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xa00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:17 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x80000822) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x5c, r3, 0x30c, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb8d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000080}, 0x20000000) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r4 = fcntl$getown(r1, 0x9) timer_create(0x7, &(0x7f0000000340)={0x0, 0x1d, 0x0, @tid=r4}, &(0x7f0000000380)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:17 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xb00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:17 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r1 = fcntl$getown(r0, 0x9) fcntl$setown(r0, 0x8, r1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 0: mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:17 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 12:32:17 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x412800, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f00000007c0)=@mangle={'mangle\x00', 0x1f, 0x6, 0x668, 0x328, 0x46c, 0x46c, 0xec, 0x0, 0x59c, 0x59c, 0x59c, 0x59c, 0x59c, 0x6, &(0x7f0000000200), {[{{@ipv6={@loopback, @local, [0xff000000, 0xffffffff, 0xffffffff, 0xffffff00], [], 'team_slave_0\x00', 'hwsim0\x00', {0xff}, {}, 0x0, 0x1c0, 0x0, 0x42}, 0x0, 0xc8, 0xec}, @unspec=@CHECKSUM={0x24, 'CHECKSUM\x00'}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x27}, @remote, [0x0, 0xff000000, 0xffffffff, 0xffffffff], [0x0, 0xff000000, 0xffffffff, 0xffffff00], 'bpq0\x00', 'yam0\x00', {}, {0xff}, 0x1d, 0x4, 0x4, 0x21d888157d2be6c8}, 0x0, 0xec, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00', 0x0, {0x1}}]}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@empty, @ipv4=@multicast2, 0x24, 0x11, 0x8}}}, {{@ipv6={@loopback, @rand_addr="67188e57860413700f0040d80d2ddc68", [0xff, 0xff, 0xffffff00, 0xffffffff], [0xff, 0xff000000], 'ip6_vti0\x00', 'syz_tun\x00', {0xff}, {0xff}, 0x2f, 0x4, 0x3, 0x40}, 0x0, 0xc8, 0x10c}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2a, 0x12, 0xfffffffffffffffc}}}, {{@uncond, 0x0, 0x120, 0x144, 0x0, {}, [@common=@srh={0x2c, 'srh\x00', 0x0, {0x2b, 0x0, 0xfffffffeffffffff, 0x100000000, 0x3ff, 0x1000, 0x1a82}}, @common=@inet=@ipcomp={0x2c, 'ipcomp\x00', 0x0, {0x4d2, 0x4d3, 0x1}}]}, @HL={0x24, 'HL\x00', 0x0, {0x2, 0x4}}}, {{@ipv6={@loopback, @dev={0xfe, 0x80, [], 0x28}, [0xff000000, 0x99669b2bcc30ff10, 0xff000000, 0xffffffff], [0xff000000, 0xffffffff, 0x0, 0xff000000], 'ip6erspan0\x00', 'ip_vti0\x00', {0xff}, {}, 0x2f, 0x80, 0x2e829ced93d3de0a, 0x1}, 0x0, 0xec, 0x130, 0x0, {}, [@inet=@rpfilter={0x24, 'rpfilter\x00'}]}, @SNPT={0x44, 'SNPT\x00', 0x0, {@ipv6=@rand_addr="77cd5350ae3c5b737c975bd23023a54f", @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x32, 0x28, 0x3}}}], {{[], 0x0, 0xa8, 0xcc}, {0x24}}}}, 0x6c4) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000000040)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:17 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xc00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:17 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="73797374656d2e26ac73656c696e75786e6f64657662646576526f7369785f61616c5f616363657373656d3100"], &(0x7f0000000200)='ramfs\x00', 0x6, 0x2) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e20}, 0x6e) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0xfffffffffffffc01}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x5e, 0x200, 0x200000000, 0xff, r2}, &(0x7f0000000380)=0x10) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:18 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xd00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:18 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = fcntl$getown(r0, 0x9) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000040)=r2) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mixer\x00', 0x4000, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:18 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xe00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:18 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80280) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000240)=0x7, 0x4) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f00000002c0)={0x200, 0x1, 0xf7a8, 0x9, &(0x7f0000000280)=[{}]}) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlockall(0x2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000000)={{0x80, 0x401, 0x4, 0x4, 0x2, 0x400000000000000}, 0x0, 0x9, 0x80000001}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x0, 0x2, 0x80, &(0x7f0000ffe000/0x1000)=nil, 0x5}) 12:32:18 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000480)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x0, @local, 0x5}, r1}}, 0x30) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) ioctl$DRM_IOCTL_INFO_BUFS(r2, 0xc0086418, &(0x7f0000000200)={0x1ad1, 0x316ed448, 0x1ff, 0x1, 0x2, 0x1}) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x1}) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, &(0x7f0000000040)=r3) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = dup(r5) ioctl$KVM_HAS_DEVICE_ATTR(r6, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f00000004c0)='./file1\x00') symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$inet6_IPV6_ADDRFORM(r6, 0x29, 0x1, &(0x7f0000000000), 0x1) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:18 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) fallocate(r0, 0x22, 0x9, 0x6) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) ioctl$KVM_SMI(r0, 0xaeb7) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x82, 0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f00000004c0)={{0xa, 0x4e23, 0x5, @loopback, 0x3}, {0xa, 0x4e20, 0x5, @local, 0x4}, 0x2, [0x0, 0x4, 0x4, 0x1, 0x5, 0x5, 0x200, 0x8]}, 0x5c) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f0000000480)={0xffffffffffffffdd, "488cf18159254b99896835ce81d77a7a80920b442b432972d802fd1161adb1d1", 0x2, 0x1}) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000600), 0x4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/218, 0xda}, {&(0x7f0000000300)=""/204, 0xcc}], 0x2, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='trusted.overlay.upper\x00', &(0x7f0000000680)={0x0, 0xfb, 0x92, 0x2, 0x3, "d7f05abab63c49441735e92d95d357d0", "6bf9fdcb6b974ca8be442870e783d35021342ca13ece0845620171acf1663e56f343cc7d2af24b344b8847fa0f80e9169c02f674af79026561fdbe51f35107be3816688452e9e9882a421d37931772a609b0f1040049003dcffd08369db65450732bb0ab224c8add85b1525a9c6eca0281c6167695c63faedcc6722db7"}, 0x92, 0x2) r2 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x7, 0x2) r3 = getpid() sched_setscheduler(r3, 0x3, &(0x7f0000000540)=0x8) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r2, 0x40605346, &(0x7f0000000400)={0x9, 0x0, {0x2, 0x2, 0x0, 0x1, 0x5}}) 12:32:19 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xf00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:19 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000000)={0x4, [0x7fff, 0xffff, 0x7ff, 0x2, 0x1, 0xa45c, 0xb7ec, 0x0, 0x3, 0x0, 0x0, 0x4, 0x2, 0x9, 0x8, 0x8, 0x7, 0x8001, 0xfffffffffffff001, 0xcb, 0x2, 0x5d6e69b, 0x6, 0xfffffffffffffffc, 0x5, 0x6, 0x4, 0xffffffff, 0x10001, 0x2, 0x955, 0x80000000, 0x7, 0x0, 0x1, 0x7ff, 0x7, 0x1f, 0x0, 0x4e, 0x9, 0xa2, 0x4941, 0x2000000000, 0x8, 0x405d10e2, 0x9, 0xc6], 0x3}) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:19 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='proc\x00', 0xfffffffffffffffd, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:19 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1000000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:20 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x1c1) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000180)) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000000)) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x803c, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000280)=0x0) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x100) perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x4a, 0x7ff, 0xfffffffffffff15d, 0x9, 0x0, 0xffffffffffffff81, 0x2, 0x0, 0x8, 0x3ff, 0x350b, 0x6, 0x6, 0x8, 0x7fffffff, 0x4, 0x5, 0x0, 0x7f, 0x2, 0x6, 0x0, 0x4, 0xc48, 0x2, 0xb87, 0xb6, 0x20, 0x36, 0x4, 0x4, 0x8, 0x8, 0xd549, 0x9, 0x800, 0x0, 0x10000, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x9000, 0xfffffffffffffff7, 0x400000000, 0xf, 0x10000, 0x8}, r0, 0xb, r1, 0x9) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x28, r2, 0x420, 0x70bd2d, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000001) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup(r3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x1ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$EVIOCREVOKE(r4, 0x40044591, &(0x7f0000000000)=0xad) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r4) 12:32:20 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0xa) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:20 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1100000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:20 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x40, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x81}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000240)={r1, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x15}}}}, 0x84) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = dup(r2) ioctl$KVM_HAS_DEVICE_ATTR(r3, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:20 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x12, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000200)=""/142, 0x8e}, &(0x7f00000002c0), 0x40}, 0x20) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:20 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1200000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:20 executing program 4: mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) recvmsg(r1, &(0x7f0000000380)={&(0x7f0000000200)=@pptp, 0x80, &(0x7f0000000000)=[{&(0x7f0000000cc0)=""/4096, 0x1000}], 0x1, &(0x7f0000000280)=""/215, 0xd7}, 0x40000000) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:20 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000080)=0x7) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:20 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1300000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:21 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x10) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r0, 0x0, 0x6, &(0x7f0000000000)='ramfs\x00'}, 0x30) ptrace$getregs(0xc, r1, 0x7ff, &(0x7f0000000200)=""/240) r2 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:21 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$TIOCCONS(r1, 0x541d) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) bind(r1, &(0x7f00000002c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x0, 0x7, 0x21, "77e831869733fd909a044e894a504b90d939fa78acfcc1b04f0a3f8d8fbe2245720a5191672fb4a9c4cee5142a0a7ad4deb7b28110b9710483edbf35497089", 0x25}, 0x80) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000240)={0x7f, 0x1000}) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000000)={'security\x00'}, &(0x7f0000000200)=0x54) openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$KVM_SET_NR_MMU_PAGES(r1, 0xae44, 0x8000) 12:32:21 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ustat(0x1, &(0x7f0000000040)) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') socket$inet_icmp_raw(0x2, 0x3, 0x1) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1400000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:21 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:21 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2500, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000200)={0x7, 0x7f, 0x2}, 0x7) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000240)={0xd, 0x103, 0x2, {0x500000000000, 0x8, 0x10001, 0x2}}) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') acct(&(0x7f0000000000)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x88) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0xfd) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x3) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000200)={0xcf, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x19}}}}, 0x84) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) lseek(r2, 0x0, 0x3) 12:32:22 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1500000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:22 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) write$P9_RREADDIR(r1, &(0x7f0000000000)={0xb, 0x29, 0x2, {0x81}}, 0xb) 12:32:22 executing program 2: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/attr/exec\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000300)={&(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000280)="98d2c201d965127321a306e5cf7d6ab6ddd796119819f285c78257490215ddb3bc82ae943056bec0b723575b27ec863271bb9a64d0d90814227950ae0a2adf3f49a22a3cfa11f3f7d8efe0c56717b3f82df771651445fbe5f34efa1bf678767ef9c845028896f3a062b5a927021f", 0x6e}], 0x1, &(0x7f0000000180)=[@rights={0x14, 0x1, 0x1, [r0, r0]}], 0x14}, 0x40010) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000200)={{{@in6=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@loopback}}, &(0x7f0000000300)=0xe8) lsetxattr$security_capability(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000340)=@v3={0x3000000, [{0x1, 0x6}, {0x9, 0x3ff}], r3}, 0x18, 0x2) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:22 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1600000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:22 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='ramfs\x00', 0x0, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setaffinity(r0, 0x8, &(0x7f0000000140)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r2 = dup2(r1, r1) write$P9_RVERSION(r2, &(0x7f0000000200)=ANY=[@ANYBLOB="150000fb65ffff0300cb7e08003950323030302e4bc61b4f475060b0f01efaec08deffb38305fbab0551746c04c1b44ef571c4d469898d19414d6e62c67cfe1f5d20f2e8d4365abdeba64d4d9de1aa43a2c6066cce5acd62ff8e6ad2e774deca9baf1ca52366fa9c"], 0x15) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r2, &(0x7f0000000280)=""/131, 0x83) 12:32:22 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:22 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f0000000300)={0xfffffffffffffffc, 0x4, 0x8, 0x6, &(0x7f0000000200)=[{}, {}, {}, {}]}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) execve(&(0x7f0000000500)='./file0/file0\x00', 0x0, 0x0) 12:32:23 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f00000007c0)='dBw\f\xd4\x93^\x00\x00\x00\xb8\xe7\x84\xcd\x8f7\x90b\xeb\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f00000002c0)={0x0, 0x8000, 0x4, &(0x7f0000000280)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000400)='./file1/file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000240)={0x1, 0x10, 0xfa00, {&(0x7f0000000000), r2}}, 0x18) r3 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/attr/exec\x00', 0x2, 0x0) fstat(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x9, &(0x7f0000000440)=[0xee01, 0xffffffffffffffff, 0xee00, 0xee01, 0xee00, 0xee01, 0xee00, 0xee00, 0x0]) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x2d0000) r8 = getgid() ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000180)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000640)) getgroups(0x5, &(0x7f00000005c0)=[0x0, 0xffffffffffffffff, 0xee00, 0xee01, 0xffffffffffffffff]) setgroups(0x7, &(0x7f0000000600)=[r4, r5, r6, r7, r8, r9, r10]) 12:32:23 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1700000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:23 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = socket$key(0xf, 0x3, 0x2) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='\x00\x00\x00\x00\x00\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0106434, &(0x7f0000000180)={0x1, 0x0, 0x0, 0x2}) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e21, @broadcast}}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40086439, &(0x7f00000001c0)={0xfffffffffffff001, r2}) chdir(&(0x7f0000000240)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r3 = fcntl$getown(r0, 0x9) socket(0x9, 0x80000, 0x55) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000200)=r3) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "fd94d8a9b79b1d78ceb205101cf4383a"}, 0x11, 0x1) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000340)={@mcast2, 0x0}, &(0x7f0000000380)=0x14) accept4$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d00)={'ip6_vti0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000002540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000026c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000002700)=0x14) accept4(r1, &(0x7f0000002800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007440)={0x0, @local, @multicast2}, &(0x7f0000007480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000007500)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@loopback}}, &(0x7f0000007600)=0xe8) getsockname$packet(r1, &(0x7f0000007640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007680)=0x14) recvmsg(r1, &(0x7f0000008b80)={&(0x7f0000007780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000008a40)=[{&(0x7f0000007800)=""/221, 0xdd}, {&(0x7f0000007900)=""/25, 0x19}, {&(0x7f0000007940)=""/238, 0xee}, {&(0x7f0000007a40)=""/4096, 0x1000}], 0x4, &(0x7f0000008a80)=""/218, 0xda}, 0x40002000) getsockname(r1, &(0x7f0000000440)=@hci={0x1f, 0x0}, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000008c80)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000008cc0)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000008dc0)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000009540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000009500)={&(0x7f0000008e00)=ANY=[@ANYBLOB="e0060000", @ANYRES16=r2, @ANYBLOB="040225bd7000fedbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r4, @ANYBLOB="b800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f30000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000008000100", @ANYRES32=r6, @ANYBLOB="1c02020038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000008000300030000000800040081ffffff38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400ff0f000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000500000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r7, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000304060000000400040008000600"/64, @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000001000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="080007000000000008000100", @ANYRES32=r11, @ANYBLOB="0400020008000100", @ANYRES32=r12, @ANYBLOB="480102004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000000010809000000e58b097f06000000050005ffa471000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400080000005c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000002c000400001006f6060000000100000300000080080008e080000000ffff0406000800000b0009200080000064000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000003400040000fc030401000000ffff020009000000ff032004000000000900060900000000400006ff000000000600ff020800000008000100", @ANYRES32=r13, @ANYBLOB="2c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400030000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400326500040400000008000100", @ANYRES32=r16, @ANYBLOB="0c0102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="08000700000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ffff0808010001000180830030b80000080004050000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r19], 0x6e0}, 0x1, 0x0, 0x0, 0x80}, 0x40) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:23 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x61, &(0x7f0000000000)={'filter\x00', 0x4}, 0x68) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$getown(r1, 0x9) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) socket$alg(0x26, 0x5, 0x0) 12:32:23 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x6, &(0x7f0000000080)='ramfs\x00'}, 0x30) sched_setaffinity(r0, 0x18c, &(0x7f0000000040)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:23 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1800000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:24 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDENABIO(r0, 0x4b36) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1900000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:24 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000340)=0xffffffffffffff07, 0x80000) sendmsg$nl_route(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=@ipv4_newrule={0x28, 0x20, 0x800, 0x70bd2d, 0x25dfdbfb, {0x2, 0x30, 0x30, 0x80000001, 0x7ff, 0x0, 0x0, 0x2, 0x4}, [@FRA_FLOW={0x8, 0xb, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x4000000) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') fanotify_mark(r2, 0x10, 0x8000000, r2, &(0x7f0000000000)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000200)={0x0, 0x8, 0x30}, &(0x7f0000000380)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000440)={r3, @in={{0x2, 0x4e22, @rand_addr=0x5}}, 0x9c30, 0x40, 0xff, 0x3, 0x4}, 0x98) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:24 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x3, 0x4, &(0x7f00000003c0)=0x2}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:24 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1b00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:24 executing program 2: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) setsockopt$inet_dccp_int(r0, 0x21, 0xe, &(0x7f0000000180)=0x6, 0x4) getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000080), &(0x7f0000000200)=0x3c5) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') socket$alg(0x26, 0x5, 0x0) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = accept4$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10, 0x80000) accept4(r1, &(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000180)=0x80, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 12:32:24 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:24 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1c00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000040)='\x00', &(0x7f0000000200)='ramfs\x00', &(0x7f0000000240)='pproc@\x00', &(0x7f0000000280)='ramfs\x00', &(0x7f00000002c0)='ramfs\x00', &(0x7f0000000300)=']\x00', &(0x7f0000000340)='ramfs\x00', &(0x7f0000000380)='ramfs\x00', &(0x7f0000000440)='ramfs\x00'], &(0x7f0000000580)=[&(0x7f00000004c0)='-{lo\x00', &(0x7f0000000500)='ramfs\x00', &(0x7f0000000540)='\x00']) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000600)='.\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000005c0)=@md0='/dev/md0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='fuse\x00', 0x1040000, &(0x7f0000000700)='vmnet1*}^!vmnet0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:25 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) rmdir(&(0x7f0000000040)='./file0\x00') r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000200)='syzkaller\x00', &(0x7f0000000240)={'syz', 0x1}, &(0x7f0000000280), 0x0, 0xfffffffffffffff9) keyctl$unlink(0x9, r0, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$XDP_UMEM_COMPLETION_RING(r1, 0x11b, 0x6, &(0x7f0000000000)=0x800, 0x4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:25 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x1d00000000000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:25 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000000)='ramfs\x00', 0xffffffffffffffff, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') fadvise64(r1, 0x0, 0x401, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:25 executing program 1: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xf8ffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:26 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x80000) setsockopt$sock_int(r0, 0x1, 0x0, &(0x7f0000000080)=0x3, 0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) r3 = eventfd2(0x0, 0x0) read(r3, &(0x7f0000000080)=""/34, 0x22) io_setup(0xa, &(0x7f00000000c0)=0x0) io_submit(r4, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1, r3}]) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xf9ffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:26 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000000)={0x0, 0x4, 0x8, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:26 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000080)={0x0, 0x0}) sched_setaffinity(r0, 0x8, &(0x7f0000000040)=0xc89) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x4, 0x800) r1 = syz_open_dev$rtc(&(0x7f0000000180)='/dev/rtc#\x00', 0x1fffe0000000000, 0x8002) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:26 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') recvfrom$unix(r1, &(0x7f0000000000)=""/103, 0x67, 0x40000042, 0x0, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 12:32:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfaffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000040)={0x40, 0x7, 0x8}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dsp\x00', 0x240, 0x0) ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000280)) socket$isdn(0x22, 0x3, 0x11) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:27 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xf9ffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:28 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfbffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) chroot(&(0x7f0000000240)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U+', 0x9}, 0x28, 0x2) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000200), 0x2) 12:32:28 executing program 0: r0 = shmget(0x1, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000240)=""/205) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000200)='\xae\x8c\x8c\x8e\x00\x00\x00', 0x101000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffffffffffffffc7, 0x1) r2 = gettid() get_robust_list(r2, &(0x7f00000005c0)=&(0x7f0000000580)={&(0x7f00000001c0)={&(0x7f0000000100)}, 0x0, &(0x7f0000000500)}, &(0x7f0000000600)=0xc) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r1, 0x4010ae74, &(0x7f0000000480)={0x62, 0x7ff, 0x3}) r3 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x8, 0x0, 0x83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f0000000700)=""/48, 0xfffffffffffffdd6, 0x2) r4 = dup(r3) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="757365722e72616d6673009180702c5c32c264e2fb942c886e56cadace92984058034b703297f69329773a43088597e4b66b83854dad57a2d3f298b93b4f6145108535af109748fad9e04790d0f5393c0581e9308823edb6fcc78cd7b59b1a8e7e72fe5114c6c96895dc62fcad4ced1aaa4117925318bc4021874fc6646aa9c8ad578830466fc737f3d1e0a5cba435326fe732377d764a"], &(0x7f0000000cc0)=""/4096, 0x1000) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x28, &(0x7f00000003c0)=0x202}) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f0000000440)) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4004240b, &(0x7f0000000340)={0x7, 0x70, 0xfffffffffffffffe, 0xffff, 0x5, 0xcece, 0x0, 0x9, 0x8040, 0x4, 0x8, 0x3ff, 0x4, 0x7, 0x2, 0x4, 0xd5, 0x0, 0x4, 0xa00000000, 0x0, 0x2, 0x3f, 0x2, 0x8000, 0x3, 0x5, 0x103, 0x3f9, 0x4, 0x360711aa, 0x8b, 0x1, 0x7fffffff, 0xa195, 0x8, 0x800, 0x8, 0x0, 0x9, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x10, 0x1, 0x3, 0x7, 0x8, 0xb95, 0x9}) umount2(&(0x7f0000000680)='./file0\x00', 0x40004) 12:32:28 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000040)='\x00', &(0x7f0000000200)='ramfs\x00', &(0x7f0000000240)='pproc@\x00', &(0x7f0000000280)='ramfs\x00', &(0x7f00000002c0)='ramfs\x00', &(0x7f0000000300)=']\x00', &(0x7f0000000340)='ramfs\x00', &(0x7f0000000380)='ramfs\x00', &(0x7f0000000440)='ramfs\x00'], &(0x7f0000000580)=[&(0x7f00000004c0)='-{lo\x00', &(0x7f0000000500)='ramfs\x00', &(0x7f0000000540)='\x00']) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000600)='.\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000005c0)=@md0='/dev/md0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)='fuse\x00', 0x1040000, &(0x7f0000000700)='vmnet1*}^!vmnet0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:28 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfcffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfbffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:28 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x140, 0x0) sendto$inet(r0, &(0x7f0000000280)="430951f21da957e0dc48849190ad0f7b9a8333aec57736052487e99af3a3ad78ed26bc48bd8b6631d2c2274ca9a75df28e443314e72351a7231f0747e54d36", 0x3f, 0x4000000, &(0x7f00000002c0)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x400) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x7}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r2, 0x2}, 0x8) 12:32:28 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:28 executing program 4: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f0000000200)=@md5={0x1, "fd94d8a9b79b1d78ceb205101cf4383a"}, 0x11, 0x1) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000280)='team\x00') getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000340)={@mcast2, 0x0}, &(0x7f0000000380)=0x14) accept4$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000008c0)=0x14, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000900)={{{@in=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000a00)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@loopback}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000b80)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001cc0)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d00)={'ip6_vti0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002440)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000002540)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002580)={{{@in6=@mcast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000002680)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f00000026c0)={@ipv4={[], [], @remote}, 0x0}, &(0x7f0000002700)=0x14) accept4(r1, &(0x7f0000002800)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002880)=0x80, 0x80000) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000007440)={0x0, @local, @multicast2}, &(0x7f0000007480)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000007500)={{{@in6=@ipv4={[], [], @multicast2}, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in=@loopback}}, &(0x7f0000007600)=0xe8) getsockname$packet(r1, &(0x7f0000007640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000007680)=0x14) recvmsg(r1, &(0x7f0000008b80)={&(0x7f0000007780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x80, &(0x7f0000008a40)=[{&(0x7f0000007800)=""/221, 0xdd}, {&(0x7f0000007900)=""/25, 0x19}, {&(0x7f0000007940)=""/238, 0xee}, {&(0x7f0000007a40)=""/4096, 0x1000}], 0x4, &(0x7f0000008a80)=""/218, 0xda}, 0x40002000) getsockname(r1, &(0x7f0000000440)=@hci={0x1f, 0x0}, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000008c80)={'ipddp0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000008cc0)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@loopback}}, &(0x7f0000008dc0)=0xe8) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000009540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80800}, 0xc, &(0x7f0000009500)={&(0x7f0000008e00)=ANY=[@ANYBLOB="e0060000", @ANYRES16=r2, @ANYBLOB="040225bd7000fedbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000800000008000100", @ANYRES32=r4, @ANYBLOB="b800020038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400f30000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040005000000080007000000000008000100", @ANYRES32=r6, @ANYBLOB="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", @ANYRES32=r7, @ANYBLOB="08000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000304060000000400040008000600"/64, @ANYRES32=r8, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b000000080004000001000008000700000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r10, @ANYBLOB="080007000000000008000100", @ANYRES32=r11, @ANYBLOB="0400020008000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=r13, @ANYBLOB="2c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r15, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400030000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400326500040400000008000100", @ANYRES32=r16, @ANYBLOB="0c0102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="08000700000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c000400ffff0808010001000180830030b80000080004050000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000008000600", @ANYRES32=r19], 0x6e0}, 0x1, 0x0, 0x0, 0x80}, 0x40) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:28 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfdffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:28 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000080)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:28 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xfeffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) io_uring_setup(0xe2f, &(0x7f0000000000)={0x0, 0x0, 0x2, 0x3, 0x2fe}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:29 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xffffffff00000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:29 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x88800) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000180)={@mcast2, 0x3, 0x0, 0x0, 0x4, 0x9, 0x9}, &(0x7f00000001c0)=0x20) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:29 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x103000, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x3, 0x4) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:29 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, 0x0, 0x0, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000180)={'veth0_to_team\x00', {0x2, 0x4e24, @multicast1}}) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x800, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000340)) openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x206000, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0x799, 0x45) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f0000000240)) r3 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x8, 0x200) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000080)=0xffffffffffff0000, 0x4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000040)) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) write$P9_RLOCK(r1, &(0x7f0000000000)={0x8, 0x35, 0x2, 0x1}, 0x8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x40000002) 12:32:30 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x200001, 0x0) ioctl$KVM_GET_API_VERSION(r0, 0xae00, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$can_bcm(0x1d, 0x2, 0x2) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000180)='./file0\x00') 12:32:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x101400, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000200)={0x7fffffff, 0x7, 0xb0}) sched_setaffinity(r0, 0x287, &(0x7f0000000240)=0x1f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:30 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000180)={'U-', 0xff}, 0x28, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x88200, 0x0) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000240)=0x2) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f0000000400)=0xe8) lsetxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000440)=@v3={0x3000000, [{0x1, 0x8b6f}, {0x20a, 0xf780}], r1}, 0x18, 0x1) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:30 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2000, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r1, 0x408c563e, &(0x7f0000000280)={0x7, 0xb, 0x2a, "1c01237799fce3ad1c5fd29aa6b1cb50b5cb808eb7b11559b44f11e57542e77e5f4984d9335a141708d78500f7aa589884e16277bf38955225b46a66", 0x1b, "0791117600c19f92a28c6935e5ecebd7ed7a930a308f68bf85beebe65a931adf62cedd36d08c2b619e4fd6d6b9cbf72d5ebe9a890aaad7448af30648", 0x8}) symlink(0x0, &(0x7f0000000080)='./file0\x00') perf_event_open(&(0x7f0000000200)={0x3, 0x70, 0x4, 0x20, 0x4, 0x4, 0x0, 0x1f, 0x3a0, 0x8, 0xd1, 0x5, 0x9, 0x5aef, 0x10000, 0x5, 0x7, 0xfffffffffffffc00, 0xffffffff, 0x8, 0x9, 0x9, 0x9, 0x7, 0x7ff, 0x50, 0x99a, 0x1, 0x80000001, 0xfffffffffffffff9, 0x5, 0x400, 0x8, 0x4, 0x6, 0x3, 0x918, 0xffffffff, 0x0, 0x4, 0x0, @perf_config_ext={0x80, 0x8}, 0x200, 0xe76, 0x6, 0x0, 0x9, 0xffffffffffffffff, 0x100000001}, 0xffffffffffffffff, 0x6, r0, 0x0) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f0000000200)={0x0, 0x200000007ffe, 0x4, &(0x7f0000000240)=0x3}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x20000008100000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:31 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) eventfd2(0x1, 0x80000) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x3, 0x70, 0x0, 0x5, 0xffffffffffff0001, 0xfffffffffffffffd, 0x0, 0x2f9ee2d5, 0x4000, 0x2, 0x0, 0x80000001, 0x3f, 0x8, 0x5, 0x1, 0xa1, 0x0, 0x400, 0x2, 0x5, 0x8, 0x7, 0x13b, 0xff, 0x2, 0x3f, 0x7f, 0x3f8, 0x200, 0x0, 0x4, 0x4, 0x0, 0xe27, 0x9, 0x1, 0x5, 0x0, 0xb0, 0x4, @perf_config_ext={0xfffffffffffffffe, 0x7f}, 0x400, 0xdac7, 0x80000000, 0x0, 0x5, 0x0, 0x6}, r1, 0xf, r0, 0x2) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x40) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b40)={0x0, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000b00)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4004240b, &(0x7f0000000bc0)={0x2, 0x70, 0xd8c, 0x0, 0xe50, 0x100000001, 0x0, 0x0, 0x80000, 0x4, 0x5, 0x40, 0xd63c, 0x6, 0x7fffffff, 0x0, 0x66fe, 0x1, 0xfffffffffffeffff, 0xc61d, 0xf1, 0x5, 0x0, 0x6, 0x3, 0x3, 0x6, 0x4, 0x7872, 0x5, 0xf8b, 0x1, 0x3fffffffc00000, 0xfffffffffffffffe, 0x80, 0x378, 0x8, 0x1, 0x0, 0xff, 0x1, @perf_bp={&(0x7f0000000b80), 0x1}, 0x30018, 0x5, 0x4, 0x2, 0x9, 0x7f, 0x5}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/snapshot\x00', 0x40000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001e80)={0x0, r1, 0xd5b05b1cdc019f88, 0x2}, 0x14) ioctl$KVM_GET_MP_STATE(r1, 0x8004ae98, &(0x7f0000001cc0)) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001e00)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000001d00)="7ce3cd05c50304091f23b8e8ca5ac1a6df3f522717f398b1e17a24323dc20439e61a966d100fb0e4deb239a30d0eb0771cd469c0067ebaaccff832114ae106f59054e1c9d5d01e4465e5ce3e11200c5fc799888f044327323ec7b33549d0f9e21926aa49a5c67bcb05042573aec412b000d3c11c824c0b32b5ac599772cb6acb6de8e6d2beae2ad85131ed26f9b5c33d12d3478f13d1cc98d8230b4a81eee11899a7a528d5f64785c3de781a42b371665139c8c23520171e8b71a96927f3d6587bb29e9adebd983bc8c09ccf5c3805ceb45f5c6ce10f6c198133b8a1620c6534d0245d36c2e20360", 0xe8, r0}, 0x68) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) sendmmsg(r2, &(0x7f0000000ac0)=[{{&(0x7f0000000200)=@in={0x2, 0x4e23, @broadcast}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000400)="bb011ef5bb041473d851945e9757ab73b2e412662a723075e37139663f9844b500e940ff451c39e05a10b2b5a5f8d479fc79c4e01b66bc83c3d646b4788002bcd98eebf21079af65954fa31f6480c19ec94347d05c5bb275a046", 0x5a}, {&(0x7f0000000480)="55d967896e1254293f0e5751e13bfcccbbac477234d21bab1b0422bf3f770c08e6ce7d525c770790c8b46d84d61cf48f60a25311083868bb7671271cc50fe9203cad143245585c1077ccc7d6af7c97153449fb8439665781eaec4903d377ed31449d367f9268ed4bd84e617eb20e2a2ec0b0de74b493f47f25a8aa188f3ba6dc9f9bf5b1491aed03e119c865286f2cf158ffe0b5828aae9a93c9e57985a144a5cb17857cfc0705eede31e0f20eb47447cd7aef62af63ba74f7f581664473ba4ecc4ca56c5d73b02602363bc541c896", 0xcf}, {&(0x7f0000000cc0)="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", 0x1000}, {&(0x7f0000000580)="0eebc5990217b1611239d332a2cc66fec890c838e747c85fe3328906c30f808efe06b66d7b55c08f98aaea2e1905510e0c4bdddf02557f451d27353a387c86f81ca13af3794b2db7003d0e861642b522127803f23b53ce6ec42d0f1e3971681c519e5bd721b7b2af0263a3ba850bf18070f878883fd9f95e105381e955e145f83d402a9ea42cf6417f7604daa19bb943bc30df16dc2d287c029f3895fa2e484f", 0xa0}, {&(0x7f0000000680)="3bf45f59d62bb6f400bf17df9fdb8a9f8b0ad9f1e419c52293dab74821a0c78e5c58293055468e0f662eb39922e106fd2a98472e075fc4cfe40968149ab59bea6097a6a5d2897ae77262b396cc03b001a3aa639d1914a93c39080e127678fce72bb6726a262d9c5d6a633558945ff75b9aafd1def9958734f25207a9fb080b77cfa9c1e84eb6173334bb881604751510adacfdf80cf4d285d5f296ea9a02491d1688d66916fe74bc2fa5e5c8fc16d94eac321a0fdf8be4649594c8821b92eb183f5b15e3688d297dbc1e9b365fd1d18d00876a449f871e457868fdbfc4b43b628f92e540dfdfceab9b6326b5d8d39b", 0xef}, {&(0x7f0000000040)="294c0a6913620e0d73e476a9caff083fb58e9d33df63242d013f05339a72", 0x1e}, {&(0x7f00000000c0)="cd16dc5636f6a67d07389c404ffd09cc8f31399f5dd36630e002cbce04190312072ae7317fac6a7d211512e2793542115f7e6ccefd768eff74fef4c7", 0x3c}, {&(0x7f0000000180)="9af9216d9e2d20b798b4a10eae2ce24040178c2dc0", 0x15}], 0x8, &(0x7f0000004080)=ANY=[@ANYBLOB="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"/5083], 0x1388}, 0x4}, {{&(0x7f0000000780)=@nfc={0x27, 0x0, 0x0, 0x4}, 0x80, &(0x7f0000000300)=[{&(0x7f0000000800)="8ff5389f80d4925d07930832b49707e6b660826fa5cad8ea6895ea5cc132fa2c7eabe851546c736a4462c73c28d9c73e18e7e5960c5e804ec744cecefe5871ddde46a87de18bc4918f0709eeae", 0x4d}, {&(0x7f0000000880)="5c6edbff53473b7f4b4150187109ae39bd4d4eadbbda6edbe7130025d9ae3490b2d603666badaeb2b3a49ec1d797aea374e0d52a8ddd542d16df09287a22a5fcf3d3790d1166b24573083ffd4ec5c025f0e50ca565c50e4d0df1c6f3bf9d2215ae25e068b8ccacf0b290a9ef7fdfd9945202fbfc294238b87e3acfe0516f90a2a419c0bd7f8ba6f156ee3135a51976009f3f6c39e847904f60eb1dffd167", 0x9e}, {&(0x7f0000003080)="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", 0x1000}, {&(0x7f0000000940)="7ffb563a77ff58adb9a92fa502092bfc45264b64f32bdc7cffb14b611e138fee1c1b71620b6f243cdee3b026f3ace7ffce16cf8a950537c46a76e291968af736364747b83729dc4db580d4d05989653d82f18fc125b968b4cf2811ee9fbae92c6e67d6cb01903e19b0c3951789b575ad7be229b37d680b40840addc1d680c78bf41f3505fb0b4f627a3c36334a5961b0442b4c4174b04002eee334433d1f698a4092db29d1cad0742868b94ad50b709f4cb7e1f7a6b85d607e7d591bbd8e96", 0xbf}], 0x4, &(0x7f0000000a00)=[{0xa8, 0x10f, 0x8, "43dafcc8ac00b78e32935f76683e331acd5742ae165da599dc82f025948779185c87d711ae2290deb515358c864c5b06ad5ae3e2c71f93818e1e06bc0e2c0bc8c81de50dd1d55fe1637dcbb057fe82a86bbb29096e8db8f6060049f150a8ab1f269ba7f3699dab641dfa0bc98916a927eaa823a00353583c708d3d7be286a1b7bc7387f48c064e3b09fc23bce077e9b4f25b0555c477709301173f3a"}, {0x14, 0x0, 0x8, "00a82ded83ec3fa9"}], 0xbc}, 0x1}], 0x2, 0x10) unlink(&(0x7f00000002c0)='./file0\x00') 12:32:31 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000180)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0xcd, &(0x7f00000001c0)=""/21, &(0x7f0000000200)=0x15) 12:32:32 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000040)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:32 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000040)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) getdents(r1, &(0x7f0000000200)=""/39, 0x27) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000040)={0x101, 0x1, 0x2, 0x0, 0x0, [{r0, 0x0, 0x6}, {r0, 0x0, 0x7ad3a629}]}) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000180), 0x7ff) 12:32:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:32 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x4000000000000100) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') ustat(0xfffffffffffffe00, &(0x7f0000000040)) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSWINSZ(r1, 0x5414, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:33 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/114, 0x72) truncate(&(0x7f0000000040)='./file0\x00', 0x7) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000280)={{0x7e, @loopback, 0x4e21, 0x4, 'sed\x00', 0x8, 0x7ff, 0x25}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x4e24, 0x10000, 0x81, 0x20, 0x800}}, 0x44) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000200)={0x74, ""/116}) unlink(&(0x7f0000000000)='./file0\x00') 12:32:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) [ 1101.565667][ T8457] IPVS: set_ctl: invalid protocol: 126 127.0.0.1:20001 12:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:33 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x404200, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r1, 0x300, 0x70bd2d, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8}}, ["", "", "", "", "", ""]}, 0x24}}, 0x1) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) 12:32:33 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x10000, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000040), &(0x7f00000000c0)=0x4) getsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000180), &(0x7f0000000200)=0x4) unlink(&(0x7f00000002c0)='./file0\x00') 12:32:33 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:33 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 1: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)=""/114, 0x72) truncate(&(0x7f0000000040)='./file0\x00', 0x7) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:34 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) sched_setaffinity(r0, 0x2a1, &(0x7f0000000140)=0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:34 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@RTM_NEWNSID={0x14, 0x58, 0x202, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 1: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x12, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000200)=""/142, 0x8e}, &(0x7f00000002c0), 0x40}, 0x20) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:34 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x2, 0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000200)) unlink(&(0x7f0000000000)='./file0\x00') 12:32:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:34 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x80240, 0x20) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r1, 0x600, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x5, 0x1, 0x6, 0x9}}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x20008080}, 0x1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x4) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:35 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:35 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000340), &(0x7f0000000400)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f00000000c0)='./file0\x00') r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4c002, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000200)={0xffffffff, {{0x2, 0x4e22, @empty}}, {{0x2, 0x4e21, @remote}}}, 0x104) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:35 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, r0, 0x0, 0x1d, &(0x7f0000000200)='securityproc]wlan0{,vboxnet1\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4200, r3, 0x6, 0x100000) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$peek(0x2, r4, &(0x7f0000000040)) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:35 executing program 1: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup(r0) rmdir(&(0x7f0000000000)='./file0\x00') ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000040)=0x12, 0x4) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000300)={{&(0x7f0000000200)=""/142, 0x8e}, &(0x7f00000002c0), 0x40}, 0x20) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 12:32:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:36 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:36 executing program 2: r0 = dup(0xffffffffffffff9c) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000040)={@rand_addr, @local, 0x0}, &(0x7f0000000080)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000180)={r1, 0x1, 0x6, @broadcast}, 0x10) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$input_event(r0, &(0x7f0000000200)={{0x77359400}, 0x2, 0x3, 0x5}, 0x10) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}, 0x7}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0, 0x1e}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x4, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:36 executing program 3: getrlimit(0x2, &(0x7f0000000040)) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:36 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:36 executing program 2: mkdir(&(0x7f00000002c0)='./file0\x00', 0x100) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) 12:32:36 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:36 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x52, 0x10100) ioctl$NBD_CLEAR_QUE(r0, 0xab05) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) mount(&(0x7f0000000280)=ANY=[@ANYBLOB="2f9bff2edd1e8aa737143a1979ff54e2"], &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x20, &(0x7f0000000200)='(\x00') ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:36 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000200)="d8590d899d42ced630bb65f5a48a7baf19edc67a4916adcaad80413e1cbb14871cc7fa3ae9f95737921e18bcb49295e7bb0e4ecb85ce5b0430e50313c6692538776940ce633d36278c271e90ccd79415a98104f3952b3f38484a738383906f477c4459b1f590d3a3bb25d07a6f46b47dfa9839979c1a07bb585896f75762c48e8adc64aba178929ba49b29e5425d03cdd619e4025e29af3de43d9fefd7a137b3bef2381a91dda4537a586a61936071057e", 0xb1, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x1}, &(0x7f0000000680)="16b5dc36069c732902eb3e04e78b6255073e12ce4c1a22a7e3ae1f53339ebbe9f6c34e97352bdd0cf5552b805b0203d9e990cc19fdec701f9399b3a8545b2e3c70b105325dd73a58f8461d33f733a746ff47004dea7b89bac907e7b1cd07c2468c7ea41a876f59ebe112df6801", 0x6d, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, r0, &(0x7f0000000180)=[{&(0x7f0000000cc0)="2592621973620fb7ea6c58c4e3ca10c4a1068398bfed26832a511271d78dc2de1174975e9f404afc73cb17a4b5142124d12f5c397026446ea3f2df1717f18ca1dea6e6d9c072a595c1650821e0e631af119c593efd5b6bb1c9211e38c6efe4f8e06dc7c75ca468041985d04f0a2722a6185c9e7770c32d5cf309f0b088f6001dc9261918fe8f224e3eab362fe0e1b0d1bf0db08e49fd300da08313c3a9e6ba50de0676cb0e2e5fb86aa18c17a3f73a5bfce25e549fcfebc3879b443b20fdc9af8abd26139cd2105acae0cd035daa995267446ccde34d6a5f8948215f90e43d207bb6798f6a8f163ea9f15da8377b47a911d4ad7411e47c11707281fa2f45372f744d50bf3ae2ddbe8075d5206eb50d59c869ed345575014bfaace39f294acc4fc1c4270aaf0587f203f010c54efe52f0eb4c7cd412953eb812f196c170e84513e81069ce1372dffe0ea96e070fd74d834d312ed1749a65504571220446419a6be2f2561ab3f343c10dbea0b9c52b18a8e540c49c3cdfa7c6cae4ad2cf2288a14869c4a1866dd4a20f7e1674b4782893e3bbff6626da647aa9a8d52801af4c374e5ad476267a20bb9abe252e9f3644bb0f4688226e5fcf5d902814f56c524387978b7f6e57167ca25ac81f37cce3f1585641d530ecfab20dce0983cd23342aeac18d06aa5444c8e39c2c77f49ebb702ceec524a8f38ec930ad3d43195f081efca2ca244f4f0553d2d06004625b65416b29fba01cdb9d31b745b9b7c9078c74c04b02a2e7cbe32daaced723f7e43c474b2911fc8f5e1c8e98a502d9f4ea98c9d42c88d842f9305cd594af096ea3cc953a7a749816f4d3aa70178322c6f2c7d557316af4ba133845150bd9d3606ce57063b72658a1508da776d13202f7746870a2a1c7d9e63dd86dc1a92e2886341134c5c43e3d6ba3faa4ced12d7f97f3cd32368e42199b7d5123b0910a3ae33664ba3d5103fec44bed353d4dbc91b18d8d75c2c1dbb2fdeca4e000f5fd3d15a7de8cb50d5162e66a89fc4be2f9d317b72ce5ddfac7d36519df1f95f8816c81db3e4146dbac95fb4a2745a2fbdd58a2830a608e0d4631e59be98a5feab60ecd58d2bddebad8bf6e4c4dc18c5c94a3c66228004a170c5ce9e9fca2ee555299eda3b1219b4491df811ca299163f50fd1cf6281e5ef680bae3384f806927baed5d6c9f135af16750295130f163ecbccebc53074f8c7f4f809bc512af928764e529b243ad71ddc04e3a01635cf4bfda03d5f509ba7c80099703a1b8fcc7b5e23e57e759978f5769852b1f91c3fee0c28a4f94c8727356cadb2e92d1ea95a9781df08568a57719a13f30d513b63807b33a8f57501b785c8665a9f38019461927b83e144f180426ce2586cbe7215cbf30dffc48208fc52ec202f9544f3bfbc9f96e879fefc0c989fa3e0a3f7e59c93ecda97e2117758fa1b012cc656ae2e05120fbe7e8c7b56fc4956890355b372a780fab6b2f9c5a455a2a470674b8f02c547bcc70aa5380668bec3d39d49c0a70e7e91fbd21de9bf3285b4c33d5e5863532a7558bd87654fd141b39be71f1802da67ac44c658b8bb62525b6af2eb513d1c3e11f1a21a46269781f5c5c28f6d9e54c3f3dfcb62713e88480a81a2d2f0e1bdbe3c1e8124c44d39e7c88f520304191da8fd728f0a13db4082fac7e5b6c6758adfa313e0c29f2ecf7fee1cff24d520228dc4f00c86acfd6e21e5b42791a28b201eb139774c7b3c29eb527c627aaf6fa781c2f2c9684e1b9cc00b4636f39a8ca7ae7c7041d7cf644035c2db6f3f90e0d1939916244d2264f1ba385ab6b633eeac379b0dfe2eb44d69390746ea99aa820acf2d289756e9a874b87935535256c2d27a5154349ac4157a6cd00b1906104d3162793839d90317b3e6f415708e421f2f2547aeaeb7315779fbe46866b2b8882129b59e88638f4624345f0c5a7fc417ad3b5481d1f135a369ee483f2ece041706677a7814221ee8965c4f94658dbe53f37e62cd1ade7b2588a6411c4bcc6354d7cc900c80030ab3b64596fb134a0a9794cb7ed43b8040c2f2b68490dbf4cc054156ca684354bb6622c788aa6e2a1dfd9670e05f15465ecada730486cb5c61ed89c05c118a12f3433dc35c8c97f1462bcdcb67406863e143923412bc3f52338999d05276bcc8ff05d0eee7ac098ee9eb785273a26cafa593fe04ad45acf119b469e0df9083ffe53a15cf93a77eec2e0c1486520e6c88d62c155611e6f3c56821b6df7a15d73c9717029a9c664f0cc5ccedc74bf23735e69bb656c7980c552ad60b0abc2ac026102b727b28aabf14e0be9a30e8332a04b98c8f7bbe63610ef16b97a8f1077b96968b460d5fb08bbed0ca5ec32e851e4c2887a75a30eddd2535ccd2857934ea049dadab3d697e7aa430b77f4c244d94e553dbf569e07d1a2c4ce5ff4110452df43ca3144d20777c2d31e94352486d838a7b52e8188d4b3adcc872c08a50acc18685e613e5f4a758bb3e1eacc5dedd364e602c2b0652ae909b0a63d3cb3df64b7b3e22c68dfcf87306c8bd683ce432385cf6ce84be0be7d0deae0b783c437f2819ac14b4e3b9d4d74e7d3ad31b1956dcfe3c0f26674bf5212e5cd68ed6791c77bba372ec209c47d98e520fcf3250bbeda6a0d84cc5760ba6e0ed976086dd70405999d756eeb17d4e4044d70da617ba587573796479c213446a96eb8dc8597f8a14ad2d4409b012b6b7d1c3e6e9fd26a140ac10f7171878b79b0b022dd7fc675e2164dc6e9c6fa07b204465f2193428eb1c5b17a98fa5d030332c51e134eaadb0242b771055753bfcdf43fa2054c3e1376298a5915d8c4f4680443851becb5c8fa27312ae38acf2d9f82fbcf022576a8a3dac0d8c54014074bc1015ea3cd25fe040021671c10166f99a339f2f52a079778b3e31d84b1dd7ec400b091333a52787f4c219950d697911eddb457c599c58c587e38787b96a8431393c06fa2f2ca369cf4279d282f4e2e668592aa1f517e17f59ff36a7ffdddb9a0c17ece021a80d84ecab71c634717f9a8fcb66ead3284a1fe6ec97dc03345e6f68f4aeb7ed369bba3eaf8848f82141007276ab71e0d6c5086040c28355f0a4d81ed987a260ffd4623957afab937d67857d68f8c978ca339d44bd1a3236347cf6a6f6506fae43f54efb48cd93d23a65e411f1c782ca6815b26ab0bbf2ceb9d749ee4adaa2115b3f78cdeedeb2f00e180d174ba3fb8044e9a9b8291a6cde2589170ec501426957426f28eb574af6d27ce5a4748f620f8a6644331bf880523f1c92457f32e04097cd6db32e537ef9c39a041e294e5c5ba029b20246aa312358a356da5f9ccfcc055ddf4b6df76c7c61c3406f57e9ccd90d63f2c9fc6e802531847ef1cb2df6dfec625dbe7bc5c3a4f750e162c98029c454e1697aba302fd11b415e489b44a32d535164ccfaa17b96d80caceca2c7c9d143139af64dd5f093ed42705c480482eafc4e80acd32de2209dc9322a2ea8b9f31cec7b0211a374219f23477314c87ea7e80b8c361c1309e4b483bc3a7e04f687699c6ac275ac4755e57ed07bfc7f8fdb4af32a5f97f5c5a3e06f8f1ab131c39f37fd7f25dde6f5cb69c6b31919787bf7e8a20b0d9498b6dc7fa1aa5c74b81b7691435eca4095e7f0c602b012f656c44dbd3b8a70ab2c4ef68d3cfcd53f9f87a421ce300659bfb10b480a1a49567b0d27b830cb2515f5e3dd15329c85964fbf2737909b8c58fa4b6ebcd57f508542269f38eda3f5e06e30828b2a1fb290fb7f965964ed9bef5311e17be490ed6bddb3cfecdcd52c93503d994b2c2f3a8e179d3f8519d84853825ae51a0945e9f39df7f674ade3dc701f58e576d3aac987eafa99cc7ca77fe27b2cbffc37d54a170fca6200a0d92673d7d8e5a139b313daff9ca7f207f179cef9173e4223ecb1e936f22d2224da1a4bbda46897e5f146266e5f66a152536a211b4bb548b88e68a25491c3739a36d7d4887a7232ef441b11e3f0452b85e7c928c7ceeb587548a1ace3675e6be03fa698d3672156ab14a1d978202d636fa53b2c9efa07cdd72a46afe1b1e2e39a9b1ee40cb0bf23562166ec52fb511161e8f44081d308672d416287d8b9176aa6b886e3a3f11deba27af4e0e751b0057d21bfed61c06f9e1d6f9ee5713b1664c6181cee6e4dd57b8002ba3cc73854f89edf1bd6c573963ca1068fd65ee3a29d6464463fc0febba85b789dd2c076045a6777e04bf045896af5c576f77ecae7fb293a2245a61f2410de999fca40d31f446a1b9456a3a8f327ff824e577e2ceff856d4ec1a4a8fef4bef108e79b2073641bc1b27ef3c5092ab07423a4ba8595cb421ff2798033ce87f7ae3bc105c47aeb0ee9d477a48aa19967a6358e4908ad951b7bc04dd32ac826e15b0c6a6a36ad0fad6a2b453df294ca02626102168536a208dce3d30f142db775cf2db787381e9df62bf7904dad71986d76f3bde6749e4f41d6e7d8df65e53a91189b51aa24f4b5ac870f81bcb94b8209bb4714aa4350eeb8feecdeb3c574eab9bf3af3d6c155de494cd71dc9f7995df96ca593649eff084c3c4f411b9a289c8d9279ddf96851a3238f1bd418a2ebb9128abfedff85faff2fe5c574e7b72d0b389a755727614234be9c42a7657879b08a0cb057c7e0fc0fb1996afe5943df42057391065f4bdb109d19e276e752fa9f890d9042c70a97ce324998b474821c76655d1ca24464225d85ca1e1a2c4c3382054c5facbdbbe484e8915111f522e4b53498d3d5780377de142318afdf470efa65ac699fc98d18df5d5f0ee71f848c032916d4d7f81cef4bc73f8ef597ca78a9305c594300937f483163993017e4d0a08caf3801ecfad7469dce697455be1b6c9f2b236988101bb2b9a6f09cc82edea63343d8ee96bd1987d91ca1a6be6432525d5e2a390ef4ef9f880b3b17d8c5f9dec01fcb6ab329b01526db70476e4c209b60a3bae7598adf0c0ebbfd56132a71a5d0c1d8be630a9652d14bd4ab90eeb11ee22288cc7ad8d79ea6305b298c32c021c0b5b07ccb5d2075eda356d74592a799526e60f6e49975b166d17dde76c30d804712dabc5a37504e35a04e47c8cd18bbc2bcbc848ef2d3d4f127fe788c1e8d316baf48f3b9ffa02b26a1e6cb4c846564ad597e4bb84702fd3b52e4bd48ce3bbdeb6e93f4c03ce124910fce02ac28af3c774cbb8f6d8dd8316bb9b90f39565260577c2d6f077b8e7e3205db4dcab98e3846b23d711a9a8fe2c25e0c3c9f1de50cb7ab859da0352fc91ce4fc3e8f5cf8e118a455ef73dd5f1264ccefb0caec1ba8218b15a1711d82e5cb7f9b88b55a5e5745b3cda1ef516901ec1ea44fbd4386c1b40bf5551c5e308b931e3daa0f5eac7b5127d68301b3f95f41ce1a986105d97ace1d165f8dd0b720eb7d4e15212590c99e6649151bca656ca23cf462617e2f353bcc4c5a6f463ca93072a58681628c201b06f0ca42453670240b25360ef5d841563813e3f5d127827143df53f0f5df174e2bf710d4a5ff51c48190300f2bc66ad83e5fdd97935790072dd9dc00435dc4cb7bb16b0f67fb237e29c44284b8af148983ef0ff38feb5dfb89d3d55b7ce857bca718eb1afc00671f8317c070bf7eb2d12a97b5848268a415db0ddb739e084ab9214b5f1ab9047d181bcc1bc31b6011f7ed8c4e0c53292651e3c2877b43855c047ace1644e065b44964bfb37d85faeaf67dc5aaacc6a7f6d055830a0dd8b015ece7758d752800fa3283ab05d8ee04efcf3a067d301b3bd26bf364d90ca35836d8e85625547d604f2c169526eb1af", 0x1000}, {&(0x7f0000000400)="9d0fc3edbdf8c48228452be92099fd8f6b3a5e53e424b552dc8c8b0f3086ce1e3c553d4d89807bc08b6b614c014ca63df048ebcdd6fcdb2cc7d5b96c1279fccfea8c27e052bed052b58e5c2b6c528d9393534671d44ce61850c509f1dd3a4d7a6380b925fa630c3cc718d1f9d7461c146187df2c754ec85ea025ff3e8ae43f7059ad2eabb273708f65e6444e6141c0c5f764ffc878", 0x95}, {&(0x7f00000002c0)="a984699bf5bf3b95d261b9c0beda57cd61e68447247d76eb37ce9dbd49494e00af30bdddda3dcc831d9d591c35ea7ca24b28a7cfbce41ad23fed0452cb97a54dc821217e2e577c1627515b294e11ddf2ec23a52c1cf1d9415297a4a8f3d909f5bb43fb5285b79b1fe99c742d7633bbec", 0x70}, {&(0x7f00000004c0)="149624a14970bb05d97ddbb9aec7241a64553cdabde4bcff415c9d56992d7d8176d7e6984c876d707ce27e9c5c69117cbee3ad2d78a3e826f73fe4b4b00e19e71378ab5f60613b48cd371ce29f98dca53f1ebf0f51593a48aa3b68541171b8dc32b4deebbd8707a50c8dfda3bf8f28082e7dedaa9d52a1e4f2a49d620554df355c2ffec7fee167f78da1cebb8a9365d801b40ec5a6c2d0de3542796d1d0d6a899f774276f6ab83", 0xa7}], 0x4, r1) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:37 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@RTM_NEWNSID={0x14, 0x58, 0x202, 0x70bd27, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x10) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:37 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x4, 0x10000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000180)=r1) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000240)='eth0selinux(\x00', &(0x7f0000000280)='nodevcgroupposix_acl_accesscpuset:ppp0trusted%trustedloem0{\x00', &(0x7f00000002c0)='\x00'], &(0x7f0000000380)=[&(0x7f0000000340)='\x00']) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={r0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80000, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000200)={0x7, 0x0, [], {0x0, @bt={0x10001, 0x20, 0x1, 0x1, 0x9, 0x1ff, 0x6, 0x3, 0x6625, 0x10001, 0x8, 0x1800, 0x3, 0x1, 0x8}}}) unlink(&(0x7f0000000000)='./file0\x00') 12:32:37 executing program 1: getrlimit(0x2, &(0x7f0000000040)) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:37 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={r0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 1: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 0: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80280) setsockopt$MISDN_TIME_STAMP(r0, 0x0, 0x1, &(0x7f0000000240)=0x7, 0x4) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0485510, &(0x7f00000002c0)={0x200, 0x1, 0xf7a8, 0x9, &(0x7f0000000280)=[{}]}) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) r3 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) mlockall(0x2) chdir(&(0x7f0000000c80)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r2, 0x800443d3, &(0x7f0000000000)={{0x80, 0x401, 0x4, 0x4, 0x2, 0x400000000000000}, 0x0, 0x9, 0x80000001}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4018641b, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x0, 0x2, 0x80, &(0x7f0000ffe000/0x1000)=nil, 0x5}) 12:32:37 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') prctl$PR_SET_UNALIGN(0x6, 0x1) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:37 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:37 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40086410, &(0x7f0000000180)={0xa, &(0x7f0000000080)="2904f3fbeae87d0eb716"}) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={r0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 1: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) dup(r3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r0, 0xc0945662, &(0x7f0000000200)={0x2, 0x0, [], {0x0, @bt={0x80000000, 0xfff, 0x0, 0x1, 0xa8, 0x94, 0x100000000, 0x3, 0x100, 0x400, 0x2, 0x7fff, 0x5, 0x2e, 0x8, 0x8}}}) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:38 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x2000, 0x80) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000180)={r1, 0x1}) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000007c0)={0x1, 0x0, 0x2080, {0x1, 0xf000, 0x1}, [], "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", "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"}) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 5: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x2800, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r2, 0xc008ae05, &(0x7f00000002c0)=""/211) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000000c0)={0x400, 0x5, 0xfffffffffffff001}) r4 = dup(r3) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.selinux\x00', &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x3) ioctl$KVM_HAS_DEVICE_ATTR(r4, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000540)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 0: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x8000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:38 executing program 1: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xc000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:38 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) modify_ldt$write2(0x11, &(0x7f0000000040)={0x3, 0x0, 0x4000, 0x4, 0x8d, 0x7, 0xa8a, 0x3ff, 0x9, 0xc0ae}, 0x10) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:38 executing program 2: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x20000, 0x0) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) sched_setaffinity(r1, 0x613, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffffffffffe, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:38 executing program 5: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0xa000000, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:39 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:39 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x800, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000002c0)={0x3, 'bond_slave_0\x00', 0x1}, 0x18) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$KVM_HAS_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f0000000400)={0x0, 0x8000, 0x4, &(0x7f00000003c0)=0x2}) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f0000000200)={&(0x7f00000001c0)=[0x100000000, 0x3, 0xfc34], 0x3, 0xfffffffffffffffc, 0x6, 0xc4, 0x9, 0x9, {0x8001, 0x1, 0xd2, 0x73, 0x100000000, 0x10001, 0x378, 0x7fff, 0xfff, 0x40af, 0x2, 0x80, 0x1, 0x0, "32251d879373dfaac63e78d2d16cc1f9843db2cd290cb94929edaa681625a65f"}}) 12:32:39 executing program 1 (fault-call:5 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:39 executing program 0 (fault-call:6 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:39 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r1 = dup2(r0, r0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000040)={0x0, @multicast2, 0x4e21, 0x4, 'sed\x00', 0x20, 0x9, 0x7f}, 0x2c) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:39 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) mknodat(r0, &(0x7f0000000080)='./file0\x00', 0x280, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:39 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.351342][T10493] FAULT_INJECTION: forcing a failure. [ 1107.351342][T10493] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.369901][T10496] FAULT_INJECTION: forcing a failure. [ 1107.369901][T10496] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.393473][T10493] CPU: 1 PID: 10493 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1107.401252][T10493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.411354][T10493] Call Trace: [ 1107.415065][T10493] dump_stack+0x172/0x1f0 [ 1107.419441][T10493] should_fail.cold+0xa/0x15 [ 1107.424201][T10493] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.430469][T10493] ? ___might_sleep+0x163/0x280 [ 1107.435352][T10493] __should_failslab+0x121/0x190 [ 1107.440314][T10493] should_failslab+0x9/0x14 [ 1107.444840][T10493] kmem_cache_alloc+0x2b2/0x6f0 12:32:39 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.449706][T10493] ? fput+0x1b/0x20 [ 1107.453882][T10493] ? ksys_write+0x1cf/0x290 [ 1107.458396][T10493] getname_flags+0xd6/0x5b0 [ 1107.462910][T10493] ? entry_SYSENTER_compat+0x70/0x7f [ 1107.468317][T10493] getname+0x1a/0x20 [ 1107.472241][T10493] __ia32_compat_sys_execve+0x72/0xc0 [ 1107.477734][T10493] do_fast_syscall_32+0x281/0xd54 [ 1107.482870][T10493] entry_SYSENTER_compat+0x70/0x7f [ 1107.487987][T10493] RIP: 0023:0xf7f04849 12:32:39 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.current\x00', 0x0, 0x0) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000000c0)) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) getpeername$unix(r0, &(0x7f0000000200)=@abs, &(0x7f0000000180)=0x6e) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1107.492151][T10493] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1107.512201][T10493] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1107.520982][T10493] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1107.529054][T10493] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1107.537086][T10493] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:39 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.545099][T10493] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1107.553085][T10493] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1107.566750][T10496] CPU: 1 PID: 10496 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1107.574436][T10496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.584689][T10496] Call Trace: [ 1107.588004][T10496] dump_stack+0x172/0x1f0 [ 1107.592371][T10496] should_fail.cold+0xa/0x15 [ 1107.596983][T10496] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.602802][T10496] ? ___might_sleep+0x163/0x280 [ 1107.602821][T10496] __should_failslab+0x121/0x190 [ 1107.602837][T10496] should_failslab+0x9/0x14 [ 1107.602858][T10496] kmem_cache_alloc+0x2b2/0x6f0 [ 1107.617227][T10496] ? fput+0x1b/0x20 [ 1107.617246][T10496] ? ksys_write+0x1cf/0x290 [ 1107.617266][T10496] getname_flags+0xd6/0x5b0 [ 1107.617291][T10496] ? entry_SYSENTER_compat+0x70/0x7f [ 1107.640373][T10496] getname+0x1a/0x20 [ 1107.644275][T10496] __ia32_compat_sys_execve+0x72/0xc0 12:32:39 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.650051][T10496] do_fast_syscall_32+0x281/0xd54 [ 1107.655142][T10496] entry_SYSENTER_compat+0x70/0x7f [ 1107.660305][T10496] RIP: 0023:0xf7f80849 [ 1107.664427][T10496] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:39 executing program 5 (fault-call:4 fault-nth:0): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.695128][T10496] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1107.695143][T10496] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1107.695151][T10496] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1107.695159][T10496] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1107.695166][T10496] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1107.695172][T10496] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:39 executing program 1 (fault-call:5 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.836131][T10630] FAULT_INJECTION: forcing a failure. [ 1107.836131][T10630] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.866545][T10648] FAULT_INJECTION: forcing a failure. [ 1107.866545][T10648] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:32:39 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') r0 = add_key(&(0x7f0000000040)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000cc0)="3b0276be491044c58343e11c71364f3f3fc3ac151201f6fff2d51920ae07194c42dc82479b737037a1a7c8e3cd1ccc491ecaad6d6556a3a52371be0683a227933a8a096335939338351a3f49be4cb283bcff7fb14527e6f05904df853f63d0227498ac5e66732778b3dbeb31758cc748b37c68632c3c74e1a06763a1d44a5ffb53642a8f03ea09e672974ba05d557d25c8a45a084be563c5501a5d2e2e3dbaf68a1b2d0ed8f4a86925717339caaf61f9bf06d1e0b153a8487974cb40e55892c29289ce30a48ecf0d04eeef460b4ae88fb6d573ba823773cd8a82de04a97c41ecfd0f211c5af2a9f45b78c6b30932e044c133550d5a7b4b3332fd5416d99c790639f77d148307cb52dd20b3216e826fd608d9fe3ecb029342ee9608374bfe3e0c6d6ab4201e8c25219ad91488da9e87e3751deacf8e719f3fe82cb0102d1a8fedba36ba3eb2b99845ff1d7a00b905cbb8501da265c90f594f12ad7fe89b5acbe607c9e303bb9b7c696996c04102299f57c586d6f0d0d615edd99e1b65300220fe9048e009f80cb922cec9b5c34ff967dc9a2df946e0c42979a2631c255d241e6a1a48dc4a81258a8b6dcfbd4dd54fc6149e01f63ee0496971850accdd5a2fb4be0eef94526b9d30c113e51e3993ec56ca6cc68ab560a1709a40a760d4a39c79da416ac42ae1d6d689f95bdae166a7c040e615b46d7ec4d0191aaac7ec5a39eaff64d4dde76e16771be5eb7453bdbb1c246d68f6a52f86baa48515abac0b38a8fabfb7f971debf5362c6831a4a6ff929a433ae126579d535c3ef1de54a367941b7bcb8e00c9481a72c6ed500868e9448a1a608f4e9edb61c2d4192602d7dd4db06bbc7dbec750ed5dc93f3c9f01eeb990aa9b4def504b29a6f3e83b66f491b75e13447cd7163410eb695a282e982fd4b3ec93eb5455f9bb2dc948ccf3865768da267a3902eda73fc5f93e2acda710fa7da6a9afa22726816e4904c55fcb0a5713bac4b5f5db108c21c4d703b41692278683a7652c18fdf7ed1297686f283f2e8aa2f97558da06a87e2318c48be2a21c2417f9c721010459b26a35689081f219e4b5b14238d62262df58b8ee4929bbb33a90536b58f3a165ef090b12b59ab4f7eafad3c989b34ff93be93755bb6f7f4c75ecf32717ba9528cdee4a587c3c6b0e626b355cb6c5822ca903bb5d1ef7d16be03eb12c53a88dfb5da2ac3ecd922089b8299241d78f0b909fa4df4b4ceb0edaae3dfba05a7ee0850c3729c2b15ef5df807755ed4fc812ad33448530b910dd0ffebfe1f165ce20380f7e245b2af0411ea0675837d68fff8e0b1f90e8d893d302fddbf09085a3e34c30e0c12ca48343df6afa44e9db5bdefd2807a518e57264ffd36c1823b2f34c6f69cbb69d66b438a2109b01a804ace48024d9ade3ad6ecebcf82d728de3551c9e32a464db1a5e2488bdc895be6f4369bd009f661a45f58e5353d4c525203d7cb98b3ff576b3ec1507942989a89202d6bd871d5aeeabe46021aeb7537f2f93ca49ad366f349ff5370ce08c8945d53527fdb853abe86ee6b86f0cd3c67c34930283ce43a03a22b29671623d7c8f93450fffb9ac59e17a9953f2c09ea8fc94dfeab5d8f0ff8a0bf0758e7699ad82be466426a17478de69a0f18012cb687c44ed2b7edc2522e9e410b4f88bba3df2babdd8a30efcde2cc41444cb3910f6a6c6a1e1b252144593c0b5d1936eaa59af67e6813105602d503e934ce489f638243a267585e100331c0d7739c31327e8ff49e70427d8b3e3d5359698fc8ea476660e0e6802496da6a169f4d798d37266857b8a84e28770cf32823b58a23f677847e585d4c8061554b5e5505c920e288acaf040c99e8e5243b98d46139b8b4b8eb5c18ffab3c01e85ca06db12eac4983cbc49263c487cb5faeb1742015b24da43ba46e98eda67fdcc3c7a60f09d24ce15ff525705e1dc8721f953ee75c101c598c58344baeef8c4bf0f8c3f814efda45822bfd4c926af1046baf98b3ceb6b69c0c54d537f3214fbccf51ad4bf53fb58181f41c709c472978231e1b58c95273ce6919b48a93645ab2b9bcef4ae0ce4cb52ce25d2427157316f928edf808fd16a4aa42e586b9d783f32eebf2472cd5bdfd387fc5cd3b8da7630ec3cea87287305195ebd7a1f1395fd1f1ed576a53953e6dc4ce5fd9c6321ea467f354cf7c564c412ec295ec6b5d3489d73c5c60ab39c744153a3b472fccfab2e4a385a40300e264c3dce3ca0236a34ffaa7dc5e824269ce39362a6101f9d7df22328c5881b084726100165c47eece19115394bdacf23ba98b30da0969f69ce181231f8b45471e9f3463ccf108111c1fdd5e568e609ea9b6e2ac859f2320c53a35af3ec512006411377b68a2e666d0e44e6a020882d77f4afa5fa65513785b0e43bdbc343cc27b1d44ca2544ad81822c1a4e47826fec2a3cc79d6ab3862d29f9ca62522f77e9b8dc7f79e10881b6246bb7b82f45df7298efd08fa927f1d01e11dac8fa0a48588b45c286527cbafddfd60150cf1e312e2b0f7c41c861d1e007429e3332a31de5a5a8d92fed7afee87778e172516d0667fbe737ad2aa8fdc2600a8cc1702aa84a9d4a88b7a293a640d02c72bc1621d6357f7158624d26488e75e0a254106c276d8acf2f191cab8597d441f6c27f05e6b8d7edc919a96584befbc24134081ee1a369c027e48d2789ca4ce840d628e9ac27cfca4f386f66d9ee3558b8b2bf904614579512faab31dc240921dba3616d725b832fd6cadf2c29b2c67e96c28b17bad07bbaef68f893fb93551fd6e9ccc60689a4da12693a836275f3a1c15835a4938b46b695fbe919a312791af28d5a661e512e3b077dc6747373bb901b4f6cfefc960fa443a6c79c49418ded628714f049fdd90c39def7eec4e47602f41da99870a5fc942931cc5cc52c93c0ff8d7d1272699ad18b3753159072fe70a1ce6a596a1d0ca6291c34e47f81b58ef67f089d006548d5c94d84dd204ea4dff0416589a80686155c30043e60a85f66cef9be640266da4f9e8ff2e3dda43c3b354a92fc5c32fa05af5e0615c3b948d2fe9d95b358a8e87efa632bbdf4847c318bc57b2cea8e8b93a63303719c7c3d30ff951142d3b0e391cc3d5bad2bb3042c5468fce21df7cee430ed26271af8cbd7d22a803809f67907eac972628a9874d642f575120d2529d93ede5a43957f95d10018e796423d4228621b9b0c39694dafc931536d66826266b76f1fadda435709fa1d58efd57be00904e9fbda15a450d1ab1ebc50b2c41a1dd75e23a56f461091513ca018859ae1c33294e55289ef265d2351bcf4fb2b46194b6c3fd5ccb5deb528d1134acc030cdd36d34425b49e929057f08951f58caa0a5c1bca3fdb0024a62fbf5f96b7d31603562591d61e67eafd99009ddc49a70fb47f8c0af1cc541c1dae86b89963581a31b3da0704d723c4d5946fc83dfef5f370369cf7d2fec4b1efeda2e6516169ffe4f5f45a4bff115ddf850f0139af5e7f13aae8e8e144fff5fbeed36ee29bf4e497fed953abe516ba0c0cdb4961db73b6a1eb78f1fc2dd780b4ac6bdf2139dcef7812ad453431cbd74e83bfa92eab9ad254230e4d7831438a28532a9ec5c9e9b23931979b495fa0c2eecc863512bf5136d071fd7df76d6ac426bb78e4c2da579f2d8712e2851b63e8d2e987e033a3cc5177bf1bad8864030919eb7eb8db452a674d9611e0b3488745f90595cf10e0dba74f83fd6f8d67418cf5176be1d34ecf99e4e9530a8e24510219c3d958d03bb468403422815702b228ea8b16120f46e3799aecd3a19a63cbc4bdeb19e023b670ff434ee7be87858db2bb549c0cc8a347cbbdbebb791820a2a4a131522b8e58e87f5c14fa32baf45f772bd84373039f8aad1ea29dccc685813a2a4680d0ca1495fa94f504ef16652ee9b8aaa18fa10ac4f2b1041736e580aa080b7a2798c9afc56f96ac161fe1b06efcd6e395027dde8f2b9e927fbc782c366fde904f0dbcbd97cee32758beb6412a7894194cbe3f093958219ae45f078fe241061c308af1e80330dd0be2557704b035e8ebd11e2370e5f4b4925b27e7f2b1b3d34a3eeb1f5da8911ebdb6bebbf6a09040165d84a48bc1e5ac397ed88432b7133713d4bc939769ec70420cf87ad435e2545563f1dd6a1d789ad419740b4629104c3b480b0d3b8cfdc4072ca96e4f4181ed8eff63ac26c24d3616920d7325181e0aacdded01544e5227d989fb54184549d36090e9e3626eebd582a6d05122de5d112b7520bcabae3f2daaac8e991aa29ee9b1fe1a34232ec6ad6efd09c63a2a037d2773df8d97fd34294dfbe934aa329af5ad6078f933afaa658a06611ef20d4e81e6e4ceb2db5da2d6877a61017721315eb2ff31a8b1a12eccbc7a04a4cdfc37857062ad99b2c0da43998be08ddf0f96ed72fb52c3ced87c428b50168742dcfeb8a894ffc9be433a18c3dfd3592a7cda06fee904b50910e2c2b559ff1d5cb88f5dc64b7044f5c29156a9b67645eff6ddceaff89797eb37967482249214debd07ccdc369794a9bc9438b581a2d90f5043fbcaf4235038a2da93d6e8dff2f5953b86825e0f4388ce12d033862074b5b20d36758db03cd1ed323b7be3171fa51b5f0cacb9602498caaf20f804fdd3034bc9e8283d8567a024492b004c47f264df5f89029121d0a4237214952d848f54ece55719343b83d563baf3e4c61309d64ed3cb48d9efd1e1b30cbf5fbdc1557e6a3926c559e86e3d897c45735441e682b24c77df82ca463dac3524d1ab9069d2b6b4e227ff04b75da571df5ad0706137e71b11150ac501893e6e2858aa32c7f53eb2e24eaa11dd59e9e1cc977f58ff909a5b6b550ca5c14cd7f3091a73104148d54da8a9848a797d4ee32b3b09be052730fdf9fe39ea7f9a1c15a256d89c97c413a5f29dfa59087a9e702693dd68948bc2248e3ab61381f9c9c0974a94a3d59286d551e307039b056d7a4b4f0b0b522bc8e9210a322148a5be5e7548745eec54886fb5709e96cb42106483396d1044fc13970431334bc0f49de85157a9bb9634e5ccee88653d4893f15989a7a2a0aaa772f69235073590d1278a947de01b2c4f1f22345b31bd513fcd888f652f0ee334db7c649ce516931d7cb627f202ed5b88219bfd76f9b7ed75045aa422da72ca94d533dc55068d9bb492cebfdb43041b93d2ddc8718e04f8b133a4f92fbac925d444c098c61c5ded3bfcc06947f880cf20c1f80e6a86b457637ba3b0831f17dd3d805abd0a561e3d3a58917db71b969d15be1e70f550fdb857165ea0f36c5fdf73c3cc4e879cc4174bb5b633066637921165c823773e6c1c91db8b76f149b2008e21e39b9d534bf85d97c42301c551fa4909969919a1c90c803c32e19ada883caa5c544beb08334087d6481a04dc471f94400e62f954848363cf31bf39369bb12b6f6c4f4d98a9c616a5c28d10c716565cb5a96c1fe643077e046306789500c147ae2ccfedbc56551ceeed81936302112ffdc4a5a2224db6b766a8b67439f4523be8aa9e8e98ca5b11e719efd1a669c7b77a2d4d10918a62ff6f86b386ef4ddb69679d25a2605fe6abbef203b7f01048900e6b85f2af8b9a76b74133bd88df03826d39d79134cdf10398a0745c1489ea93f26381bd0e0d7ce2ab37ec4d287cce8430cf347bba5286f6c63fb74b2533551e26a61af9997a1d012c814eb25e65c72c6dd01e2f1d00b9f385e4a6ea018bfbd5dcc98d1f28cdc84741c3ff2cbfca792b460395d20320642895de88b936714d4f504ff1454510addff7fd", 0x1000, 0xfffffffffffffff8) keyctl$assume_authority(0x10, r0) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0, 0x20) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1107.879830][T10648] CPU: 1 PID: 10648 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1107.887384][T10648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1107.897457][T10648] Call Trace: [ 1107.900762][T10648] dump_stack+0x172/0x1f0 [ 1107.905113][T10648] should_fail.cold+0xa/0x15 [ 1107.909724][T10648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.915665][T10648] should_fail_alloc_page+0x50/0x60 [ 1107.921341][T10648] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1107.926824][T10648] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1107.932534][T10648] ? find_held_lock+0x35/0x130 [ 1107.932555][T10648] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1107.932577][T10648] cache_grow_begin+0x9c/0x860 [ 1107.932602][T10648] ? getname_flags+0xd6/0x5b0 [ 1107.932618][T10648] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1107.932637][T10648] kmem_cache_alloc+0x62d/0x6f0 [ 1107.963769][T10648] ? fput+0x1b/0x20 [ 1107.967607][T10648] ? ksys_write+0x1cf/0x290 [ 1107.972118][T10648] getname_flags+0xd6/0x5b0 [ 1107.976631][T10648] ? entry_SYSENTER_compat+0x70/0x7f [ 1107.982012][T10648] getname+0x1a/0x20 12:32:39 executing program 0 (fault-call:6 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:40 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/zero\x00', 0x181440, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000001a40)={0x0, 0x0, [], @bt={0x81, 0x800, 0x5305, 0xd7, 0x8001, 0x5, 0xb, 0x6}}) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) sendmsg$alg(r1, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000600)=[{&(0x7f00000007c0)="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", 0x1000}, {&(0x7f0000000200)="d6c425e1ce45c42186eb108380e486cd7ba31c397737cbfb74af6630f5913b4d6c1d4d2f1bd8bf8c83de62c381303409d85d43167e91542761177d0976b7b35e61d96fb0c7a5803be243b1312eac6b42e46c1a5a4d914b59ba865e7de458f2b9b7aca742c908b4f5d94dcd15e797e7e3f53fcc3a476f91855fbd1933a8ca5c69d188154fc5746035943642ddd427ac08c6d581b8bbd394f5abd06d5298a410bf90bc02356409b22cdb2d6866a7f2adf105a5f8e178629e47544e538d92208d7689a7736df557", 0xc6}, {&(0x7f0000000300)="82722e5356af7770c0e263c9e5a5baeb77845ab8e677178feb35808906b9fe0f3b93e61e519c651bf3f041e1bfc543f1b8804ceb4b9c69bd06c0ee08e35a41aaa3453c2fcb3d0a1ba75623eb5904adb72ece", 0x52}, {&(0x7f0000000380)="e3208d231807a58ed0145ad7f485420a02f626071931f307711dfbef7d6e289556cc8f324209683047b94654be69c264b144af815353a408a17b2547d9bc02ae5eb9d4b732912bea51f5afede04e6f8fd3536c5647d64c88ef74c96baf71483850350e05a917f215c4ebdbae705437914be5ee1027cd846c9f0a9eca6f6a01de63483443cc0afd1a778cb8c1991ec650a60f61892f27aa7b1b979f92a462418399ce895e6632cfae07ff41cbca0ec886fb0b180dbcf0e87fc954d5f86e024c9b7091c019c08d2bff9d6daadb07c7fed67f680922375fe98754d080471e3002c55e934056139c", 0xe6}, {&(0x7f0000000480)="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", 0xfb}, {&(0x7f0000000580)="9bb330fde8aec622afb7643839388cff2de04fd6366794b2708d29c82a66bbac6cc087ca4243227c1a7ef038c048d183a81db8c4f70e18aeb9599aa9072306f70a422d1ff5a24f0eee8d721ea708cdf21aa7765b0b26c56ac1bab80053fe507ba2c0f3c3df43d39024", 0x69}, {&(0x7f0000000180)="5ff94e7c9d15e05635d8134185a809fd75f895389a0b409e999b60e0e2a102488beb796a20291061cf9b57c6f849", 0x2e}, {&(0x7f00000017c0)="5b8458f101847ac2c27a4bbc2f9f2f12b265f6147fcdc9270cfd4c7526f5ffe7e0c903ed3e221ef364ad0d490d77b403df19811fd33a6094def0c44b5d7594b86d8bc3664b10152cae3604240adeddbbfbe1ee03535228fa82d8218e41d87a324ccf95d84dad0ad736f5f0131ef69a54330317853352c2a24bef4abc7d41c29e6b073a062c221aa045301aad7ba536841a4f3a75c0958038458fbdedac3f09f84e74d02116c893ccbf0cef2d2162bde1670c8d4cdac3753e25a4146c81cdc832449766eda28b505c9d09db0ae171b2c6a70f07b0ea", 0xd5}], 0x8, &(0x7f0000001b00)=ANY=[@ANYBLOB="1000000017010000030000000000000010000000170100000400000002000000100000001701000004000000030000000c0100001701000002000000fc0000001a564c437aac7a6748d9567e6dfdce56ed88370e58c933bd40ddefc3b5ea3beebfa8c1f2dce1a26da303a1109b8b1d86a9837643387492344bcd203ce6029582ad86c84f83e6ef91a9c0e9b3e3383dc94558e98a7e313a658f25969126678ec5806c0675f0c7b1e116d3018c4f69cd14b921f3d1c93c9fa96de59685a1a223999a4542d6f626184ce818090a60c44855acaefb71daff664e6362887a18be6a2f4618b04b8c975b4c0e676f6ee87c19131e550a790fd393057f98eed34bad567c6f8861241281db74b034c56954e0c26c2b1c843d466f157cd0a8407cd8ac23054854ccd0ba0600be43c5473d78c2b7f04f796833a99b1881537cc738cfaf4fa6f2f602e68b78b6d8d0c522363907d48506112c475f76509200dcef04a08165634ec9ae21e6106c37d5dd07e14fd5562b295328f663f5bc7226dddf7fcf8236c2daad9c5af4927625df4404e70f75b38083152a4f17425fe857cacf74f383eb41fb46302f9dfdc9399e45cdab09898272732c16b85c"], 0x13c, 0x8804}, 0x24000000) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x80) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000680)={@rand_addr, @initdev, 0x0}, &(0x7f00000006c0)=0xc) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000700)={r3, 0x1, 0x6, @random="8fd584ee7f5a"}, 0x10) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1107.985952][T10648] __ia32_compat_sys_execve+0x72/0xc0 [ 1107.991532][T10648] do_fast_syscall_32+0x281/0xd54 [ 1107.996747][T10648] entry_SYSENTER_compat+0x70/0x7f [ 1108.002469][T10648] RIP: 0023:0xf7f04849 [ 1108.006544][T10648] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1108.026334][T10648] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 12:32:40 executing program 4: unlink(&(0x7f0000000440)='./file0\x00') mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.034860][T10648] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1108.042963][T10648] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1108.050948][T10648] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1108.059017][T10648] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1108.067003][T10648] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1108.109628][T10630] CPU: 0 PID: 10630 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1108.117420][T10630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.127599][T10630] Call Trace: [ 1108.130918][T10630] dump_stack+0x172/0x1f0 [ 1108.135302][T10630] should_fail.cold+0xa/0x15 [ 1108.140022][T10630] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.145853][T10630] ? ___might_sleep+0x163/0x280 [ 1108.150728][T10630] __should_failslab+0x121/0x190 [ 1108.153485][T10833] FAULT_INJECTION: forcing a failure. [ 1108.153485][T10833] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1108.155690][T10630] should_failslab+0x9/0x14 [ 1108.173920][T10630] kmem_cache_alloc+0x2b2/0x6f0 [ 1108.178778][T10630] ? fput+0x1b/0x20 [ 1108.182756][T10630] ? ksys_write+0x1cf/0x290 [ 1108.187257][T10630] getname_flags+0xd6/0x5b0 [ 1108.191772][T10630] ? entry_SYSENTER_compat+0x70/0x7f [ 1108.197159][T10630] getname+0x1a/0x20 [ 1108.201059][T10630] __ia32_compat_sys_execve+0x72/0xc0 [ 1108.206436][T10630] do_fast_syscall_32+0x281/0xd54 [ 1108.211548][T10630] entry_SYSENTER_compat+0x70/0x7f [ 1108.216844][T10630] RIP: 0023:0xf7faf849 [ 1108.220907][T10630] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1108.241368][T10630] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1108.249776][T10630] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1108.258041][T10630] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1108.268376][T10630] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1108.276373][T10630] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1108.284425][T10630] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1108.292421][T10833] CPU: 1 PID: 10833 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1108.300183][T10833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 12:32:40 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sigaltstack(&(0x7f00008a1000/0x1000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x200000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) madvise(&(0x7f0000389000/0x2000)=nil, 0x2000, 0x8) socket$bt_bnep(0x1f, 0x3, 0x4) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') socketpair(0x0, 0x1, 0x3, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000200)=@abs={0x0, 0x0, 0x4e21}, 0x6e) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1108.310414][T10833] Call Trace: [ 1108.313899][T10833] dump_stack+0x172/0x1f0 [ 1108.318241][T10833] should_fail.cold+0xa/0x15 [ 1108.322835][T10833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.328669][T10833] should_fail_alloc_page+0x50/0x60 [ 1108.333889][T10833] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1108.339458][T10833] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1108.345370][T10833] ? find_held_lock+0x35/0x130 [ 1108.350164][T10833] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.355997][T10833] cache_grow_begin+0x9c/0x860 [ 1108.360791][T10833] ? getname_flags+0xd6/0x5b0 [ 1108.365487][T10833] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1108.371747][T10833] kmem_cache_alloc+0x62d/0x6f0 [ 1108.376721][T10833] ? fput+0x1b/0x20 [ 1108.381865][T10833] ? ksys_write+0x1cf/0x290 [ 1108.386480][T10833] getname_flags+0xd6/0x5b0 [ 1108.390991][T10833] ? entry_SYSENTER_compat+0x70/0x7f [ 1108.396289][T10833] getname+0x1a/0x20 [ 1108.400201][T10833] __ia32_compat_sys_execve+0x72/0xc0 [ 1108.405694][T10833] do_fast_syscall_32+0x281/0xd54 12:32:40 executing program 1 (fault-call:5 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.410863][T10833] entry_SYSENTER_compat+0x70/0x7f [ 1108.415986][T10833] RIP: 0023:0xf7f80849 [ 1108.420072][T10833] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1108.439784][T10833] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1108.449121][T10833] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:32:40 executing program 5 (fault-call:4 fault-nth:1): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:40 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.457287][T10833] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1108.465296][T10833] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1108.473386][T10833] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1108.481404][T10833] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:40 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f00000000c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc008641d, &(0x7f0000000180)={r1, &(0x7f0000000200)=""/106}) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1108.559826][T10895] FAULT_INJECTION: forcing a failure. [ 1108.559826][T10895] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.590593][T10950] FAULT_INJECTION: forcing a failure. [ 1108.590593][T10950] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1108.603855][T10950] CPU: 1 PID: 10950 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1108.611419][T10950] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.611433][T10950] Call Trace: [ 1108.624953][T10950] dump_stack+0x172/0x1f0 [ 1108.629316][T10950] should_fail.cold+0xa/0x15 [ 1108.634046][T10950] ? finish_task_switch+0x146/0x740 [ 1108.639581][T10950] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.645427][T10950] should_fail_alloc_page+0x50/0x60 [ 1108.650770][T10950] __alloc_pages_nodemask+0x1a1/0x8d0 12:32:40 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.656325][T10950] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1108.661631][T10950] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1108.667454][T10950] ? find_held_lock+0x35/0x130 [ 1108.672435][T10950] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.679315][T10950] cache_grow_begin+0x9c/0x860 [ 1108.684182][T10950] ? getname_flags+0xd6/0x5b0 [ 1108.689058][T10950] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1108.695313][T10950] kmem_cache_alloc+0x62d/0x6f0 [ 1108.700188][T10950] getname_flags+0xd6/0x5b0 [ 1108.704708][T10950] getname+0x1a/0x20 12:32:40 executing program 0 (fault-call:6 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.708612][T10950] __ia32_compat_sys_execve+0x72/0xc0 [ 1108.713997][T10950] do_fast_syscall_32+0x281/0xd54 [ 1108.719028][T10950] entry_SYSENTER_compat+0x70/0x7f [ 1108.724170][T10950] RIP: 0023:0xf7faf849 [ 1108.728451][T10950] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1108.748058][T10950] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 12:32:40 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0x5) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x40000, 0x0) r1 = geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f00000002c0)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1000, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000160000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r2, @ANYBLOB="2c64656661756c745f7065726d697373696f6e732c626c6b73697a653d3078303030303030303030303030313030302c616c6c6f775f6f746865722c626c6b73697a653d307830303030303030303030303030300000000001000000303030303030303030303030303030303031312c736d61636b6673720000000000000000616c7afdffff2c666f776e65723c", @ANYRESDEC=r3, @ANYBLOB="2c646f6e745f6d6561737572652c736d61636b6673666c6f6f723d21776c616e312c66756e633d42505290fdc770d74d351b61756469742c6673757569643d37616336003f35632d636165382d363861772d777733332d65653200626431312c646566636f6e746578743d757365725f752c646f6e745f686171682c00"]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) syz_open_dev$dri(&(0x7f0000000300)='/dev/dri/card#\x00', 0x7, 0x1) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000740)={r0, r0, 0x8000, 0x95, &(0x7f0000000680)="64f0027e2cac763d869ba221655fc2ac9e775f835dda170463b11cc2f0fc6d5cf553522637b0f3c2fd0d6f72d577fcd50b917d4fec71bce0b157e3f1ba48b358c50ba29791e110077e31b33856b23ebb3f81f7296e330ab736977009275f88e4e4dd62a7f62def09c90b63883f1ced3d7f84595002b2771aa9bb86706b90d109f6e1b2a26442aa4f4ab2f275cd75440480784af650", 0x0, 0x9, 0x0, 0x0, 0x8, 0x1, 0x2, 'syz1\x00'}) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1108.756578][T10950] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1108.764567][T10950] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1108.772550][T10950] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1108.780552][T10950] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1108.788704][T10950] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1108.800049][T10895] CPU: 1 PID: 10895 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1108.807633][T10895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1108.817687][T10895] Call Trace: [ 1108.817711][T10895] dump_stack+0x172/0x1f0 [ 1108.825312][T10895] should_fail.cold+0xa/0x15 [ 1108.825327][T10895] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1108.825345][T10895] ? ___might_sleep+0x163/0x280 [ 1108.825364][T10895] __should_failslab+0x121/0x190 [ 1108.825379][T10895] should_failslab+0x9/0x14 [ 1108.825399][T10895] kmem_cache_alloc+0x2b2/0x6f0 [ 1108.854892][T10895] ? save_stack+0x5c/0x90 [ 1108.859231][T10895] ? save_stack+0x23/0x90 [ 1108.863571][T10895] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1108.869414][T10895] ? kasan_slab_alloc+0xf/0x20 [ 1108.874196][T10895] dup_fd+0x85/0xb30 [ 1108.878110][T10895] ? mark_held_locks+0xf0/0xf0 [ 1108.882895][T10895] unshare_fd+0x160/0x1d0 [ 1108.887342][T10895] ? cache_grow_end+0xa4/0x190 [ 1108.892118][T10895] ? pidfd_release+0x50/0x50 [ 1108.896736][T10895] ? cache_grow_end+0xa4/0x190 [ 1108.901522][T10895] unshare_files+0x7f/0x1f0 [ 1108.906036][T10895] ? lock_downgrade+0x880/0x880 12:32:40 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.910901][T10895] ? __ia32_sys_unshare+0x40/0x40 [ 1108.915945][T10895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.922213][T10895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.928477][T10895] __do_execve_file.isra.0+0x27e/0x23a0 [ 1108.934047][T10895] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1108.939990][T10895] ? __check_object_size+0x3d/0x42f [ 1108.945305][T10895] ? copy_strings_kernel+0x110/0x110 [ 1108.950614][T10895] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1108.956877][T10895] ? getname_flags+0x277/0x5b0 12:32:40 executing program 4: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1108.961663][T10895] ? entry_SYSENTER_compat+0x70/0x7f [ 1108.966970][T10895] __ia32_compat_sys_execve+0x94/0xc0 [ 1108.972359][T10895] do_fast_syscall_32+0x281/0xd54 [ 1108.977401][T10895] entry_SYSENTER_compat+0x70/0x7f [ 1108.982527][T10895] RIP: 0023:0xf7f04849 [ 1108.987032][T10895] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1108.987040][T10895] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1108.987055][T10895] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1108.987063][T10895] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1108.987070][T10895] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1108.987084][T10895] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1109.047003][T10895] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:41 executing program 2: modify_ldt$write2(0x11, &(0x7f0000000080)={0xfffffffffffffc00, 0x0, 0x1400, 0xfffffffffffff001, 0x40, 0x2, 0x8, 0x8, 0x1, 0x7}, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x4000000000000004) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000180)=0x80, &(0x7f0000000200)=0x2) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:41 executing program 5 (fault-call:4 fault-nth:2): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:41 executing program 1 (fault-call:5 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1109.132703][T11068] FAULT_INJECTION: forcing a failure. [ 1109.132703][T11068] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.175472][T11080] FAULT_INJECTION: forcing a failure. [ 1109.175472][T11080] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.199168][T11068] CPU: 1 PID: 11068 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1109.206768][T11068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.206776][T11068] Call Trace: [ 1109.206803][T11068] dump_stack+0x172/0x1f0 [ 1109.206838][T11068] should_fail.cold+0xa/0x15 [ 1109.229106][T11068] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.234959][T11068] ? ___might_sleep+0x163/0x280 [ 1109.239838][T11068] __should_failslab+0x121/0x190 [ 1109.244796][T11068] should_failslab+0x9/0x14 [ 1109.249323][T11068] kmem_cache_alloc+0x2b2/0x6f0 [ 1109.254182][T11068] ? save_stack+0x5c/0x90 [ 1109.254194][T11068] ? save_stack+0x23/0x90 [ 1109.254207][T11068] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1109.254220][T11068] ? kasan_slab_alloc+0xf/0x20 [ 1109.254239][T11068] dup_fd+0x85/0xb30 [ 1109.254257][T11068] ? mark_held_locks+0xf0/0xf0 [ 1109.254275][T11068] unshare_fd+0x160/0x1d0 [ 1109.254290][T11068] ? cache_grow_end+0xa4/0x190 [ 1109.254303][T11068] ? pidfd_release+0x50/0x50 [ 1109.254316][T11068] ? cache_grow_end+0xa4/0x190 [ 1109.254337][T11068] unshare_files+0x7f/0x1f0 [ 1109.254349][T11068] ? lock_downgrade+0x880/0x880 [ 1109.254367][T11068] ? __ia32_sys_unshare+0x40/0x40 [ 1109.316006][T11068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.322267][T11068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.328552][T11068] __do_execve_file.isra.0+0x27e/0x23a0 [ 1109.334111][T11068] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1109.339950][T11068] ? __check_object_size+0x3d/0x42f [ 1109.345177][T11068] ? copy_strings_kernel+0x110/0x110 [ 1109.350494][T11068] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.356742][T11068] ? getname_flags+0x277/0x5b0 [ 1109.361525][T11068] ? entry_SYSENTER_compat+0x70/0x7f [ 1109.366821][T11068] __ia32_compat_sys_execve+0x94/0xc0 [ 1109.372218][T11068] do_fast_syscall_32+0x281/0xd54 [ 1109.377265][T11068] entry_SYSENTER_compat+0x70/0x7f [ 1109.382385][T11068] RIP: 0023:0xf7f80849 [ 1109.386470][T11068] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1109.406426][T11068] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1109.414861][T11068] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1109.422851][T11068] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1109.430838][T11068] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1109.438822][T11068] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1109.446798][T11068] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1109.447780][T11101] FAULT_INJECTION: forcing a failure. [ 1109.447780][T11101] name failslab, interval 1, probability 0, space 0, times 0 [ 1109.485406][T11080] CPU: 0 PID: 11080 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1109.493027][T11080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.503085][T11080] Call Trace: [ 1109.506387][T11080] dump_stack+0x172/0x1f0 [ 1109.510734][T11080] should_fail.cold+0xa/0x15 [ 1109.515335][T11080] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.521151][T11080] ? ___might_sleep+0x163/0x280 [ 1109.526014][T11080] __should_failslab+0x121/0x190 [ 1109.530958][T11080] should_failslab+0x9/0x14 [ 1109.535469][T11080] kmem_cache_alloc+0x2b2/0x6f0 [ 1109.540320][T11080] ? save_stack+0x5c/0x90 [ 1109.544641][T11080] ? save_stack+0x23/0x90 [ 1109.548961][T11080] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1109.554754][T11080] ? kasan_slab_alloc+0xf/0x20 [ 1109.559513][T11080] dup_fd+0x85/0xb30 [ 1109.563409][T11080] ? mark_held_locks+0xf0/0xf0 [ 1109.568174][T11080] unshare_fd+0x160/0x1d0 [ 1109.572500][T11080] ? cache_grow_end+0xa4/0x190 [ 1109.577259][T11080] ? pidfd_release+0x50/0x50 [ 1109.581841][T11080] ? cache_grow_end+0xa4/0x190 [ 1109.586606][T11080] unshare_files+0x7f/0x1f0 [ 1109.591110][T11080] ? lock_downgrade+0x880/0x880 [ 1109.595960][T11080] ? __ia32_sys_unshare+0x40/0x40 [ 1109.600980][T11080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.607217][T11080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.613471][T11080] __do_execve_file.isra.0+0x27e/0x23a0 [ 1109.619011][T11080] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1109.624721][T11080] ? __check_object_size+0x3d/0x42f [ 1109.629920][T11080] ? copy_strings_kernel+0x110/0x110 [ 1109.635285][T11080] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.641557][T11080] ? getname_flags+0x277/0x5b0 [ 1109.646313][T11080] ? entry_SYSENTER_compat+0x70/0x7f [ 1109.651593][T11080] __ia32_compat_sys_execve+0x94/0xc0 [ 1109.656969][T11080] do_fast_syscall_32+0x281/0xd54 [ 1109.661996][T11080] entry_SYSENTER_compat+0x70/0x7f [ 1109.667098][T11080] RIP: 0023:0xf7faf849 [ 1109.671246][T11080] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1109.690865][T11080] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1109.699267][T11080] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1109.707229][T11080] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1109.715280][T11080] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1109.723261][T11080] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1109.731239][T11080] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1109.739227][T11101] CPU: 1 PID: 11101 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1109.746794][T11101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1109.756857][T11101] Call Trace: [ 1109.760151][T11101] dump_stack+0x172/0x1f0 [ 1109.764506][T11101] should_fail.cold+0xa/0x15 [ 1109.769111][T11101] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1109.774943][T11101] ? ___might_sleep+0x163/0x280 [ 1109.779819][T11101] __should_failslab+0x121/0x190 [ 1109.784768][T11101] should_failslab+0x9/0x14 [ 1109.789283][T11101] kmem_cache_alloc_trace+0x2d1/0x760 [ 1109.794645][T11101] ? lock_downgrade+0x880/0x880 [ 1109.794666][T11101] alloc_fdtable+0x86/0x290 [ 1109.794682][T11101] dup_fd+0x743/0xb30 [ 1109.794705][T11101] unshare_fd+0x160/0x1d0 [ 1109.794718][T11101] ? cache_grow_end+0xa4/0x190 [ 1109.794740][T11101] ? pidfd_release+0x50/0x50 [ 1109.794759][T11101] ? cache_grow_end+0xa4/0x190 [ 1109.794779][T11101] unshare_files+0x7f/0x1f0 [ 1109.794796][T11101] ? lock_downgrade+0x880/0x880 [ 1109.826528][T11101] ? __ia32_sys_unshare+0x40/0x40 [ 1109.835854][T11101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.835867][T11101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.835887][T11101] __do_execve_file.isra.0+0x27e/0x23a0 [ 1109.835899][T11101] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1109.835913][T11101] ? __check_object_size+0x3d/0x42f [ 1109.835932][T11101] ? copy_strings_kernel+0x110/0x110 [ 1109.835949][T11101] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1109.835962][T11101] ? getname_flags+0x277/0x5b0 [ 1109.835977][T11101] ? entry_SYSENTER_compat+0x70/0x7f [ 1109.835995][T11101] __ia32_compat_sys_execve+0x94/0xc0 [ 1109.853477][T11101] do_fast_syscall_32+0x281/0xd54 [ 1109.853499][T11101] entry_SYSENTER_compat+0x70/0x7f [ 1109.853510][T11101] RIP: 0023:0xf7f04849 [ 1109.853524][T11101] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:41 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:41 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40585414, &(0x7f000001cfb0)) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r1, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:41 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000300)=0x4, 0x4) perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x6, 0x8001, 0x9, 0x9, 0x0, 0x2, 0x800, 0x4, 0x7f, 0x1, 0x401, 0xfffffffffffff000, 0x100000001, 0x4, 0x62d6, 0x6, 0x800, 0x7, 0x10001, 0x200, 0x3, 0x7, 0x7ff, 0x9, 0x5, 0x7, 0x8, 0x80000001, 0x5, 0x3f, 0x0, 0x2, 0xffff, 0x6140, 0x7f, 0x9, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000040)}, 0x16005, 0x80000000, 0x7, 0xf, 0x2, 0x88c520f, 0x7}, r1, 0x3, r0, 0x2) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r3 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2401) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000280)={0x2, 0x9, 0x1f, 0x5}, 0x8) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:41 executing program 0 (fault-call:6 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1109.853538][T11101] RSP: 002b:00000000f5cdf0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1109.864773][T11101] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1109.864781][T11101] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1109.864789][T11101] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1109.864797][T11101] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1109.864804][T11101] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:42 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:42 executing program 1 (fault-call:5 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1110.018878][T11241] FAULT_INJECTION: forcing a failure. [ 1110.018878][T11241] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.051445][T11241] CPU: 0 PID: 11241 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1110.059054][T11241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.069123][T11241] Call Trace: [ 1110.072452][T11241] dump_stack+0x172/0x1f0 [ 1110.076811][T11241] should_fail.cold+0xa/0x15 [ 1110.081437][T11241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.087356][T11241] ? ___might_sleep+0x163/0x280 [ 1110.088115][T11308] FAULT_INJECTION: forcing a failure. [ 1110.088115][T11308] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.092241][T11241] __should_failslab+0x121/0x190 [ 1110.092263][T11241] should_failslab+0x9/0x14 [ 1110.092284][T11241] kmem_cache_alloc_node_trace+0x270/0x720 [ 1110.092309][T11241] __kmalloc_node+0x3d/0x70 [ 1110.092328][T11241] kvmalloc_node+0x68/0x100 [ 1110.130698][T11241] alloc_fdtable+0xd6/0x290 [ 1110.135202][T11241] dup_fd+0x743/0xb30 [ 1110.139194][T11241] unshare_fd+0x160/0x1d0 [ 1110.143528][T11241] ? pidfd_release+0x50/0x50 [ 1110.148127][T11241] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1110.153764][T11241] ? find_held_lock+0x35/0x130 [ 1110.158567][T11241] unshare_files+0x7f/0x1f0 [ 1110.163113][T11241] ? __ia32_sys_unshare+0x40/0x40 [ 1110.168147][T11241] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.173972][T11241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.180218][T11241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.186557][T11241] __do_execve_file.isra.0+0x27e/0x23a0 [ 1110.192113][T11241] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1110.197845][T11241] ? __check_object_size+0x3d/0x42f [ 1110.203058][T11241] ? copy_strings_kernel+0x110/0x110 [ 1110.208352][T11241] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.214601][T11241] ? getname_flags+0x277/0x5b0 [ 1110.219370][T11241] ? entry_SYSENTER_compat+0x70/0x7f [ 1110.224660][T11241] __ia32_compat_sys_execve+0x94/0xc0 [ 1110.230031][T11241] do_fast_syscall_32+0x281/0xd54 [ 1110.235061][T11241] entry_SYSENTER_compat+0x70/0x7f [ 1110.240166][T11241] RIP: 0023:0xf7f80849 [ 1110.244226][T11241] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1110.265458][T11241] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1110.273870][T11241] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1110.281835][T11241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1110.289798][T11241] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1110.297763][T11241] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1110.305727][T11241] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1110.313720][T11308] CPU: 1 PID: 11308 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1110.321288][T11308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.331445][T11308] Call Trace: [ 1110.334754][T11308] dump_stack+0x172/0x1f0 [ 1110.339111][T11308] should_fail.cold+0xa/0x15 [ 1110.343716][T11308] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.349702][T11308] ? ___might_sleep+0x163/0x280 [ 1110.354543][T11308] __should_failslab+0x121/0x190 [ 1110.354557][T11308] should_failslab+0x9/0x14 [ 1110.354573][T11308] kmem_cache_alloc_node_trace+0x270/0x720 [ 1110.354593][T11308] __kmalloc_node+0x3d/0x70 [ 1110.354614][T11308] kvmalloc_node+0x68/0x100 [ 1110.364059][T11308] alloc_fdtable+0xd6/0x290 [ 1110.364076][T11308] dup_fd+0x743/0xb30 [ 1110.364103][T11308] unshare_fd+0x160/0x1d0 [ 1110.374360][T11308] ? cache_grow_end+0xa4/0x190 [ 1110.374385][T11308] ? pidfd_release+0x50/0x50 [ 1110.374400][T11308] ? cache_grow_end+0xa4/0x190 [ 1110.374421][T11308] unshare_files+0x7f/0x1f0 [ 1110.383579][T11308] ? lock_downgrade+0x880/0x880 [ 1110.383595][T11308] ? __ia32_sys_unshare+0x40/0x40 [ 1110.383613][T11308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.383630][T11308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.392026][T11308] __do_execve_file.isra.0+0x27e/0x23a0 [ 1110.439002][T11308] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1110.444742][T11308] ? __check_object_size+0x3d/0x42f [ 1110.449967][T11308] ? copy_strings_kernel+0x110/0x110 [ 1110.455269][T11308] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.461524][T11308] ? getname_flags+0x277/0x5b0 [ 1110.466304][T11308] ? entry_SYSENTER_compat+0x70/0x7f [ 1110.471611][T11308] __ia32_compat_sys_execve+0x94/0xc0 [ 1110.476998][T11308] do_fast_syscall_32+0x281/0xd54 [ 1110.482051][T11308] entry_SYSENTER_compat+0x70/0x7f [ 1110.487169][T11308] RIP: 0023:0xf7f04849 [ 1110.491224][T11308] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1110.510814][T11308] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 12:32:42 executing program 5 (fault-call:4 fault-nth:3): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:42 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000040)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1110.519399][T11308] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1110.527368][T11308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1110.535328][T11308] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1110.543386][T11308] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1110.551344][T11308] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:42 executing program 0 (fault-call:6 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1110.640434][T11425] FAULT_INJECTION: forcing a failure. [ 1110.640434][T11425] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.679510][T11425] CPU: 1 PID: 11425 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1110.687123][T11425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.697193][T11425] Call Trace: [ 1110.700508][T11425] dump_stack+0x172/0x1f0 [ 1110.704857][T11425] should_fail.cold+0xa/0x15 [ 1110.709494][T11425] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.715330][T11425] ? ___might_sleep+0x163/0x280 [ 1110.720222][T11425] __should_failslab+0x121/0x190 [ 1110.725193][T11425] should_failslab+0x9/0x14 [ 1110.725356][T11431] FAULT_INJECTION: forcing a failure. [ 1110.725356][T11431] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.729877][T11425] kmem_cache_alloc_trace+0x2d1/0x760 [ 1110.729897][T11425] ? lock_downgrade+0x880/0x880 [ 1110.729921][T11425] alloc_fdtable+0x86/0x290 [ 1110.757382][T11425] dup_fd+0x743/0xb30 [ 1110.761386][T11425] unshare_fd+0x160/0x1d0 [ 1110.765728][T11425] ? cache_grow_end+0xa4/0x190 [ 1110.770506][T11425] ? pidfd_release+0x50/0x50 [ 1110.775096][T11425] ? cache_grow_end+0xa4/0x190 [ 1110.779857][T11425] unshare_files+0x7f/0x1f0 [ 1110.784364][T11425] ? lock_downgrade+0x880/0x880 12:32:42 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:42 executing program 1 (fault-call:5 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1110.789214][T11425] ? __ia32_sys_unshare+0x40/0x40 [ 1110.794235][T11425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.800471][T11425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.806805][T11425] __do_execve_file.isra.0+0x27e/0x23a0 [ 1110.812356][T11425] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1110.818069][T11425] ? __check_object_size+0x3d/0x42f [ 1110.823276][T11425] ? copy_strings_kernel+0x110/0x110 [ 1110.828577][T11425] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.834817][T11425] ? getname_flags+0x277/0x5b0 [ 1110.834833][T11425] ? entry_SYSENTER_compat+0x70/0x7f [ 1110.834854][T11425] __ia32_compat_sys_execve+0x94/0xc0 [ 1110.834872][T11425] do_fast_syscall_32+0x281/0xd54 [ 1110.834891][T11425] entry_SYSENTER_compat+0x70/0x7f [ 1110.834903][T11425] RIP: 0023:0xf7faf849 [ 1110.834917][T11425] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1110.834924][T11425] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1110.834938][T11425] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1110.834945][T11425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1110.834950][T11425] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1110.834956][T11425] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1110.834962][T11425] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1110.840671][T11431] CPU: 1 PID: 11431 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1110.891011][T11511] FAULT_INJECTION: forcing a failure. [ 1110.891011][T11511] name failslab, interval 1, probability 0, space 0, times 0 [ 1110.892925][T11431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1110.892932][T11431] Call Trace: [ 1110.892952][T11431] dump_stack+0x172/0x1f0 [ 1110.892971][T11431] should_fail.cold+0xa/0x15 [ 1110.892987][T11431] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1110.893012][T11431] ? ___might_sleep+0x163/0x280 [ 1110.893031][T11431] __should_failslab+0x121/0x190 [ 1110.893045][T11431] should_failslab+0x9/0x14 [ 1110.893069][T11431] kmem_cache_alloc_node_trace+0x270/0x720 [ 1110.909140][T11431] __kmalloc_node+0x3d/0x70 [ 1110.909160][T11431] kvmalloc_node+0x68/0x100 [ 1110.953353][T11431] alloc_fdtable+0xd6/0x290 [ 1110.953370][T11431] dup_fd+0x743/0xb30 [ 1110.953395][T11431] unshare_fd+0x160/0x1d0 [ 1110.953410][T11431] ? cache_grow_end+0xa4/0x190 [ 1110.953423][T11431] ? pidfd_release+0x50/0x50 [ 1110.953437][T11431] ? cache_grow_end+0xa4/0x190 [ 1110.953459][T11431] unshare_files+0x7f/0x1f0 [ 1110.953472][T11431] ? lock_downgrade+0x880/0x880 [ 1110.953486][T11431] ? __ia32_sys_unshare+0x40/0x40 [ 1110.953513][T11431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.991274][T11431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1110.991304][T11431] __do_execve_file.isra.0+0x27e/0x23a0 [ 1111.028078][T11431] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1111.051730][T11431] ? __check_object_size+0x3d/0x42f [ 1111.051760][T11431] ? copy_strings_kernel+0x110/0x110 [ 1111.096418][T11431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.102664][T11431] ? getname_flags+0x277/0x5b0 [ 1111.107529][T11431] ? entry_SYSENTER_compat+0x70/0x7f [ 1111.112823][T11431] __ia32_compat_sys_execve+0x94/0xc0 [ 1111.118207][T11431] do_fast_syscall_32+0x281/0xd54 [ 1111.123249][T11431] entry_SYSENTER_compat+0x70/0x7f [ 1111.128365][T11431] RIP: 0023:0xf7f80849 12:32:43 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000200)="4f69276c6f37333699f7921e1b27381336ddfb54c018941005d23d33c981e7890cceba5f6a07294c8f2bfe378e5bcf5d73ce5691b4cbd539985b605c6cac388b993aa18db4c9f91e6cf55de5a63242094840b1663d104dff2ab29742310711c9246deef6be42211ead2b11902d7f526b446eefd8eb74b323a64586371a7fe211ee8cf9ec788c69908411a40f829c8c60483082aeee48fd7bd6759160db627f1ad71e52f1", 0xa4, 0xfffffffffffffffe) r0 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x80000000) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1111.132441][T11431] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1111.152401][T11431] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1111.160913][T11431] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1111.160922][T11431] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1111.160930][T11431] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1111.160938][T11431] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1111.160945][T11431] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1111.216396][T11511] CPU: 1 PID: 11511 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1111.224000][T11511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.234488][T11511] Call Trace: [ 1111.237770][T11511] dump_stack+0x172/0x1f0 [ 1111.242086][T11511] should_fail.cold+0xa/0x15 [ 1111.246659][T11511] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.252478][T11511] ? ___might_sleep+0x163/0x280 [ 1111.257418][T11511] __should_failslab+0x121/0x190 [ 1111.262359][T11511] should_failslab+0x9/0x14 [ 1111.266847][T11511] kmem_cache_alloc_trace+0x2d1/0x760 [ 1111.272377][T11511] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.278169][T11511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.284390][T11511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.290632][T11511] __do_execve_file.isra.0+0x325/0x23a0 [ 1111.296175][T11511] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1111.301885][T11511] ? __check_object_size+0x3d/0x42f [ 1111.307072][T11511] ? copy_strings_kernel+0x110/0x110 [ 1111.312342][T11511] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.318580][T11511] ? getname_flags+0x277/0x5b0 [ 1111.323332][T11511] ? entry_SYSENTER_compat+0x70/0x7f [ 1111.328617][T11511] __ia32_compat_sys_execve+0x94/0xc0 [ 1111.334172][T11511] do_fast_syscall_32+0x281/0xd54 [ 1111.339193][T11511] entry_SYSENTER_compat+0x70/0x7f [ 1111.344305][T11511] RIP: 0023:0xf7f04849 [ 1111.348362][T11511] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1111.368033][T11511] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1111.376438][T11511] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1111.384497][T11511] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1111.392474][T11511] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1111.400513][T11511] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1111.408580][T11511] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x2000000, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:43 executing program 5 (fault-call:4 fault-nth:4): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1111.571328][T11592] FAULT_INJECTION: forcing a failure. [ 1111.571328][T11592] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.585092][T11592] CPU: 0 PID: 11592 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1111.592831][T11592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.592841][T11592] Call Trace: [ 1111.592865][T11592] dump_stack+0x172/0x1f0 [ 1111.592886][T11592] should_fail.cold+0xa/0x15 [ 1111.592906][T11592] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.592931][T11592] ? ___might_sleep+0x163/0x280 [ 1111.592950][T11592] __should_failslab+0x121/0x190 [ 1111.592964][T11592] should_failslab+0x9/0x14 [ 1111.592981][T11592] kmem_cache_alloc_node_trace+0x270/0x720 [ 1111.593004][T11592] __kmalloc_node+0x3d/0x70 [ 1111.593020][T11592] kvmalloc_node+0x68/0x100 [ 1111.593039][T11592] alloc_fdtable+0xd6/0x290 [ 1111.593057][T11592] dup_fd+0x743/0xb30 [ 1111.593083][T11592] unshare_fd+0x160/0x1d0 [ 1111.593097][T11592] ? cache_grow_end+0xa4/0x190 [ 1111.593113][T11592] ? pidfd_release+0x50/0x50 [ 1111.593126][T11592] ? cache_grow_end+0xa4/0x190 [ 1111.593147][T11592] unshare_files+0x7f/0x1f0 [ 1111.610828][T11592] ? lock_downgrade+0x880/0x880 [ 1111.610851][T11592] ? __ia32_sys_unshare+0x40/0x40 [ 1111.692080][T11592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.698521][T11592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.704752][T11592] __do_execve_file.isra.0+0x27e/0x23a0 [ 1111.710302][T11592] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1111.716007][T11592] ? __check_object_size+0x3d/0x42f [ 1111.721239][T11592] ? copy_strings_kernel+0x110/0x110 [ 1111.726532][T11592] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1111.732778][T11592] ? getname_flags+0x277/0x5b0 [ 1111.737537][T11592] ? entry_SYSENTER_compat+0x70/0x7f [ 1111.742834][T11592] __ia32_compat_sys_execve+0x94/0xc0 [ 1111.748199][T11592] do_fast_syscall_32+0x281/0xd54 [ 1111.753213][T11592] entry_SYSENTER_compat+0x70/0x7f [ 1111.758393][T11592] RIP: 0023:0xf7faf849 [ 1111.762449][T11592] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1111.782044][T11592] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1111.790586][T11592] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1111.798544][T11592] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1111.806584][T11592] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1111.814543][T11592] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 12:32:43 executing program 1 (fault-call:5 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:43 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x340, 0x0) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000200)=0x6) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f00000007c0)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000001f0000000600000050050000fc02000000040000000000000000000000040000bc0000bc040000bc040000bc040000060000000001000000", @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/96], @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0130010000000000000000000000000000000000000000000000002400727066696c746572000000000000000000000000000000000000000000000300000050006f736600000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000b00000000000000020000002400544f5300000000000000000000000000000000000000000000000000000004be000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00010010000000000000000000000000000000000000000000000002400727066696c74657200000000000000000000000000000000000000000000010000002400727066696c746572000000000000000000000000000000000000000000000500000030005450524f58590000000000000000000000000000000000000000000000000100000004000000ac1414254e22000000000005e0000002ffffff00ff00000073797a5f74756e00000000000000000076657468305f746f5f626f6e64000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000c00024900000000000000000000000000009800bc000000000000000000000000000000000000000000000000002400544f53000000000000000000000000000000000000000000000000000000d7980000e0000001ac1e0101ffffffffffffff00726f736530000000000000000000000073797a6b616c6c657231000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002f0003010000000000000000000000000000e00004010000000000000000000000000000000000000000000000002400727066696c746572000000000000000000000000000000000000000000000d000000240069636d70000000000000000000000000000000000000000000000000000000000800240054544c00000000000000000000000000000000000000000000000000000000090000ac1414aa00000000ffffffff00000000697036677265300000000000000000006c617062300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000003b00020100000000000000000000000000009800bc000000000000000000000000000000000000000000000000002400434845434b53554d0000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000940000000000000000000000000000000000000000002400000000000000000000000000000000000000000000000000000000000000feffffff"], 0x5ac) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:43 executing program 0 (fault-call:6 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:43 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1111.822647][T11592] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1111.867105][T11712] FAULT_INJECTION: forcing a failure. [ 1111.867105][T11712] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.879933][T11716] FAULT_INJECTION: forcing a failure. [ 1111.879933][T11716] name failslab, interval 1, probability 0, space 0, times 0 [ 1111.940323][T11712] CPU: 1 PID: 11712 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1111.948025][T11712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1111.958101][T11712] Call Trace: [ 1111.961411][T11712] dump_stack+0x172/0x1f0 [ 1111.965761][T11712] should_fail.cold+0xa/0x15 [ 1111.970371][T11712] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1111.976301][T11712] ? ___might_sleep+0x163/0x280 [ 1111.981182][T11712] __should_failslab+0x121/0x190 [ 1111.986125][T11712] should_failslab+0x9/0x14 [ 1111.990632][T11712] kmem_cache_alloc_trace+0x2d1/0x760 [ 1111.996115][T11712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.002353][T11712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.009644][T11712] __do_execve_file.isra.0+0x325/0x23a0 [ 1112.015185][T11712] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1112.020908][T11712] ? __check_object_size+0x3d/0x42f [ 1112.026197][T11712] ? copy_strings_kernel+0x110/0x110 [ 1112.032278][T11712] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.038513][T11712] ? getname_flags+0x277/0x5b0 [ 1112.043279][T11712] ? entry_SYSENTER_compat+0x70/0x7f [ 1112.048569][T11712] __ia32_compat_sys_execve+0x94/0xc0 [ 1112.054115][T11712] do_fast_syscall_32+0x281/0xd54 [ 1112.059316][T11712] entry_SYSENTER_compat+0x70/0x7f [ 1112.064444][T11712] RIP: 0023:0xf7f04849 [ 1112.068679][T11712] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1112.088281][T11712] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1112.098342][T11712] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1112.106320][T11712] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1112.114302][T11712] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1112.122296][T11712] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1112.130267][T11712] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1112.138274][T11716] CPU: 0 PID: 11716 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1112.145830][T11716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.145843][T11716] Call Trace: [ 1112.159274][T11716] dump_stack+0x172/0x1f0 [ 1112.163633][T11716] should_fail.cold+0xa/0x15 [ 1112.168243][T11716] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.168265][T11716] ? ___might_sleep+0x163/0x280 [ 1112.168287][T11716] __should_failslab+0x121/0x190 [ 1112.183862][T11716] should_failslab+0x9/0x14 12:32:44 executing program 5 (fault-call:4 fault-nth:5): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:44 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000006c0)='net/softnet_stat\x00') accept4$vsock_stream(r0, &(0x7f0000000700)={0x28, 0x0, 0x2710, @my=0x1}, 0x10, 0x80800) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) add_key(&(0x7f0000000200)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)="90a3bd3ce8f97db306369cd28bec23b926a80a3cee1e0e6646994a1bfe6b68d44bb5cae977c9db479f7530f34129e772530c97fab7f53e6438eada804dcf6e5721fc01961d5885496791b460cf9802740dcf24c4b2328bf580674f939dec8bb1224fb94af1c00814360c69999e3687795979c60ca0fc55fb57df2b8c56bc6afac5dfda22470114f7f304994d6be34d4e37e65f5d0f6e738a921d70c9a5eb6216c600bdeb768935f41d490c757b4030dff32c9e17710051484121425079b3", 0xbe, 0xfffffffffffffffa) r1 = add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000780)='sy\aiMlder\x02G\'zP\x9a\x95 \x0f\xd3t\xb7\x12\xe5J\x19\xdd\xb7\x8c\bLvq\x15\x89\xad\xb4\x1e\x9b\x9c\xe1\xf5\xb0\x86\xe6\x85~b\xf0/k\xac\x8a\xb49\x15_\xc9\xc3\x9a\xdac\x92!\xb6yR\"U\\=\xe4\xec\x94\x83\xac7IJ\xc20\xbd\x84\x97\xad\x868h}4C\xce0\xc2\xcf\xcb\x1d\xaa\xf2$)\xbb\x0f\x84\x87\x8b\xaa\xbd\xcf\x05Mt\xa2\x9a\x16\x14[\xab)\xd1\xccqO\x7f\xf0u#>\x11\x00SH#\xa1C\x82\x8c\xf4@\x86O#9\xb81\x80\b/L\x1c\xe6c\xecc{\xaa\x00\xc8\xbc\xdf\xc89\xa8\xe9\xb6\x93P\xbc\x85k\x1d\xf9U\xa2\x8c\x8e\xb1\xcb0\xa6\xa7\xa0?#/Z\x10\xc2\xbd\xb3\xbd\xffu\x04\xd2\x18C5\x9f\x9b\xe7\x1cx.Bp7\xe0\xa4\x11\x7f\xb5\x1e\xcfE\x95\x91% \xe2\x00\x16\x80\x01\x1f\xe2b\xf8\xcf\v_2|.JQ#\xf9\f', &(0x7f0000000580)={'syz', 0x2}, &(0x7f0000000180)='/dev/snapshot\x00', r1) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xf642, 0x400000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="070000002d50392ce68222"], &(0x7f0000000340)=0xf) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f00000003c0)={r3, 0x3f}, 0x8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r1, r1}, &(0x7f0000000480)=""/150, 0x96, &(0x7f0000000680)={&(0x7f0000000540)={'ghash-clmulni\x00'}, &(0x7f00000005c0)="930c0156febb730860eefa9802851223707d997881b8075e8caa2fcf2be1970df6015ecd9332516272e8a50283c6c8f40bde9d714fcbaff915ae29192a986c8fc0d09dd67289ca0a746b4768e42f0d7305b82fcedc1d599618dc8c5abf96839e6dd8fd41d7ae5a28a6a899a2b725882c19", 0x71}) unlink(&(0x7f0000000000)='./file0\x00') [ 1112.188390][T11716] kmem_cache_alloc_node_trace+0x270/0x720 [ 1112.194210][T11716] ? kasan_unpoison_shadow+0x35/0x50 [ 1112.199523][T11716] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1112.205353][T11716] __kmalloc_node+0x3d/0x70 [ 1112.209873][T11716] kvmalloc_node+0x68/0x100 [ 1112.214396][T11716] alloc_fdtable+0x142/0x290 [ 1112.218998][T11716] dup_fd+0x743/0xb30 [ 1112.223087][T11716] unshare_fd+0x160/0x1d0 [ 1112.227426][T11716] ? cache_grow_end+0xa4/0x190 [ 1112.232248][T11716] ? pidfd_release+0x50/0x50 [ 1112.236861][T11716] ? cache_grow_end+0xa4/0x190 12:32:44 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0106434, &(0x7f0000000040)={0x7, 0x0, 0x1, 0x50e4}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40106435, &(0x7f0000000080)={0x7ff, r1, 0x1, 0x3}) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1112.241644][T11716] unshare_files+0x7f/0x1f0 [ 1112.246171][T11716] ? lock_downgrade+0x880/0x880 [ 1112.251135][T11716] ? __ia32_sys_unshare+0x40/0x40 [ 1112.256181][T11716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.264667][T11716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.270958][T11716] __do_execve_file.isra.0+0x27e/0x23a0 [ 1112.276530][T11716] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1112.282274][T11716] ? __check_object_size+0x3d/0x42f [ 1112.287507][T11716] ? copy_strings_kernel+0x110/0x110 [ 1112.292828][T11716] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.299086][T11716] ? getname_flags+0x277/0x5b0 [ 1112.303865][T11716] ? entry_SYSENTER_compat+0x70/0x7f [ 1112.309606][T11716] __ia32_compat_sys_execve+0x94/0xc0 [ 1112.315086][T11716] do_fast_syscall_32+0x281/0xd54 [ 1112.320133][T11716] entry_SYSENTER_compat+0x70/0x7f [ 1112.325271][T11716] RIP: 0023:0xf7f80849 [ 1112.329332][T11716] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1112.349726][T11716] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1112.358475][T11716] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1112.367132][T11716] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1112.375099][T11716] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1112.383899][T11716] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1112.391865][T11716] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:44 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0xffffffffffffff81, 0x100) ioctl$VIDIOC_RESERVED(r0, 0x5601, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:44 executing program 1 (fault-call:5 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1112.487528][T11882] FAULT_INJECTION: forcing a failure. [ 1112.487528][T11882] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.580113][T11882] CPU: 0 PID: 11882 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1112.587744][T11882] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.592344][T11887] FAULT_INJECTION: forcing a failure. [ 1112.592344][T11887] name failslab, interval 1, probability 0, space 0, times 0 [ 1112.598070][T11882] Call Trace: [ 1112.598099][T11882] dump_stack+0x172/0x1f0 [ 1112.598122][T11882] should_fail.cold+0xa/0x15 [ 1112.598152][T11882] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.628943][T11882] ? ___might_sleep+0x163/0x280 [ 1112.633813][T11882] __should_failslab+0x121/0x190 [ 1112.638766][T11882] should_failslab+0x9/0x14 [ 1112.643293][T11882] kmem_cache_alloc_node_trace+0x270/0x720 [ 1112.649124][T11882] ? kasan_unpoison_shadow+0x35/0x50 [ 1112.654686][T11882] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1112.660512][T11882] __kmalloc_node+0x3d/0x70 [ 1112.665122][T11882] kvmalloc_node+0x68/0x100 [ 1112.669732][T11882] alloc_fdtable+0x142/0x290 [ 1112.674535][T11882] dup_fd+0x743/0xb30 [ 1112.678534][T11882] unshare_fd+0x160/0x1d0 [ 1112.682869][T11882] ? cache_grow_end+0xa4/0x190 [ 1112.687637][T11882] ? pidfd_release+0x50/0x50 [ 1112.692227][T11882] ? cache_grow_end+0xa4/0x190 [ 1112.696995][T11882] unshare_files+0x7f/0x1f0 [ 1112.701496][T11882] ? lock_downgrade+0x880/0x880 [ 1112.706358][T11882] ? __ia32_sys_unshare+0x40/0x40 [ 1112.711911][T11882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.718234][T11882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.724505][T11882] __do_execve_file.isra.0+0x27e/0x23a0 [ 1112.730044][T11882] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1112.735764][T11882] ? __check_object_size+0x3d/0x42f [ 1112.740963][T11882] ? copy_strings_kernel+0x110/0x110 [ 1112.746348][T11882] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.752611][T11882] ? getname_flags+0x277/0x5b0 [ 1112.757373][T11882] ? entry_SYSENTER_compat+0x70/0x7f [ 1112.762669][T11882] __ia32_compat_sys_execve+0x94/0xc0 [ 1112.768039][T11882] do_fast_syscall_32+0x281/0xd54 [ 1112.773073][T11882] entry_SYSENTER_compat+0x70/0x7f [ 1112.778184][T11882] RIP: 0023:0xf7faf849 [ 1112.782249][T11882] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1112.802314][T11882] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1112.811177][T11882] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1112.819148][T11882] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1112.827125][T11882] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1112.835103][T11882] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1112.843097][T11882] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1112.851086][T11887] CPU: 1 PID: 11887 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1112.858739][T11887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1112.869080][T11887] Call Trace: [ 1112.872409][T11887] dump_stack+0x172/0x1f0 [ 1112.876847][T11887] should_fail.cold+0xa/0x15 12:32:44 executing program 0 (fault-call:6 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:44 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1112.881457][T11887] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1112.887281][T11887] ? ___might_sleep+0x163/0x280 [ 1112.892163][T11887] __should_failslab+0x121/0x190 [ 1112.897106][T11887] should_failslab+0x9/0x14 [ 1112.901618][T11887] kmem_cache_alloc+0x2b2/0x6f0 [ 1112.906495][T11887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.912750][T11887] ? __validate_process_creds+0x22d/0x380 [ 1112.918576][T11887] prepare_creds+0x3e/0x3f0 [ 1112.923278][T11887] prepare_exec_creds+0x12/0xf0 [ 1112.928169][T11887] __do_execve_file.isra.0+0x393/0x23a0 [ 1112.933903][T11887] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1112.939638][T11887] ? __check_object_size+0x3d/0x42f [ 1112.944857][T11887] ? copy_strings_kernel+0x110/0x110 [ 1112.950317][T11887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1112.956668][T11887] ? getname_flags+0x277/0x5b0 [ 1112.961438][T11887] ? entry_SYSENTER_compat+0x70/0x7f [ 1112.966804][T11887] __ia32_compat_sys_execve+0x94/0xc0 [ 1112.972289][T11887] do_fast_syscall_32+0x281/0xd54 [ 1112.977889][T11887] entry_SYSENTER_compat+0x70/0x7f [ 1112.982993][T11887] RIP: 0023:0xf7f04849 [ 1112.987070][T11887] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1113.006787][T11887] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1113.015326][T11887] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1113.023313][T11887] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:32:45 executing program 5 (fault-call:4 fault-nth:6): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:45 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) personality(0x400001f) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x101000, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000200)={0x6, "445412bb9c7db4f605a6d7db3118cd8691b252122354fdf6427f9ec9b3b4913c", 0x3, 0x1000, 0x0, 0x979, 0x1, 0x5, 0x1, 0x3f}) r1 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x8, 0x0) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4000000) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:45 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x20000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40040}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000226bd7000fe6982250600000008000500010400000800060008000000"], 0x2c}, 0x1, 0x0, 0x0, 0x1}, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1113.031278][T11887] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1113.039243][T11887] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1113.047383][T11887] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:45 executing program 1 (fault-call:5 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1113.153193][T12107] FAULT_INJECTION: forcing a failure. [ 1113.153193][T12107] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.178298][T12109] FAULT_INJECTION: forcing a failure. [ 1113.178298][T12109] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.236817][T12107] CPU: 1 PID: 12107 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1113.244417][T12107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.254518][T12107] Call Trace: [ 1113.257943][T12107] dump_stack+0x172/0x1f0 [ 1113.262809][T12107] should_fail.cold+0xa/0x15 [ 1113.267860][T12107] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.273692][T12107] ? ___might_sleep+0x163/0x280 [ 1113.278828][T12107] __should_failslab+0x121/0x190 [ 1113.283897][T12107] should_failslab+0x9/0x14 [ 1113.288421][T12107] kmem_cache_alloc_trace+0x2d1/0x760 [ 1113.293809][T12107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.300060][T12107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.306332][T12107] __do_execve_file.isra.0+0x325/0x23a0 [ 1113.312003][T12107] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1113.317762][T12107] ? __check_object_size+0x3d/0x42f [ 1113.322985][T12107] ? copy_strings_kernel+0x110/0x110 [ 1113.328376][T12107] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.334631][T12107] ? getname_flags+0x277/0x5b0 [ 1113.339414][T12107] ? entry_SYSENTER_compat+0x70/0x7f [ 1113.344720][T12107] __ia32_compat_sys_execve+0x94/0xc0 [ 1113.350104][T12107] do_fast_syscall_32+0x281/0xd54 [ 1113.355165][T12107] entry_SYSENTER_compat+0x70/0x7f [ 1113.360463][T12107] RIP: 0023:0xf7faf849 [ 1113.364535][T12107] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1113.384242][T12107] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1113.392679][T12107] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1113.400682][T12107] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1113.408672][T12107] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1113.416641][T12107] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1113.424617][T12107] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1113.433915][T12109] CPU: 0 PID: 12109 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1113.441506][T12109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.451558][T12109] Call Trace: [ 1113.451576][T12109] dump_stack+0x172/0x1f0 [ 1113.451592][T12109] should_fail.cold+0xa/0x15 [ 1113.451607][T12109] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.451624][T12109] ? ___might_sleep+0x163/0x280 [ 1113.451645][T12109] __should_failslab+0x121/0x190 [ 1113.479481][T12109] should_failslab+0x9/0x14 [ 1113.484003][T12109] kmem_cache_alloc_trace+0x2d1/0x760 [ 1113.489401][T12109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.495661][T12109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.502718][T12109] __do_execve_file.isra.0+0x325/0x23a0 [ 1113.506566][T12216] FAULT_INJECTION: forcing a failure. [ 1113.506566][T12216] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.508294][T12109] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1113.508320][T12109] ? __check_object_size+0x3d/0x42f [ 1113.531818][T12109] ? copy_strings_kernel+0x110/0x110 [ 1113.537135][T12109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.543394][T12109] ? getname_flags+0x277/0x5b0 [ 1113.548173][T12109] ? entry_SYSENTER_compat+0x70/0x7f [ 1113.553484][T12109] __ia32_compat_sys_execve+0x94/0xc0 [ 1113.558871][T12109] do_fast_syscall_32+0x281/0xd54 [ 1113.563993][T12109] entry_SYSENTER_compat+0x70/0x7f [ 1113.569106][T12109] RIP: 0023:0xf7f80849 [ 1113.573258][T12109] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1113.592856][T12109] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1113.601456][T12109] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1113.609597][T12109] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1113.617674][T12109] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1113.625639][T12109] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 12:32:45 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', r0) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:45 executing program 5 (fault-call:4 fault-nth:7): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1113.633603][T12109] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1113.641612][T12216] CPU: 1 PID: 12216 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1113.649286][T12216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.659352][T12216] Call Trace: [ 1113.662669][T12216] dump_stack+0x172/0x1f0 [ 1113.667023][T12216] should_fail.cold+0xa/0x15 [ 1113.671636][T12216] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.677482][T12216] ? ___might_sleep+0x163/0x280 [ 1113.682350][T12216] __should_failslab+0x121/0x190 12:32:45 executing program 0 (fault-call:6 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1113.687299][T12216] should_failslab+0x9/0x14 [ 1113.692635][T12216] __kmalloc+0x2dc/0x740 [ 1113.696986][T12216] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1113.703161][T12216] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1113.708979][T12216] ? security_prepare_creds+0x123/0x190 [ 1113.714547][T12216] security_prepare_creds+0x123/0x190 [ 1113.719940][T12216] prepare_creds+0x2f5/0x3f0 [ 1113.724554][T12216] prepare_exec_creds+0x12/0xf0 [ 1113.729423][T12216] __do_execve_file.isra.0+0x393/0x23a0 [ 1113.734972][T12216] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1113.740682][T12216] ? __check_object_size+0x3d/0x42f [ 1113.745874][T12216] ? copy_strings_kernel+0x110/0x110 [ 1113.751264][T12216] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.757502][T12216] ? getname_flags+0x277/0x5b0 [ 1113.762257][T12216] ? entry_SYSENTER_compat+0x70/0x7f [ 1113.767528][T12216] __ia32_compat_sys_execve+0x94/0xc0 [ 1113.772908][T12216] do_fast_syscall_32+0x281/0xd54 [ 1113.777932][T12216] entry_SYSENTER_compat+0x70/0x7f [ 1113.783031][T12216] RIP: 0023:0xf7f04849 [ 1113.787195][T12216] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1113.806967][T12216] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1113.815458][T12216] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1113.823420][T12216] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1113.831382][T12216] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:45 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1113.839350][T12216] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1113.847423][T12216] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1113.904676][T12332] FAULT_INJECTION: forcing a failure. [ 1113.904676][T12332] name failslab, interval 1, probability 0, space 0, times 0 [ 1113.932283][T12332] CPU: 1 PID: 12332 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1113.940338][T12332] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1113.950768][T12332] Call Trace: 12:32:45 executing program 1 (fault-call:5 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:45 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1113.954233][T12332] dump_stack+0x172/0x1f0 [ 1113.958587][T12332] should_fail.cold+0xa/0x15 [ 1113.963204][T12332] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1113.969156][T12332] ? ___might_sleep+0x163/0x280 [ 1113.974037][T12332] __should_failslab+0x121/0x190 [ 1113.979438][T12332] should_failslab+0x9/0x14 [ 1113.983972][T12332] kmem_cache_alloc+0x2b2/0x6f0 [ 1113.988847][T12332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1113.995110][T12332] ? __validate_process_creds+0x22d/0x380 [ 1114.000853][T12332] prepare_creds+0x3e/0x3f0 [ 1114.005373][T12332] prepare_exec_creds+0x12/0xf0 [ 1114.010693][T12332] __do_execve_file.isra.0+0x393/0x23a0 [ 1114.016266][T12332] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1114.022124][T12332] ? __check_object_size+0x3d/0x42f [ 1114.027351][T12332] ? copy_strings_kernel+0x110/0x110 [ 1114.032657][T12332] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.038922][T12332] ? getname_flags+0x277/0x5b0 [ 1114.043719][T12332] ? entry_SYSENTER_compat+0x70/0x7f [ 1114.049027][T12332] __ia32_compat_sys_execve+0x94/0xc0 [ 1114.054425][T12332] do_fast_syscall_32+0x281/0xd54 [ 1114.059563][T12332] entry_SYSENTER_compat+0x70/0x7f [ 1114.064682][T12332] RIP: 0023:0xf7f80849 [ 1114.068854][T12332] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1114.080028][T12344] FAULT_INJECTION: forcing a failure. [ 1114.080028][T12344] name failslab, interval 1, probability 0, space 0, times 0 12:32:46 executing program 0 (fault-call:6 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1114.088751][T12332] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1114.088765][T12332] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1114.088771][T12332] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1114.088778][T12332] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1114.088785][T12332] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1114.088791][T12332] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1114.154214][T12344] CPU: 1 PID: 12344 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1114.161780][T12344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.161794][T12344] Call Trace: [ 1114.175143][T12344] dump_stack+0x172/0x1f0 [ 1114.179569][T12344] should_fail.cold+0xa/0x15 [ 1114.184196][T12344] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.190010][T12344] ? ___might_sleep+0x163/0x280 [ 1114.190030][T12344] __should_failslab+0x121/0x190 [ 1114.190058][T12344] should_failslab+0x9/0x14 [ 1114.204319][T12344] kmem_cache_alloc+0x2b2/0x6f0 [ 1114.209284][T12344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.215541][T12344] ? __validate_process_creds+0x22d/0x380 [ 1114.219951][T12447] FAULT_INJECTION: forcing a failure. [ 1114.219951][T12447] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.221274][T12344] prepare_creds+0x3e/0x3f0 [ 1114.221297][T12344] prepare_exec_creds+0x12/0xf0 [ 1114.243264][T12344] __do_execve_file.isra.0+0x393/0x23a0 [ 1114.248809][T12344] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1114.254557][T12344] ? __check_object_size+0x3d/0x42f [ 1114.259757][T12344] ? copy_strings_kernel+0x110/0x110 [ 1114.266909][T12344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.273147][T12344] ? getname_flags+0x277/0x5b0 [ 1114.277909][T12344] ? entry_SYSENTER_compat+0x70/0x7f [ 1114.283367][T12344] __ia32_compat_sys_execve+0x94/0xc0 [ 1114.288742][T12344] do_fast_syscall_32+0x281/0xd54 [ 1114.293856][T12344] entry_SYSENTER_compat+0x70/0x7f [ 1114.298958][T12344] RIP: 0023:0xf7faf849 [ 1114.303036][T12344] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1114.322642][T12344] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1114.331053][T12344] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1114.339023][T12344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1114.346999][T12344] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:46 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x280, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000680)=[{&(0x7f0000000200)="7e088864bd61cf4e0ed9e72d26cb3ca96b59775f6f4cd387192231f707ec45874020b3cb382bb869ffdc0f1eb587c7e47e355ce0a361d2d1f9fc6f63ee8686b54d54c720da05e6c4fccabb65ea6851875b1cc26ce1ff7e351ac0cf2ad5e3af4b3c0f1664b9d7e6bd109f2c598fc20a16671804afcad9b873d241b2992df56c992d30c9c2ff9d0fad5701f1a9c76921b1d043dc420e63265e21957ffa318bb62f89b262356aba1be9f398cb2629dc60dc4daf07c5d6d4aa101ffea566614ea5688818cd43c47e524626249e698b6689310501c3935a1b36c86b12d73379457328b9ee1d1e692fdccf5e7b291018041578a4b364070a3dde", 0xf7}, {&(0x7f0000000400)="5d6493728e4ce88f08732ff65b1d3770c3354b345a1a513e9f0c032b39cd8fe6884256cd74d54c237eff8c8960edb29977b1291947ceb383be1c71fba46d334145a1fd154e8634b924dfecaafda9a14ee570c39bb46b44a5c2c0bc8c277368c64a9cf368a5bb6babba079ab8db7dc6d3e100fea3e084dda3a50bb8d1473b009fdd3621d929e562e68b2a40355049950baff068ef11fa9ea2eb5126b2cac3618f", 0xa0}, {&(0x7f00000004c0)="69423d2da4341a77660ced78c837faf4f834a307ac3913dfc2f20915d254986a7eee1c78cb63fecb7cac864238cc2bf714a1b88bdc16c386431d1cfadbb5dbf8749df130db7a19cd02284c83e5cedb524d07dcbe319523f85e8e0390700e774d065a49f1e218a6a51906dd3e0af94a1b0162a59319301748dca4fe03989d9d144d6a2ffc4d8bc5426dc9b97172fd5acdd985df2da298a2fdbd768c4c13b8661878a5cf9a4efe3b2a283dd241cdca42c40295f95f9a751582da13914f7d0200ee51923374cc0980218cdb354d50f3", 0xce}, {&(0x7f0000000180)="111114e20a2a546d3ff5a0f7cbe8ec442b20a5916edd37703a46180fbe93bde8bea81abfc62e8b13074a45046f9e77", 0x2f}, {&(0x7f00000005c0)="4f65c3c5570d77c68d1cf4868820f09d5aef10151af69b26ae48f30cdea44370b21d11f2eac57f03a9422ce35b749556357d7b2dd784f07ec7f5d1f92163aecee9559f166195f1741deb857d441a256e340c1d897cf46149e202dfff66087c", 0x5f}], 0x5, 0x4) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) r2 = memfd_create(&(0x7f00000000c0)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="232107d48b59dc8aaf26b80f29ce84681a6d42f21ac6ff4da0bf852dd8e6cbeb8d2509"], 0x23) execveat(r2, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f00000000c0)) [ 1114.354976][T12344] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1114.363057][T12344] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1114.371135][T12447] CPU: 0 PID: 12447 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1114.378781][T12447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.388873][T12447] Call Trace: [ 1114.392172][T12447] dump_stack+0x172/0x1f0 [ 1114.396519][T12447] should_fail.cold+0xa/0x15 [ 1114.401124][T12447] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.407214][T12447] ? ___might_sleep+0x163/0x280 [ 1114.412424][T12447] __should_failslab+0x121/0x190 [ 1114.412448][T12447] should_failslab+0x9/0x14 [ 1114.421880][T12447] kmem_cache_alloc+0x2b2/0x6f0 [ 1114.426946][T12447] ? rcu_read_lock_sched_held+0x110/0x130 [ 1114.432681][T12447] ? kmem_cache_alloc+0x32e/0x6f0 [ 1114.437726][T12447] security_file_alloc+0x39/0x170 [ 1114.442768][T12447] __alloc_file+0xac/0x300 [ 1114.447196][T12447] alloc_empty_file+0x72/0x170 [ 1114.451956][T12447] path_openat+0xef/0x46e0 [ 1114.457788][T12447] ? stack_trace_save+0xac/0xe0 [ 1114.462636][T12447] ? stack_trace_consume_entry+0x190/0x190 [ 1114.468434][T12447] ? stack_trace_save+0xac/0xe0 [ 1114.473454][T12447] ? save_stack+0x5c/0x90 [ 1114.477785][T12447] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1114.483508][T12447] ? __kmalloc+0x15c/0x740 [ 1114.487918][T12447] ? security_prepare_creds+0x123/0x190 [ 1114.493474][T12447] ? prepare_creds+0x2f5/0x3f0 [ 1114.498275][T12447] ? prepare_exec_creds+0x12/0xf0 [ 1114.503310][T12447] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1114.509263][T12447] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1114.514823][T12447] ? do_fast_syscall_32+0x281/0xd54 [ 1114.520045][T12447] ? entry_SYSENTER_compat+0x70/0x7f [ 1114.525334][T12447] ? save_stack+0x23/0x90 [ 1114.529696][T12447] do_filp_open+0x1a1/0x280 [ 1114.534218][T12447] ? may_open_dev+0x100/0x100 [ 1114.538900][T12447] ? __lock_acquire+0x54f/0x5490 [ 1114.543887][T12447] ? mark_held_locks+0xf0/0xf0 [ 1114.548667][T12447] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1114.554490][T12447] do_open_execat+0x137/0x690 [ 1114.559198][T12447] ? unregister_binfmt+0x170/0x170 [ 1114.564302][T12447] ? lock_downgrade+0x880/0x880 [ 1114.569286][T12447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.575527][T12447] ? kasan_check_read+0x11/0x20 [ 1114.580377][T12447] ? do_raw_spin_unlock+0x57/0x270 [ 1114.585486][T12447] __do_execve_file.isra.0+0x178d/0x23a0 [ 1114.591217][T12447] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1114.597036][T12447] ? copy_strings_kernel+0x110/0x110 [ 1114.602329][T12447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1114.608570][T12447] ? getname_flags+0x277/0x5b0 [ 1114.613330][T12447] ? entry_SYSENTER_compat+0x70/0x7f [ 1114.618627][T12447] __ia32_compat_sys_execve+0x94/0xc0 [ 1114.624432][T12447] do_fast_syscall_32+0x281/0xd54 [ 1114.629469][T12447] entry_SYSENTER_compat+0x70/0x7f [ 1114.634564][T12447] RIP: 0023:0xf7f04849 [ 1114.638628][T12447] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1114.658223][T12447] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1114.666626][T12447] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1114.674707][T12447] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1114.682887][T12447] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1114.690953][T12447] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1114.698927][T12447] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:46 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) write$P9_RVERSION(r0, &(0x7f0000000080)={0x13, 0x65, 0xffff, 0x5, 0x6, '9P2000'}, 0x13) mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:46 executing program 5 (fault-call:4 fault-nth:8): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:46 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000180)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)='/dev/snapshot\x00', r0) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1114.789050][T12555] FAULT_INJECTION: forcing a failure. [ 1114.789050][T12555] name failslab, interval 1, probability 0, space 0, times 0 [ 1114.798180][T12559] FAULT_INJECTION: forcing a failure. [ 1114.798180][T12559] name failslab, interval 1, probability 0, space 0, times 0 12:32:46 executing program 1 (fault-call:5 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1114.832550][T12555] CPU: 0 PID: 12555 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1114.840340][T12555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1114.850587][T12555] Call Trace: [ 1114.853904][T12555] dump_stack+0x172/0x1f0 [ 1114.858375][T12555] should_fail.cold+0xa/0x15 [ 1114.863003][T12555] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1114.868835][T12555] ? ___might_sleep+0x163/0x280 [ 1114.873717][T12555] __should_failslab+0x121/0x190 [ 1114.878682][T12555] should_failslab+0x9/0x14 [ 1114.883206][T12555] kmem_cache_alloc+0x2b2/0x6f0 [ 1114.888095][T12555] ? __kernel_text_address+0xd/0x40 [ 1114.893313][T12555] ? unwind_get_return_address+0x61/0xa0 [ 1114.899001][T12555] ? profile_setup.cold+0xbb/0xbb [ 1114.904044][T12555] __alloc_file+0x27/0x300 [ 1114.908743][T12555] alloc_empty_file+0x72/0x170 [ 1114.913525][T12555] path_openat+0xef/0x46e0 [ 1114.917954][T12555] ? stack_trace_save+0xac/0xe0 [ 1114.922829][T12555] ? stack_trace_consume_entry+0x190/0x190 12:32:46 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1114.928657][T12555] ? stack_trace_save+0xac/0xe0 [ 1114.933614][T12555] ? save_stack+0x5c/0x90 [ 1114.937963][T12555] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1114.943359][T12555] ? __kmalloc+0x15c/0x740 [ 1114.947799][T12555] ? security_prepare_creds+0x123/0x190 [ 1114.953356][T12555] ? prepare_creds+0x2f5/0x3f0 [ 1114.959029][T12555] ? prepare_exec_creds+0x12/0xf0 [ 1114.964058][T12555] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1114.969778][T12555] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1114.975327][T12555] ? do_fast_syscall_32+0x281/0xd54 [ 1114.980549][T12555] ? entry_SYSENTER_compat+0x70/0x7f [ 1114.985831][T12555] ? save_stack+0x23/0x90 [ 1114.990430][T12555] do_filp_open+0x1a1/0x280 [ 1114.994955][T12555] ? may_open_dev+0x100/0x100 [ 1114.999648][T12555] ? __lock_acquire+0x54f/0x5490 [ 1115.004598][T12555] ? mark_held_locks+0xf0/0xf0 [ 1115.009363][T12555] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1115.015185][T12555] do_open_execat+0x137/0x690 [ 1115.019891][T12555] ? unregister_binfmt+0x170/0x170 [ 1115.025177][T12555] ? lock_downgrade+0x880/0x880 [ 1115.030294][T12555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.036705][T12555] ? kasan_check_read+0x11/0x20 [ 1115.041576][T12555] ? do_raw_spin_unlock+0x57/0x270 [ 1115.046868][T12555] __do_execve_file.isra.0+0x178d/0x23a0 [ 1115.052589][T12555] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1115.058314][T12555] ? copy_strings_kernel+0x110/0x110 [ 1115.063603][T12555] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.069838][T12555] ? getname_flags+0x277/0x5b0 [ 1115.074605][T12555] ? entry_SYSENTER_compat+0x70/0x7f [ 1115.079896][T12555] __ia32_compat_sys_execve+0x94/0xc0 [ 1115.085268][T12555] do_fast_syscall_32+0x281/0xd54 [ 1115.090294][T12555] entry_SYSENTER_compat+0x70/0x7f [ 1115.095710][T12555] RIP: 0023:0xf7f80849 [ 1115.099773][T12555] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1115.119469][T12555] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1115.127878][T12555] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1115.135974][T12555] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1115.143949][T12555] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1115.152097][T12555] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1115.160249][T12555] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1115.168792][T12559] CPU: 1 PID: 12559 Comm: syz-executor.5 Not tainted 5.1.0+ #5 12:32:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1115.176383][T12559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.186556][T12559] Call Trace: [ 1115.189861][T12559] dump_stack+0x172/0x1f0 [ 1115.194206][T12559] should_fail.cold+0xa/0x15 [ 1115.198814][T12559] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.204643][T12559] ? ___might_sleep+0x163/0x280 [ 1115.209511][T12559] __should_failslab+0x121/0x190 [ 1115.214464][T12559] should_failslab+0x9/0x14 [ 1115.218986][T12559] __kmalloc+0x2dc/0x740 [ 1115.223237][T12559] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1115.229410][T12559] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1115.235222][T12559] ? security_prepare_creds+0x123/0x190 [ 1115.240753][T12559] security_prepare_creds+0x123/0x190 [ 1115.246154][T12559] prepare_creds+0x2f5/0x3f0 [ 1115.250727][T12559] prepare_exec_creds+0x12/0xf0 [ 1115.255777][T12559] __do_execve_file.isra.0+0x393/0x23a0 [ 1115.261310][T12559] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1115.267014][T12559] ? __check_object_size+0x3d/0x42f [ 1115.272301][T12559] ? copy_strings_kernel+0x110/0x110 [ 1115.277763][T12559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.284005][T12559] ? getname_flags+0x277/0x5b0 [ 1115.288756][T12559] ? entry_SYSENTER_compat+0x70/0x7f [ 1115.294041][T12559] __ia32_compat_sys_execve+0x94/0xc0 [ 1115.299407][T12559] do_fast_syscall_32+0x281/0xd54 [ 1115.304422][T12559] entry_SYSENTER_compat+0x70/0x7f [ 1115.309794][T12559] RIP: 0023:0xf7faf849 [ 1115.313856][T12559] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:47 executing program 0 (fault-call:6 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:47 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a45323, &(0x7f0000000200)={{0x1, 0x8}, 'port1\x00', 0xa, 0x8, 0x80, 0x1, 0x1, 0x0, 0x100, 0x0, 0x6, 0x3ff}) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1115.333478][T12559] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1115.341895][T12559] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1115.349867][T12559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1115.357826][T12559] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1115.365780][T12559] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1115.373736][T12559] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1115.466731][T12678] FAULT_INJECTION: forcing a failure. [ 1115.466731][T12678] name failslab, interval 1, probability 0, space 0, times 0 [ 1115.485658][T12689] FAULT_INJECTION: forcing a failure. [ 1115.485658][T12689] name failslab, interval 1, probability 0, space 0, times 0 12:32:47 executing program 5 (fault-call:4 fault-nth:9): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1115.512291][T12689] CPU: 1 PID: 12689 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1115.519893][T12689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.531282][T12689] Call Trace: [ 1115.534608][T12689] dump_stack+0x172/0x1f0 [ 1115.539851][T12689] should_fail.cold+0xa/0x15 [ 1115.544495][T12689] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.550362][T12689] ? ___might_sleep+0x163/0x280 [ 1115.555259][T12689] __should_failslab+0x121/0x190 [ 1115.560221][T12689] should_failslab+0x9/0x14 12:32:47 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000180)='syzkaller\x00', 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000200)='.request_key_auth\x00', &(0x7f00000002c0)=@keyring={'key_or_keyring:', r1}) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1115.564750][T12689] kmem_cache_alloc+0x2b2/0x6f0 [ 1115.569625][T12689] ? __kernel_text_address+0xd/0x40 [ 1115.574838][T12689] ? unwind_get_return_address+0x61/0xa0 [ 1115.580591][T12689] ? profile_setup.cold+0xbb/0xbb [ 1115.585663][T12689] __alloc_file+0x27/0x300 [ 1115.590096][T12689] alloc_empty_file+0x72/0x170 [ 1115.594977][T12689] path_openat+0xef/0x46e0 [ 1115.599436][T12689] ? stack_trace_save+0xac/0xe0 [ 1115.604305][T12689] ? stack_trace_consume_entry+0x190/0x190 [ 1115.610122][T12689] ? stack_trace_save+0xac/0xe0 12:32:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(0x0, 0x0, 0x400100) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1115.610143][T12689] ? save_stack+0x5c/0x90 [ 1115.619308][T12689] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1115.624679][T12689] ? __kmalloc+0x15c/0x740 [ 1115.624698][T12689] ? security_prepare_creds+0x123/0x190 [ 1115.624713][T12689] ? prepare_creds+0x2f5/0x3f0 [ 1115.624725][T12689] ? prepare_exec_creds+0x12/0xf0 [ 1115.624742][T12689] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1115.624753][T12689] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1115.624767][T12689] ? do_fast_syscall_32+0x281/0xd54 [ 1115.624788][T12689] ? entry_SYSENTER_compat+0x70/0x7f [ 1115.666224][T12689] ? save_stack+0x23/0x90 [ 1115.670586][T12689] do_filp_open+0x1a1/0x280 [ 1115.675105][T12689] ? may_open_dev+0x100/0x100 [ 1115.679798][T12689] ? __lock_acquire+0x54f/0x5490 [ 1115.684764][T12689] ? mark_held_locks+0xf0/0xf0 [ 1115.689561][T12689] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1115.695391][T12689] do_open_execat+0x137/0x690 [ 1115.700083][T12689] ? unregister_binfmt+0x170/0x170 [ 1115.705241][T12689] ? lock_downgrade+0x880/0x880 [ 1115.710102][T12689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.716358][T12689] ? kasan_check_read+0x11/0x20 [ 1115.721208][T12689] ? do_raw_spin_unlock+0x57/0x270 [ 1115.726337][T12689] __do_execve_file.isra.0+0x178d/0x23a0 [ 1115.731978][T12689] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1115.737723][T12689] ? copy_strings_kernel+0x110/0x110 [ 1115.743026][T12689] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1115.749286][T12689] ? getname_flags+0x277/0x5b0 [ 1115.754077][T12689] ? entry_SYSENTER_compat+0x70/0x7f [ 1115.759382][T12689] __ia32_compat_sys_execve+0x94/0xc0 12:32:47 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1115.764775][T12689] do_fast_syscall_32+0x281/0xd54 [ 1115.769819][T12689] entry_SYSENTER_compat+0x70/0x7f [ 1115.774941][T12689] RIP: 0023:0xf7f80849 [ 1115.779018][T12689] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1115.798623][T12689] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1115.807050][T12689] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1115.815026][T12689] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1115.815035][T12689] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1115.815043][T12689] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1115.815051][T12689] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1115.820834][T12678] CPU: 1 PID: 12678 Comm: syz-executor.1 Not tainted 5.1.0+ #5 [ 1115.854576][T12678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1115.864615][T12678] Call Trace: [ 1115.867898][T12678] dump_stack+0x172/0x1f0 [ 1115.872213][T12678] should_fail.cold+0xa/0x15 [ 1115.876786][T12678] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1115.883534][T12678] ? ___might_sleep+0x163/0x280 [ 1115.888372][T12678] __should_failslab+0x121/0x190 [ 1115.893298][T12678] should_failslab+0x9/0x14 [ 1115.897795][T12678] kmem_cache_alloc+0x2b2/0x6f0 [ 1115.902644][T12678] ? rcu_read_lock_sched_held+0x110/0x130 [ 1115.908343][T12678] ? kmem_cache_alloc+0x32e/0x6f0 [ 1115.913374][T12678] security_file_alloc+0x39/0x170 [ 1115.918385][T12678] __alloc_file+0xac/0x300 [ 1115.922783][T12678] alloc_empty_file+0x72/0x170 [ 1115.927531][T12678] path_openat+0xef/0x46e0 [ 1115.931931][T12678] ? stack_trace_save+0xac/0xe0 [ 1115.936781][T12678] ? stack_trace_consume_entry+0x190/0x190 [ 1115.942586][T12678] ? stack_trace_save+0xac/0xe0 [ 1115.947420][T12678] ? save_stack+0x5c/0x90 [ 1115.951734][T12678] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1115.957091][T12678] ? __kmalloc+0x15c/0x740 [ 1115.961491][T12678] ? security_prepare_creds+0x123/0x190 [ 1115.967040][T12678] ? prepare_creds+0x2f5/0x3f0 [ 1115.971879][T12678] ? prepare_exec_creds+0x12/0xf0 [ 1115.976903][T12678] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1115.982689][T12678] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1115.988216][T12678] ? do_fast_syscall_32+0x281/0xd54 [ 1115.993402][T12678] ? entry_SYSENTER_compat+0x70/0x7f [ 1115.998666][T12678] ? save_stack+0x23/0x90 [ 1116.002986][T12678] do_filp_open+0x1a1/0x280 [ 1116.007471][T12678] ? may_open_dev+0x100/0x100 [ 1116.012146][T12678] ? __lock_acquire+0x54f/0x5490 [ 1116.017081][T12678] ? mark_held_locks+0xf0/0xf0 [ 1116.021826][T12678] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1116.027620][T12678] do_open_execat+0x137/0x690 [ 1116.032286][T12678] ? unregister_binfmt+0x170/0x170 [ 1116.037381][T12678] ? lock_downgrade+0x880/0x880 [ 1116.042218][T12678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.048441][T12678] ? kasan_check_read+0x11/0x20 [ 1116.053461][T12678] ? do_raw_spin_unlock+0x57/0x270 [ 1116.058582][T12678] __do_execve_file.isra.0+0x178d/0x23a0 [ 1116.064292][T12678] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1116.069999][T12678] ? copy_strings_kernel+0x110/0x110 [ 1116.077576][T12678] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.091958][T12678] ? getname_flags+0x277/0x5b0 [ 1116.096724][T12678] ? entry_SYSENTER_compat+0x70/0x7f [ 1116.101998][T12678] __ia32_compat_sys_execve+0x94/0xc0 [ 1116.107354][T12678] do_fast_syscall_32+0x281/0xd54 [ 1116.112394][T12678] entry_SYSENTER_compat+0x70/0x7f [ 1116.117487][T12678] RIP: 0023:0xf7f04849 [ 1116.121545][T12678] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1116.141133][T12678] RSP: 002b:00000000f5d000cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1116.149527][T12678] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1116.157483][T12678] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1116.165438][T12678] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1116.173409][T12678] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1116.181362][T12678] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1116.231409][T12905] FAULT_INJECTION: forcing a failure. [ 1116.231409][T12905] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.295243][T12905] CPU: 0 PID: 12905 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1116.302850][T12905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.313216][T12905] Call Trace: [ 1116.316618][T12905] dump_stack+0x172/0x1f0 [ 1116.321015][T12905] should_fail.cold+0xa/0x15 [ 1116.325642][T12905] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1116.331479][T12905] ? ___might_sleep+0x163/0x280 [ 1116.336361][T12905] __should_failslab+0x121/0x190 12:32:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB="580000001b822ed1e8b25e643e70f6a7dac7b4212276a6f196c48f573bfb8eb67fd1cf7df389cb4447e8d7f8154c858d092c4919fccbacdf936d0db5ef6467118df7b4a439cba757e37ba0f6441fa2fef976b14e0915d8806b0ffbf1fdabf9edb44f26ad3968b5bd319cff25184b8fcdaab7ab1313d00fb19f97bdaf2afa117450d7831247d8ce0310e296ae74ab613b91247b9b22b33f5e2235599a0a0f0b7ac190d8d0d662a97aad63337026433fd5e7042679ccac6009b81fba3e30fe5231188f423c13d01f9bef926d6512b12a58b6f8ee231457f86263d141b633ad96a47354cef9b2a1301b0d6e37e1f40c612c90915c5b88"], &(0x7f0000000500)=0x60) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:48 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000300)={'bond_slave_0\x00', 0x1}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r1, 0x80247008, &(0x7f0000000340)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer2\x00', 0x8400, 0x0) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f0000000280)={0x1, 0x40, 0x10001, 0x2, 0xffffffff}) mount(&(0x7f0000000040)=@md0='/dev/md0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='coda\x00', 0x10000, &(0x7f0000000200)='ramfs\x00') 12:32:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:48 executing program 0 (fault-call:6 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1116.341312][T12905] should_failslab+0x9/0x14 [ 1116.345831][T12905] kmem_cache_alloc+0x2b2/0x6f0 [ 1116.350704][T12905] ? __kernel_text_address+0xd/0x40 [ 1116.355919][T12905] ? unwind_get_return_address+0x61/0xa0 [ 1116.361561][T12905] ? profile_setup.cold+0xbb/0xbb [ 1116.366601][T12905] __alloc_file+0x27/0x300 [ 1116.371037][T12905] alloc_empty_file+0x72/0x170 [ 1116.375812][T12905] path_openat+0xef/0x46e0 [ 1116.380240][T12905] ? stack_trace_save+0xac/0xe0 [ 1116.385293][T12905] ? stack_trace_consume_entry+0x190/0x190 [ 1116.391100][T12905] ? stack_trace_save+0xac/0xe0 [ 1116.395944][T12905] ? save_stack+0x5c/0x90 [ 1116.400262][T12905] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1116.405614][T12905] ? __kmalloc+0x15c/0x740 [ 1116.410018][T12905] ? security_prepare_creds+0x123/0x190 [ 1116.415543][T12905] ? prepare_creds+0x2f5/0x3f0 [ 1116.420285][T12905] ? prepare_exec_creds+0x12/0xf0 [ 1116.425380][T12905] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1116.431085][T12905] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1116.436619][T12905] ? do_fast_syscall_32+0x281/0xd54 [ 1116.441837][T12905] ? entry_SYSENTER_compat+0x70/0x7f [ 1116.447117][T12905] ? save_stack+0x23/0x90 [ 1116.451431][T12905] do_filp_open+0x1a1/0x280 [ 1116.455919][T12905] ? may_open_dev+0x100/0x100 [ 1116.460581][T12905] ? __lock_acquire+0x54f/0x5490 [ 1116.465507][T12905] ? mark_held_locks+0xf0/0xf0 [ 1116.470258][T12905] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1116.476049][T12905] do_open_execat+0x137/0x690 [ 1116.480709][T12905] ? unregister_binfmt+0x170/0x170 [ 1116.485802][T12905] ? lock_downgrade+0x880/0x880 [ 1116.490635][T12905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.496861][T12905] ? kasan_check_read+0x11/0x20 [ 1116.501696][T12905] ? do_raw_spin_unlock+0x57/0x270 [ 1116.506790][T12905] __do_execve_file.isra.0+0x178d/0x23a0 [ 1116.512403][T12905] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1116.518122][T12905] ? copy_strings_kernel+0x110/0x110 [ 1116.523397][T12905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1116.529618][T12905] ? getname_flags+0x277/0x5b0 [ 1116.534494][T12905] ? entry_SYSENTER_compat+0x70/0x7f [ 1116.539765][T12905] __ia32_compat_sys_execve+0x94/0xc0 [ 1116.545127][T12905] do_fast_syscall_32+0x281/0xd54 [ 1116.550158][T12905] entry_SYSENTER_compat+0x70/0x7f [ 1116.555249][T12905] RIP: 0023:0xf7faf849 [ 1116.559299][T12905] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1116.586624][T12905] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 12:32:48 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(0x0, &(0x7f00000002c0)='./file0\x00') r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0xa793, 0x801) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000019c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001ac0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000001b00)={@remote, 0x2c, r1}) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PPPIOCATTCHAN(r0, 0x40047438, &(0x7f00000000c0)=0x1) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0x40000e05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1116.595029][T12905] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1116.604099][T12905] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1116.612068][T12905] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1116.620027][T12905] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1116.627983][T12905] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:48 executing program 5 (fault-call:4 fault-nth:10): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1116.731104][T13022] FAULT_INJECTION: forcing a failure. [ 1116.731104][T13022] name failslab, interval 1, probability 0, space 0, times 0 12:32:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1116.849045][T13022] CPU: 1 PID: 13022 Comm: syz-executor.0 Not tainted 5.1.0+ #5 [ 1116.856654][T13022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1116.866978][T13022] Call Trace: [ 1116.870288][T13022] dump_stack+0x172/0x1f0 [ 1116.874641][T13022] should_fail.cold+0xa/0x15 [ 1116.879260][T13022] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1116.885085][T13022] ? ___might_sleep+0x163/0x280 [ 1116.885109][T13022] __should_failslab+0x121/0x190 [ 1116.885126][T13022] should_failslab+0x9/0x14 [ 1116.885146][T13022] kmem_cache_alloc+0x2b2/0x6f0 [ 1116.897239][T13134] FAULT_INJECTION: forcing a failure. [ 1116.897239][T13134] name failslab, interval 1, probability 0, space 0, times 0 [ 1116.899412][T13022] ? rcu_read_lock_sched_held+0x110/0x130 [ 1116.917074][T13022] ? kmem_cache_alloc+0x32e/0x6f0 [ 1116.917095][T13022] security_file_alloc+0x39/0x170 [ 1116.917113][T13022] __alloc_file+0xac/0x300 [ 1116.917127][T13022] alloc_empty_file+0x72/0x170 [ 1116.917143][T13022] path_openat+0xef/0x46e0 [ 1116.917167][T13022] ? __lock_acquire+0x54f/0x5490 [ 1116.951429][T13022] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1116.956896][T13022] ? mark_held_locks+0xf0/0xf0 [ 1116.962537][T13022] ? finish_task_switch+0x146/0x740 [ 1116.967742][T13022] ? find_held_lock+0x35/0x130 [ 1116.972516][T13022] do_filp_open+0x1a1/0x280 [ 1116.977026][T13022] ? may_open_dev+0x100/0x100 [ 1116.981713][T13022] ? _raw_spin_unlock_irq+0x28/0x90 [ 1116.986925][T13022] ? finish_task_switch+0x146/0x740 [ 1116.992136][T13022] ? _raw_spin_unlock_irq+0x28/0x90 [ 1116.997381][T13022] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1117.002701][T13022] ? _raw_spin_unlock_irq+0x5e/0x90 [ 1117.007911][T13022] ? finish_task_switch+0x146/0x740 [ 1117.013120][T13022] ? finish_task_switch+0x118/0x740 [ 1117.018355][T13022] ? __switch_to_asm+0x34/0x70 [ 1117.023136][T13022] ? __schedule+0x7d9/0x1580 [ 1117.027741][T13022] ? __sched_text_start+0x8/0x8 [ 1117.032613][T13022] do_open_execat+0x137/0x690 [ 1117.037306][T13022] ? unregister_binfmt+0x170/0x170 [ 1117.042435][T13022] ? preempt_schedule_common+0x4f/0xe0 [ 1117.047917][T13022] ? ___preempt_schedule+0x16/0x18 [ 1117.053059][T13022] __do_execve_file.isra.0+0x178d/0x23a0 [ 1117.058700][T13022] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1117.064440][T13022] ? copy_strings_kernel+0x110/0x110 [ 1117.069755][T13022] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.076010][T13022] ? getname_flags+0x277/0x5b0 [ 1117.080860][T13022] ? entry_SYSENTER_compat+0x70/0x7f [ 1117.086149][T13022] __ia32_compat_sys_execve+0x94/0xc0 [ 1117.091525][T13022] do_fast_syscall_32+0x281/0xd54 12:32:48 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x722, 0x1}, &(0x7f00000000c0)=0x88) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x3, 0x7, 0x9}, 0x10) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000001880)='./file0\x00', &(0x7f0000001840)='./file0/file0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x1ff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000600)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000001980)='net/udp\x00\n\xa3\x17~T\xecl\\X\xf6\xdc\xd0\xa2\xc8\xd8\xf6\x03\x00\xf8\xf3\x04\xf7\x9f4\xcd\x88ES$\xfbp\x1fs\x86\x99Om(/,\xff>x \xb1\xe6\x01\x19\xf2b\xadE:\xd1D\x16') ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r1, 0xc058534f, &(0x7f0000000580)={{0x20, 0x4}, 0x1, 0x100, 0x3ff, {0x8001, 0x4}, 0xf20, 0x7fffffff}) recvmsg$kcm(r1, &(0x7f0000000500)={&(0x7f0000000100)=@generic, 0x80, &(0x7f0000000480)=[{&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/201, 0xc9}, {&(0x7f0000000380)=""/36, 0x24}, {&(0x7f00000003c0)=""/175, 0xaf}], 0x5, &(0x7f0000001680)=""/229, 0xe5}, 0x100) [ 1117.096554][T13022] entry_SYSENTER_compat+0x70/0x7f [ 1117.101661][T13022] RIP: 0023:0xf7f80849 [ 1117.105823][T13022] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1117.125566][T13022] RSP: 002b:00000000f5d7c0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1117.133993][T13022] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1117.141970][T13022] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1117.150296][T13022] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1117.158418][T13022] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1117.166404][T13022] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1117.174417][T13134] CPU: 0 PID: 13134 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1117.181990][T13134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.192063][T13134] Call Trace: [ 1117.195374][T13134] dump_stack+0x172/0x1f0 12:32:49 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = socket$kcm(0x29, 0x5, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x2, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000680)={0x7, "778049c157f3970b259352e66cacefc8eb63a7d07dd17d60966650a759837906", 0x3, 0x1080, 0x1, 0x100000001, 0x4, 0x1, 0xbcb}) setsockopt(r0, 0x2, 0x8894, &(0x7f0000000500)="cbb0a06f0421ad65d03b5212b50e6d806229609d5611c72fd62642956d54970009282a01fa9c9b9015e8610cfb932f48465a7bac8feeea1618933441d2b92252b4485797f12d973edc46833c0ea09074a72e2cb9ef3d5bf3e42a801a98549ab387f71037add43396fe038a077e4a1defc16cb141643c15134c7fe186e40acf843ad3cbd1b3052013e17b6c194c467c8e7daaf774d2dddc2dbcc1beb51541a93bc0a0af47e0dd80377b8fa75bbee5ac99d6d1200bd0f3566b69fe6a9a516884b869ae41bd73f80542a57bb420f7a8a5fccda856cc", 0xd4) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0xff4a, &(0x7f0000000140)=0x1000000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x88000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r2, 0xc2c45513, &(0x7f0000000200)={{0x5, 0x3, 0x3f, 0x1, 'syz1\x00', 0x80000000}, 0x0, [0xa214, 0xc69, 0x9, 0x4, 0xf6, 0x7, 0x6, 0xb9, 0xe7000000000, 0x8, 0x6, 0x2, 0x3, 0x1ee, 0x6, 0x80, 0x15, 0x8001, 0x2, 0x6, 0x3, 0x20, 0x7ff, 0x3, 0x1cdbd63e, 0xf9, 0x2, 0x80, 0x380000000000, 0x0, 0x4, 0x9, 0x5, 0x9, 0x3f, 0x4, 0xffff, 0xef12, 0x1, 0x9f58, 0x7ff, 0x1, 0x0, 0x5, 0x2, 0x7f, 0x0, 0x8, 0x3, 0xfffffffffffffffe, 0x3, 0x7, 0x3, 0x0, 0x3, 0xf28, 0x2, 0x62e2, 0x800, 0x1, 0x1, 0x7a0000000000000, 0x0, 0x8, 0x1f, 0x5e8, 0x4, 0x7, 0x1, 0x9, 0x40, 0x7, 0x1000, 0xfffffffffffffffe, 0x5, 0x5, 0x8001, 0x81, 0x8, 0xffffffff7fffffff, 0xccf0, 0x2, 0x88c0, 0xff, 0x81, 0x4, 0x3, 0x101, 0x9, 0x3, 0x0, 0x1ff, 0x4, 0x5, 0x800, 0x0, 0x9, 0x0, 0x8, 0x200, 0x6, 0x1, 0xfffffffffffffff7, 0x6, 0x3, 0x1ff, 0x1f, 0x3, 0x0, 0x7, 0x2, 0x0, 0x7, 0x2, 0x0, 0x7f, 0x6c80, 0x8, 0x8, 0x2, 0x47d, 0x1f, 0x9f, 0x400, 0x3, 0x101, 0x3, 0x9], {0x0, 0x989680}}) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1117.199726][T13134] should_fail.cold+0xa/0x15 [ 1117.204338][T13134] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1117.210172][T13134] ? ___might_sleep+0x163/0x280 [ 1117.215056][T13134] __should_failslab+0x121/0x190 [ 1117.220020][T13134] should_failslab+0x9/0x14 [ 1117.224537][T13134] kmem_cache_alloc+0x2b2/0x6f0 [ 1117.229391][T13134] ? rcu_read_lock_sched_held+0x110/0x130 [ 1117.235103][T13134] ? kmem_cache_alloc+0x32e/0x6f0 [ 1117.240401][T13134] security_file_alloc+0x39/0x170 [ 1117.245423][T13134] __alloc_file+0xac/0x300 [ 1117.249828][T13134] alloc_empty_file+0x72/0x170 [ 1117.254579][T13134] path_openat+0xef/0x46e0 [ 1117.258986][T13134] ? stack_trace_save+0xac/0xe0 [ 1117.263906][T13134] ? stack_trace_consume_entry+0x190/0x190 [ 1117.269696][T13134] ? stack_trace_save+0xac/0xe0 [ 1117.274808][T13134] ? save_stack+0x5c/0x90 [ 1117.279120][T13134] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1117.284476][T13134] ? __kmalloc+0x15c/0x740 [ 1117.288972][T13134] ? security_prepare_creds+0x123/0x190 [ 1117.294516][T13134] ? prepare_creds+0x2f5/0x3f0 [ 1117.299263][T13134] ? prepare_exec_creds+0x12/0xf0 [ 1117.304287][T13134] ? __do_execve_file.isra.0+0x393/0x23a0 [ 1117.310009][T13134] ? __ia32_compat_sys_execve+0x94/0xc0 [ 1117.315557][T13134] ? do_fast_syscall_32+0x281/0xd54 [ 1117.320736][T13134] ? entry_SYSENTER_compat+0x70/0x7f [ 1117.326010][T13134] ? save_stack+0x23/0x90 [ 1117.330343][T13134] do_filp_open+0x1a1/0x280 [ 1117.334833][T13134] ? may_open_dev+0x100/0x100 [ 1117.339527][T13134] ? __lock_acquire+0x54f/0x5490 [ 1117.344489][T13134] ? mark_held_locks+0xf0/0xf0 [ 1117.349240][T13134] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1117.355039][T13134] do_open_execat+0x137/0x690 [ 1117.359702][T13134] ? unregister_binfmt+0x170/0x170 [ 1117.364813][T13134] ? lock_downgrade+0x880/0x880 [ 1117.369650][T13134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.375886][T13134] ? kasan_check_read+0x11/0x20 [ 1117.381120][T13134] ? do_raw_spin_unlock+0x57/0x270 [ 1117.386246][T13134] __do_execve_file.isra.0+0x178d/0x23a0 [ 1117.391866][T13134] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1117.397808][T13134] ? copy_strings_kernel+0x110/0x110 [ 1117.403081][T13134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.409308][T13134] ? getname_flags+0x277/0x5b0 [ 1117.414171][T13134] ? entry_SYSENTER_compat+0x70/0x7f [ 1117.419444][T13134] __ia32_compat_sys_execve+0x94/0xc0 [ 1117.424811][T13134] do_fast_syscall_32+0x281/0xd54 [ 1117.429912][T13134] entry_SYSENTER_compat+0x70/0x7f [ 1117.435189][T13134] RIP: 0023:0xf7faf849 [ 1117.439473][T13134] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1117.459519][T13134] RSP: 002b:00000000f5d690cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1117.468010][T13134] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1117.475976][T13134] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1117.484018][T13134] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1117.492082][T13134] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 12:32:49 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x7fff, 0x4002) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000440)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x300}, 0xc, &(0x7f0000000400)={&(0x7f00000002c0)={0x48, r1, 0x800, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x101}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x20008000) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:49 executing program 0 (fault-call:6 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1117.500044][T13134] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000100)=0x5) r1 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x301040) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {&(0x7f0000000200)}}, 0x10) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:49 executing program 5 (fault-call:4 fault-nth:11): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1117.787969][T13356] FAULT_INJECTION: forcing a failure. [ 1117.787969][T13356] name failslab, interval 1, probability 0, space 0, times 0 [ 1117.818221][T13356] CPU: 1 PID: 13356 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1117.825856][T13356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1117.835959][T13356] Call Trace: [ 1117.839383][T13356] dump_stack+0x172/0x1f0 [ 1117.843747][T13356] should_fail.cold+0xa/0x15 [ 1117.848367][T13356] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1117.854210][T13356] ? ___might_sleep+0x163/0x280 [ 1117.859129][T13356] __should_failslab+0x121/0x190 [ 1117.864173][T13356] should_failslab+0x9/0x14 [ 1117.869320][T13356] kmem_cache_alloc+0x2b2/0x6f0 [ 1117.874687][T13356] ? nr_iowait+0x130/0x130 [ 1117.879129][T13356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.885589][T13356] mm_alloc+0x1d/0xd0 [ 1117.889667][T13356] __do_execve_file.isra.0+0xaa3/0x23a0 [ 1117.895331][T13356] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1117.901077][T13356] ? copy_strings_kernel+0x110/0x110 [ 1117.906435][T13356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1117.913186][T13356] ? getname_flags+0x277/0x5b0 [ 1117.917970][T13356] ? entry_SYSENTER_compat+0x70/0x7f [ 1117.923278][T13356] __ia32_compat_sys_execve+0x94/0xc0 [ 1117.928764][T13356] do_fast_syscall_32+0x281/0xd54 12:32:49 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x3, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, 0x4, 0x9, 0x1, 0x2, 0xffffffffffffffff, 0x8, 0x80000000, 0x9, 0x7, 0x7, 0xffffffffffffffff, 0x4, 0xfffffffffffffff9, 0x1, 0x88, 0x6, 0x6, 0x3, 0x4, 0x8000, 0x5, 0x6, 0x101, 0x2, 0x8, 0x84ed, 0x5, 0x2, 0x3, 0x0, 0x78, 0x5, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x10000, 0x400, 0x8, 0x100, 0x0, 0xfffffffffffffff9}, r1, 0x6, r0, 0x1) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1ff, 0x100) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f00000000c0)=""/163) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bind$netlink(r0, &(0x7f0000000200)={0x10, 0x0, 0x25dfdbfb, 0x10000}, 0xc) r1 = gettid() write$FUSE_LK(r0, &(0x7f0000000240)={0x28, 0xfffffffffffffff5, 0x7, {{0x5, 0xde, 0x3, r1}}}, 0x28) 12:32:49 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x10101, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000100)={0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000140)=0x2c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000200)={r1, 0x20}, &(0x7f0000000280)=0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_TRANSLATE(r2, 0xc018ae85, &(0x7f0000000040)={0x0, 0x3006, 0x8, 0x1, 0x9}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:49 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f0000000180)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x1, 0x0) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x3e29, 0x0, 0x36}, 0x8) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) unlink(&(0x7f00000000c0)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1117.933918][T13356] entry_SYSENTER_compat+0x70/0x7f [ 1117.939413][T13356] RIP: 0023:0xf7faf849 [ 1117.943580][T13356] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1117.963533][T13356] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1117.963547][T13356] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1117.963554][T13356] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:32:49 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f00000000c0)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:49 executing program 5 (fault-call:4 fault-nth:12): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1117.963561][T13356] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1117.963568][T13356] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1117.963575][T13356] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000500)) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1118.054473][T13492] FAULT_INJECTION: forcing a failure. [ 1118.054473][T13492] name fail_page_alloc, interval 1, probability 0, space 0, times 0 12:32:50 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x2000000000110) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1118.196406][T13492] CPU: 0 PID: 13492 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1118.204055][T13492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.214213][T13492] Call Trace: [ 1118.217529][T13492] dump_stack+0x172/0x1f0 [ 1118.221896][T13492] should_fail.cold+0xa/0x15 [ 1118.226871][T13492] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1118.232727][T13492] ? ___might_sleep+0x163/0x280 [ 1118.238308][T13492] should_fail_alloc_page+0x50/0x60 12:32:50 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x100000001, 0x0) r1 = request_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)='\'\x00', 0x0) r2 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) write$apparmor_exec(r0, &(0x7f0000000180)={'\x00\x00\x00\x00\x00\x00', '\xec'}, 0xffffffffffffffd1) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000000240)='id_resolver\x00', &(0x7f0000000280)='\'\x00') ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000040)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000200)='\'\x00', r0}, 0x10) 12:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1118.243542][T13492] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1118.248938][T13492] ? mark_held_locks+0xf0/0xf0 [ 1118.253732][T13492] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1118.259501][T13492] ? find_held_lock+0x35/0x130 [ 1118.266025][T13492] ? percpu_ref_put_many+0x94/0x190 [ 1118.271504][T13492] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1118.277770][T13492] alloc_pages_current+0x107/0x210 [ 1118.283266][T13492] __get_free_pages+0xc/0x40 [ 1118.283281][T13492] pgd_alloc+0x8b/0x3f0 [ 1118.283297][T13492] ? pgd_page_get_mm+0x40/0x40 [ 1118.283310][T13492] ? lockdep_init_map+0x1be/0x6d0 [ 1118.283328][T13492] ? lockdep_init_map+0x1be/0x6d0 [ 1118.307218][T13492] mm_init+0x590/0x9b0 [ 1118.311305][T13492] mm_alloc+0xa6/0xd0 [ 1118.315318][T13492] __do_execve_file.isra.0+0xaa3/0x23a0 [ 1118.320896][T13492] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1118.326649][T13492] ? copy_strings_kernel+0x110/0x110 [ 1118.332180][T13492] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.338551][T13492] ? getname_flags+0x277/0x5b0 12:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x8, 0xff, 0x9}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in6={{0xa, 0x4e24, 0x88, @rand_addr="4d0543f753cca56f9581eb2eed87c995", 0x7}}}, &(0x7f0000000380)=0x84) mount(0x0, &(0x7f0000000400)='\x00', &(0x7f0000000040)='tmpfs\x00', 0x2000004, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') recvmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@un=@abs, 0x80, &(0x7f0000000040)}, 0x40012000) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0186416, &(0x7f0000000440)={0x5, 0x1, 0x7, 0xbd, 0x0, 0x9}) [ 1118.343345][T13492] ? entry_SYSENTER_compat+0x70/0x7f [ 1118.348662][T13492] __ia32_compat_sys_execve+0x94/0xc0 [ 1118.354325][T13492] do_fast_syscall_32+0x281/0xd54 [ 1118.359591][T13492] entry_SYSENTER_compat+0x70/0x7f [ 1118.364804][T13492] RIP: 0023:0xf7faf849 [ 1118.368896][T13492] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:50 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x8, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = semget(0x2, 0x7, 0x81) semctl$GETZCNT(r0, 0x3, 0xf, &(0x7f0000000200)=""/224) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000004c0)={&(0x7f0000fee000/0x12000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000a00000/0x600000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000bab000/0x1000)=nil, &(0x7f0000bda000/0x3000)=nil, &(0x7f0000aeb000/0x2000)=nil, &(0x7f0000adb000/0x1000)=nil, &(0x7f0000b09000/0x4000)=nil, &(0x7f0000000400)="c841cc8fa8bb106dc1f15546b7f1fc12dd7f1abbcea084002559e0cfbcaa96b2b83075ead624ee4fba4e5e42b9ff3d1d401d06c0acc427216bf6e624d2386925ea39a95519b6de004874fc660a7742b4d79839a76a61b21ce9532da6521fbf1a31235101094af62c034071c00785e85b2217466f979e2db178710fa2ec2a537dca2753d96650050c0246f9d8b1b4795769d86b2a2ca59319f7", 0x99, r1}, 0x68) r2 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r2, 0x6) unlink(&(0x7f0000000000)='./file0\x00') [ 1118.389699][T13492] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1118.398346][T13492] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1118.406328][T13492] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1118.414309][T13492] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1118.422367][T13492] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1118.430355][T13492] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:50 executing program 5 (fault-call:4 fault-nth:13): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000500)=0x1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1118.567466][T13835] FAULT_INJECTION: forcing a failure. [ 1118.567466][T13835] name failslab, interval 1, probability 0, space 0, times 0 [ 1118.692076][T13835] CPU: 1 PID: 13835 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1118.700311][T13835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1118.710504][T13835] Call Trace: [ 1118.713821][T13835] dump_stack+0x172/0x1f0 [ 1118.718177][T13835] should_fail.cold+0xa/0x15 [ 1118.722795][T13835] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1118.722818][T13835] ? ___might_sleep+0x163/0x280 [ 1118.722840][T13835] __should_failslab+0x121/0x190 [ 1118.722858][T13835] should_failslab+0x9/0x14 [ 1118.722879][T13835] kmem_cache_alloc+0x2b2/0x6f0 [ 1118.733527][T13835] vm_area_alloc+0x20/0x110 [ 1118.733545][T13835] __do_execve_file.isra.0+0xc34/0x23a0 [ 1118.733568][T13835] ? copy_strings_kernel+0x110/0x110 [ 1118.733584][T13835] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1118.733601][T13835] ? getname_flags+0x277/0x5b0 [ 1118.769421][T13835] ? entry_SYSENTER_compat+0x70/0x7f [ 1118.779456][T13835] __ia32_compat_sys_execve+0x94/0xc0 [ 1118.786153][T13835] do_fast_syscall_32+0x281/0xd54 12:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0xfff, 0x601) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)={0x68, r1, 0x24, 0x70bd27, 0x25dfdbfb, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x10000, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:50 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000200)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1118.791199][T13835] entry_SYSENTER_compat+0x70/0x7f [ 1118.796325][T13835] RIP: 0023:0xf7faf849 [ 1118.800405][T13835] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1118.820011][T13835] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1118.820025][T13835] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:32:50 executing program 1: openat$vcs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vcs\x00', 0x40000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x54000400, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_RMID(r0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x1000, 0x12000) fstat(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f00000000c0)='./file1\x00', r3, r4, 0x10ff) chdir(&(0x7f0000000540)='./file0\x00') pread64(r2, &(0x7f0000000380)=""/236, 0xec, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') get_thread_area(&(0x7f0000000340)={0x9, 0x20000800, 0xffffffffffffffff, 0xfffffffffffffeff, 0x9, 0x2, 0x4, 0xa14, 0x100, 0x6}) ioctl$PPPIOCSMAXCID(r2, 0x40047451, &(0x7f00000002c0)=0x3) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fcntl$F_SET_FILE_RW_HINT(r1, 0x40e, &(0x7f0000000300)=0x5) 12:32:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000500)=0x1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:50 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xfffffffffffffcd4}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000000040)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x3, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x404480, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40086410, &(0x7f00000003c0)={0x1000, &(0x7f00000007c0)="45ae0150cc46b4f4cbb6e14e7c4d1c25ad2e37d3b0ca2713d79a9ce3b589c796a28ffeb5e6238d6aaca6ce48bb192bffa17d5b59844163e7f0a6e6d77b99e6f20f2156fc970fc41bb8b815b96a75d87663c296e992075e27ae5b92aae28b3b3c38c7ef0d5b14952a53894768ff982198d07b52212392bf73349593e5ba7f203b03ab0538f57813aa43b61558d0b146aaed6f0dd9cc4dcb61663f0687b49ae845b111eb7e182d7999237f1b0cd4e579bdfe0dd9b47cc00be4eaaeee9dc924973ca8adb8ac04e5aa27b8c9586b2b4f7558d06db0afbcc972e67e3ed107a848de73f60ad1cd5ea41cc8b23800981c98356425d3e9e6b8f022114dc7ab80ee77b96a72fb6bb5c6174e70d9a5d191e6901e80431519ee5f4fd0a9ae882b73daf68756515685db574e21ce53a86a3863b67972b3217c59ffa0c850a52a0ee10ddfd4e15b293bfef28adb5beadb9e405bda54af43600ba22f794b33256af8858f49a330244c28a51dec073960bee5615d5bb169e6233e8bc74cb185273a5cbbf1ef30c3d87505c910416a39d13cb890163db9c45e19a7561c852883c5f820390655ed60e8b8e8c0977c8b4d6d3f87ebccc077e0f5c46010be1d6b4f78d38171f9950fd634817b18b1fa9cbe3710de385c868dfc10f3bc254d621b4ce4ef1964e206a2e2ef057e9742e46edf307805ae968228defc9201a8d41f8d870454957d0d57aae2256f23b5abf7a36aa18f7936302851b84be3f1c016b412ce163a0db43e1b81cfbe42002b67999e9fdcc0108147c24395bb82a3d8ef7c72d40cbf2251530ebee60caec021800880d14a2c1887531a1fe6d843674965cda0d694e84b4b30bebc9a5e44b0d8e9e36e16ea06b875d3ab6e505e5b20d87045ffded4fca29bea24f254f8e5d925ae54b65e2bf58217d51ceed14034cf890a74285ae0b814342afd30c8e6b5153e65e1a0e13bdbb18baedecb50227ea17bc7f5a439a800ea6a7707fdb0a7e5d1bb245347bed8c03b81091b2edf5186a39eaa706dd053caf598b77cc191a7152bb29d610c5f02f947ea1628b09051fdde4ae40d45d51f36ffb9497fc8daf0e71119d54db8b0061f6169638615a8f0ff249f76b6dc8d198f2d425ac764fa66038ff6a6c0dccb986fa63904b474523c6ff1bdf5da801dddaec8b8ca253639a08d50027c0b45250c0d583ee98972e3b9f5957911a21ace99f6ac07fe0c8591e144f82e60b33e7a7b657a32dc4f3f00af77331027b98c1d9e167a926b5a02bfa7e3367727911452873f3506516397a576753fd8c577a55b883ad68ff7aafe4afb7b33c114e5cf12357ef86f0e7fad7329f25744b8b015c54b346040d4520ff09d4b24bf67ce2f04f88e6147c52971e4d4e6709907d5d96ef8357c2c7039de07555750b4df14aa3f0d0c5b0cd6714120aa4e6b4837c6e4d25723324e40038999483abd76c76f5bb315a622cb7ac15fbd9e50f7cf37409c318388905aff725c492a6b17d69a1275139ef7c889c9e7c375ed2329dd58c10cc0bbb2d4883fa7966457ba0633a264b9b095e35d5e3bf20432cca13524210993497aa28a6596936b9852ddab4071b40dbb5e122cdd3050c5d174d3050ee3738154b4891ab84e5d1efd42b0a39ba9c65969deaf97c155aef0be424abc26f49a662011a99088140f4aa3543696c0e14549ef88a1c129aa1691d68d62c4988fb4bc64fb81ca292dcb190bb8daca412826c700cc03aa33ec42a36e4bbd24940466ad04019a294b6cb77d6ac9ad0b1fedbe3404647a4d52495e0b1f3b24e05b28086e8af72241850a073a28d5bf8dd129d8a720ad08aee12d0c54ab18eab5856c6ca803b3ff1199d3787106a26f0c1c237efe75f2bf0a9a762d52aed0cd09c14708e3c9de938f80058b786b8b19d6c63e65200fba039ceab1f038e7613605ea41e839d8e7959da6dd03ccf41addbb0b71daba9a69db0beeebab3c5c97777c21f74d42264b8b5587a4944a2cd404c9abcfbf3f19c45ac31e6cc2af5b6c346d987629e33718a66762e68be8904b924d383239c0722d69e87a1287f20399e9b0a762fb14e2e534a8c03630a8721a8591254bcd2e38ca76b3a6786dcbc882eceaf2fbb44465174696158dee024a5182344b2619b9354436a17aaf035df3df0886d097931abc3f3b0a45fd48a8069b6ee5f441f81ba409f0915005b77b631a2d0445823f9ef2540e4882343cfcf1f73ca91c549b70a1921447d7c3445c45ec130814f2fcedf6aa6fec7ad45434a7052082e9d6f147f1d53aa066f147ac23baf7610e8d23377832ed51dcee3a8981211faccd599c9b4e7f0a6118683cc06a4511acf34b0e0c3e23f9350b6048f566c7ae4d16346c61e01d14141e6e680a3850fee2226ddc80facb98e303c603270715726810fd2fda791a7505a354ebbeb53280b66f42c5833a14b8cf7e0e7d1f45e04529215c70b772f51211d810fc011d4620947498cd22e2c2e42e0204966a0e78258893b9541e2214ae08ebc47dad45950ea829e68c39cbdfd5beb58af9a7b12a76c86716e182a25d0165b55c8e1e3669600775a9fd5c1725d319bf1b1ec3333de56f2c6c493f6af6fe4235c5d7aa47af1bd0ae8302a0713cbc5fb48f40ae25f3f832f6d226015171f7c136d9df7470cbe67cabf1447b3f1316c0aa6d2b6f81e247c98be63443e580e1cf7ee843e6a26bd6a4183902a04e4e90a43490d94363da512ed0714a83fefe2d94ab39b2f6c534d170951e18354074ad941aaae7d4965126c520878eeb3afe688394f4feea893d1b5da9f83708c20eb71ce2a621dfd893ee8c2849fc60ec1520a6ba2a4adab7bc5d67206e9f9603fd4b99b66d5b28d62110cb6334d8e7e73d85039bc5b4f2d742e6befebd9c8b36c97c11ee77ad0ef8d8e346db62a6ff6735c84fd03c7cfd409bdb1e2b632ac368d606c19be5040139bbfa855243d736268dd87a922ce7e7452027d86ae1b1af56b18d14cf23c822fccae467f7c73c37e4a8dd370fb7ec348e2e79c8ca89ece2408d7b3dbe7e81e50fdfb1dbbda30ce88430a466c562e88e8aafe68d4bca842797f3c96403bbe435ddde14f3f8b4a9a3336296686779ec1f3076e36520cc5f412e6deba768006e59fce6b6ba468666090b7a14138561560a8f8db3355244be061e284f4572ce7e7f0ca8eae8b646938587cc6fcf841f678c24ea40e1d837563b84e64b2c07031fb0a1650a749b8dcf7fb317126a081f789379d403323840b4d2b3802089c99fecbb084aaaf6bb2e9815a6accf1f66da366241798f5288a1e5e1142004465d4e5cc2de85c5fc7a9b1a9db97be8dfd298e621475a506e1e2066b9f80bbbda7e2997f55f6ba8bb91beffd4c405b979d84dd10db70a730d4d83010717b96692c1095e9e5f04f7e1dfab0c8e4042f230994c9db84f6fe62684bb00230e58496482e4251ccb6f1e13fa950aef1e9635fe29db662ce4f8afc376fb551bdfefc24af7a728111228a9da3847cdb1b3262f21804875df25e26262ac8b02a61c223bbf81b1d0d8edd7573e1b8787a48700f7ce2db5b420eae34d0322b9e7e1d41870a45f5e63cb677619105322ba5439b17af665b9f9e4e572d59f93b3c30ff461ab2c14f0f30ee5a09924bac62cefd01b03b47dc78975f923a754eef2365b245dc8b1c687b90ef52f05b79c8501d2f634c7bf71a829137f3cece66b1a321d9a04149e4c2dc1bc435825b4a2f6074df77e0e579f331b6f374629a6782d4a369d4016a8f1865cc9e69a514e70f382693cdf0937cf3e079f3a3a222344096f756546048d159d4ed77349f539695bf127b1e6d3db9169cb6b3cf24889f4ab4461a0acaa0522f2fe62f6c85fa68ab33239c3bc27d102e4dcb7408bf17364252a0e3e2e63ed9f022e84bed6bd2005b97487d6c18901226a3f5b87d464a209a0af1f975064fb8a12ea92feffd646b7cb5c1a436a81d71e4b7d93414adc39dcb264e9c22459e3f7d313f5cb9b2d1c26fabdcf8a0974318e6afb839c98d5ec6879cc4a1820617682fb47961ee40c5e9a8278be27932d4dd12e14def93510ddeff2c185b84161cec29058ca7989b088733b99e634ad6f1dbec5c13a90478b5df457c9bbcd1707d7f68cef23bae13de5d41143f0e26c607d8227e99d4375edd9ef56d59689412666862c00e525ff379dbe5ea628f04d26d626fcbe9631c4b81359cf15e9326cc15104285f2bd6e5aed947f37f086759258353f300b66d69d6ad298bbb4af32a4fe8db60833bbb376cd01e70b46a50305ffc3a3dba7df4a5fc42db06dd82df1f250ce548860bcba6e75e37138fcdb5cd4f8ed7f03ecf8badc34d410ce73c0a05b5787f465d8fbceb251581aa64170ff146da2b6cb238d82dfdd9a728a0d9f2c6c9f6e25f42e85af3d6f073f01d534b0fef8e2b371b32796be72e1781634dd798378cab34f97b5512466300aa47fb373238c688bc753d3d4f29443c374b8e47e0d9830db2d4a6da2a6c452420479ad7d1cb849f8002e84662362cd80b6c674eab1e27043c36dfcc482d895ff028cbcb5000970faf407f2211e5a3b7f17c412d05ec7304e7b802ee56795a0a611d0c6741c461851f989671008c270792291c497e021609afbde651beb746a1acf4f829fc621f26e2ffbd76de5ab0da8de61ab155be759988142ec6e9de669dcd2e8e69b2fbb676b0b3c3fd132fdc097c742f7960d27181d5533597ea544d017446abf931d7b75d5bfd9e1bad5e893aabb8a34673dfe6dd59f1710e964d03921baf769a7bc8eb6021bacabdbe96df90220fb5a4af0b79a116c91a324fb19ffa749ca6b8587055d829c83bc6314c221664930a2090152f9a9bb140d96a6b4f3ef906d697bc1167ee0835713eaf16d5bef06b5fbb38474e7fe61620cc53c0d0ae51c994fb7bf8f055191b3014dd261c7c2076e00d2c1ec328677ab909d39a59df51d7b1ee9c22aa38c621494979b46db2d31cea246f19bbee74435278aee661384a830c89a9fb843ef34d005c3e98a79c76437e395063e94b27c825bdae7c190f80b6d767d72ce471581e46f37efc3836b3b661fb2b0400dfd5db8aa8acec77d08984db899fe32665818cc09e6e987ed9bcbe3ad54819b218e097b9d5887d7dfaef1509d4a66f1a2398d6e5160bd8290a709e8f96c088ad34e62c8571a51dcef320f0c582f33ee36ae0e555c8f59df3abe1b0a6ac6dd1f09c36b98427eb47cdcc7b7ca3fc666b409c4dd48a6dd7441377dfd2f99c60b2f4c730f18f6415a08ac5db44b76faac673869b198f8cb481d852119ea02d3208a4244f9470425b4127c6c31cae1245f3a67f9da5b7083217d6912ae01e92c81f2f5d0c6cfc73b6bfd88ef96ef3bceff3b93bf05d89b4aedbbf6ca5b2d1b7a8d0ffc174d21a4989c8f798c4410ece3ae872988ba6ea37a252340a8cc2e3dd544a31cb2a5b0d9d6cd9079953c01ea2bf8c8920776b4d8b35d3f30afaa6cd598bb6edd62268dd7e56b4392aceb4e83737684095189e0e983039570be009c75e931b09a238c79ccef57176f638fe07419277fe5ee8aa2a98a181274a684f6a255565bfb9bd157d401c429e67f28caad783252e4c9ad4d53186758279851ec216db4c489a8dbfe320bbdbd72f27566d74644c121681fbae4dfbf531acd591e8667a24688950b54bdf3e537b4ceeb857f89e88e0ceed8b5aa28f7d578b5ace3c3f28758d4231dd7f22748256cf980077daa3300e38927dabac8a8b7dc9fa58292c033e73a0521129dc747f89103539ad4cb0982619dca4e7f76fa644180ea54f3bedfe10da1345afbd"}) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000300)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000200)="03ebf759835ebbc85050ea4c33e23b6f09b1406fd6de2e57ade9660e345affdb381089ceb278262daaea779bb9f19ceffce7d37488f098a140a58977ef1ed77a5e0823fd31833aa42315fb51e48fb06f1ab56a24ae853b1a3dca79b2beaf3e810cd947e5440cddf7af124f243f043dd6dfb00256ecc1295c76836d3efd7edbb253262f4abebd6964d44b0e6da15d36a2bc37500b76da536c973410e69227a46c49fac7dc8edadf00889bf6d607c0e96b3ba15d7d743b11acc04a4fccc43eb3489041b28ab039daffe071f65561edfb80a66068e3ad34f1b03dffeb12793a4fcf33118755d4e84d0e64314d53142524b33e6b79e61baa086d", 0xf8, r0}, 0x68) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000180)=@add_del={0x2, &(0x7f0000000080)='veth0_to_bridge\x00'}) [ 1118.820033][T13835] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1118.820040][T13835] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1118.820048][T13835] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1118.820059][T13835] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:50 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x40) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xffffffffffffff01) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) fcntl$getown(0xffffffffffffff9c, 0x9) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x8000, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, r1, 0xffffff7ffffffffc) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000000c0)={r1}) 12:32:50 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:51 executing program 5 (fault-call:4 fault-nth:14): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x105001, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x4e5, 0x2) 12:32:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0], &(0x7f0000000500)=0x1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1119.150510][T14279] FAULT_INJECTION: forcing a failure. [ 1119.150510][T14279] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1119.175439][T14279] CPU: 1 PID: 14279 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1119.183051][T14279] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.193118][T14279] Call Trace: [ 1119.196436][T14279] dump_stack+0x172/0x1f0 [ 1119.200787][T14279] should_fail.cold+0xa/0x15 [ 1119.205406][T14279] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1119.211241][T14279] ? ___might_sleep+0x163/0x280 [ 1119.216136][T14279] should_fail_alloc_page+0x50/0x60 [ 1119.221369][T14279] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1119.226764][T14279] ? kasan_check_read+0x11/0x20 [ 1119.231645][T14279] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1119.237379][T14279] ? lock_downgrade+0x880/0x880 [ 1119.242250][T14279] ? __lock_acquire+0x54f/0x5490 [ 1119.247215][T14279] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1119.253479][T14279] alloc_pages_current+0x107/0x210 [ 1119.259571][T14279] get_zeroed_page+0x14/0x50 [ 1119.264195][T14279] __pud_alloc+0x3b/0x250 [ 1119.268543][T14279] __handle_mm_fault+0x7a5/0x3ec0 [ 1119.273590][T14279] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1119.279161][T14279] ? find_held_lock+0x35/0x130 [ 1119.283951][T14279] ? handle_mm_fault+0x322/0xb30 [ 1119.288911][T14279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.295162][T14279] ? kasan_check_read+0x11/0x20 [ 1119.295180][T14279] handle_mm_fault+0x43f/0xb30 [ 1119.295199][T14279] __get_user_pages+0x7b6/0x1a40 [ 1119.295222][T14279] ? follow_page_mask+0x19a0/0x19a0 [ 1119.295240][T14279] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1119.295265][T14279] get_user_pages_remote+0x21d/0x440 [ 1119.295290][T14279] copy_strings.isra.0+0x3dc/0x890 [ 1119.295313][T14279] ? remove_arg_zero+0x590/0x590 [ 1119.336049][T14279] ? prepare_binprm+0x6aa/0x940 [ 1119.340920][T14279] ? install_exec_creds+0x180/0x180 [ 1119.346134][T14279] copy_strings_kernel+0xa5/0x110 12:32:51 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0xe05c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) getsockopt$inet6_tcp_int(r1, 0x6, 0x4, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 1119.351175][T14279] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1119.356830][T14279] ? copy_strings_kernel+0x110/0x110 [ 1119.362130][T14279] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.368381][T14279] ? getname_flags+0x277/0x5b0 [ 1119.373246][T14279] ? entry_SYSENTER_compat+0x70/0x7f [ 1119.378546][T14279] __ia32_compat_sys_execve+0x94/0xc0 [ 1119.383928][T14279] do_fast_syscall_32+0x281/0xd54 [ 1119.388986][T14279] entry_SYSENTER_compat+0x70/0x7f [ 1119.394092][T14279] RIP: 0023:0xf7faf849 12:32:51 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') keyctl$session_to_parent(0x12) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x6) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1119.398169][T14279] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1119.417783][T14279] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1119.426207][T14279] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1119.434189][T14279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1119.442173][T14279] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000500)=0x2) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:51 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdeb, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000180)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:51 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x800, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f0000000100)={0x0, {0x0, 0x6d00}}) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000140)='sys]\x04?ect_r:ifcoe\x96\xd2A\xb5\xa4{\xb5\xc1?|\x99e', 0x0, 0x1000000) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1119.451635][T14279] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1119.460240][T14279] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1119.517349][T14622] Unknown ioctl 21522 12:32:51 executing program 5 (fault-call:4 fault-nth:15): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:51 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:cron_log_t:s0\x00', 0x20, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1119.588389][T14622] Unknown ioctl 21522 12:32:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYRES32=0x0, @ANYBLOB], &(0x7f0000000500)=0x2) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={r1, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000140)={r0, 0x1, 0x0, 0xfffffffff0000000}) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@nfc={0x27, 0xe5, 0x2}, {&(0x7f00000000c0)=""/18, 0x12}, &(0x7f0000000100), 0x2}, 0x9c) [ 1119.725594][T14783] FAULT_INJECTION: forcing a failure. [ 1119.725594][T14783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1119.742330][T14783] CPU: 1 PID: 14783 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1119.750654][T14783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1119.760990][T14783] Call Trace: [ 1119.764312][T14783] dump_stack+0x172/0x1f0 [ 1119.768671][T14783] should_fail.cold+0xa/0x15 12:32:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0), 0x42000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1119.773295][T14783] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1119.779129][T14783] ? ___might_sleep+0x163/0x280 [ 1119.784009][T14783] should_fail_alloc_page+0x50/0x60 [ 1119.789234][T14783] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1119.794659][T14783] ? kasan_check_read+0x11/0x20 [ 1119.799533][T14783] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1119.805784][T14783] ? lock_downgrade+0x880/0x880 [ 1119.810657][T14783] ? __lock_acquire+0x54f/0x5490 [ 1119.815776][T14783] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 12:32:51 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) sched_setaffinity(r0, 0x2f, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000cc0)) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1119.822036][T14783] alloc_pages_current+0x107/0x210 [ 1119.827462][T14783] get_zeroed_page+0x14/0x50 [ 1119.832101][T14783] __pud_alloc+0x3b/0x250 [ 1119.836444][T14783] __handle_mm_fault+0x7a5/0x3ec0 [ 1119.841918][T14783] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1119.841933][T14783] ? find_held_lock+0x35/0x130 [ 1119.841950][T14783] ? handle_mm_fault+0x322/0xb30 [ 1119.857291][T14783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.863819][T14783] ? kasan_check_read+0x11/0x20 [ 1119.869215][T14783] handle_mm_fault+0x43f/0xb30 [ 1119.874619][T14783] __get_user_pages+0x7b6/0x1a40 [ 1119.879584][T14783] ? follow_page_mask+0x19a0/0x19a0 [ 1119.884808][T14783] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1119.890812][T14783] get_user_pages_remote+0x21d/0x440 [ 1119.896151][T14783] copy_strings.isra.0+0x3dc/0x890 [ 1119.901663][T14783] ? remove_arg_zero+0x590/0x590 [ 1119.906741][T14783] ? prepare_binprm+0x6aa/0x940 [ 1119.911610][T14783] ? install_exec_creds+0x180/0x180 [ 1119.916831][T14783] copy_strings_kernel+0xa5/0x110 [ 1119.923449][T14783] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1119.929716][T14783] ? copy_strings_kernel+0x110/0x110 [ 1119.935152][T14783] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1119.941501][T14783] ? getname_flags+0x277/0x5b0 [ 1119.946293][T14783] ? entry_SYSENTER_compat+0x70/0x7f [ 1119.951781][T14783] __ia32_compat_sys_execve+0x94/0xc0 [ 1119.957571][T14783] do_fast_syscall_32+0x281/0xd54 [ 1119.962707][T14783] entry_SYSENTER_compat+0x70/0x7f [ 1119.968086][T14783] RIP: 0023:0xf7faf849 12:32:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x202, 0x0) [ 1119.972259][T14783] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1119.992325][T14783] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1120.000874][T14783] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1120.008952][T14783] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1120.016935][T14783] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:52 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') socket$netlink(0x10, 0x3, 0xa) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x1) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) readahead(r0, 0x8, 0xcec6) setxattr$security_smack_transmute(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000440)='TRUE', 0x4, 0x1) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r1 = dup2(r0, r0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f0000000200)) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f0000000cc0)=""/4096) unlink(&(0x7f0000000000)='./file0\x00') [ 1120.025099][T14783] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1120.033164][T14783] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:52 executing program 5 (fault-call:4 fault-nth:16): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], &(0x7f0000000500)=0x1) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x400041, 0x0) ioctl$DRM_IOCTL_AGP_ACQUIRE(r0, 0x6430) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') setxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "78cdeebeaa432685bcf2b3bd0973a42c"}, 0x11, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f0000000200)={{0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x2, 'lblc\x00', 0x2, 0x3c, 0x70}, {@multicast1, 0x4e20, 0x1, 0x2, 0x7, 0x4}}, 0x44) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1120.174396][T15062] FAULT_INJECTION: forcing a failure. [ 1120.174396][T15062] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1120.273770][T15062] CPU: 0 PID: 15062 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1120.281473][T15062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.291838][T15062] Call Trace: [ 1120.295189][T15062] dump_stack+0x172/0x1f0 [ 1120.299567][T15062] should_fail.cold+0xa/0x15 [ 1120.304187][T15062] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1120.310046][T15062] ? ___might_sleep+0x163/0x280 [ 1120.315100][T15062] should_fail_alloc_page+0x50/0x60 12:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = request_key(&(0x7f0000000040)='user\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='tmpfs\x00', 0xfffffffffffffff8) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r0, 0x10000, 0x1f}, &(0x7f0000000200)={'enc=', 'raw', ' hash=', {'xcbc-aes-ce\x00'}}, &(0x7f0000000280)="624338740711651212e48adaedc296913eb3ee56d659048864bf60c0136785a934c1d381b4b2a0cc9140ca31aad623ad563d6612d7815f967777043065744d8d0c94bfedae0853efce44ec615416c952ba55f8abac9cbf98e3dfc1e3095ddc8ec40db16589fa421876d77208c91365138fb637fa4da4c761e3f3542cf4f7c22b067d6eb0b86738270982854521dfec1d41ca1e63445eb4f5572f547e73674d0d9d90a70159d324f09f927e2ada", &(0x7f0000000340)=""/103) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1120.320323][T15062] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1120.325725][T15062] ? __pud_alloc+0x1d3/0x250 [ 1120.330457][T15062] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1120.336197][T15062] ? __pud_alloc+0x1d3/0x250 [ 1120.340810][T15062] ? lock_downgrade+0x880/0x880 [ 1120.345862][T15062] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1120.352297][T15062] alloc_pages_current+0x107/0x210 [ 1120.352318][T15062] __pmd_alloc+0x41/0x460 [ 1120.352332][T15062] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 12:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/if_inet6\x00') getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x4, 0x30, 0x81, 0x4}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000280)={r1, @in={{0x2, 0x4e24, @multicast1}}, [0x2, 0x7, 0xfff, 0x8, 0x6b7df687, 0x6, 0x6, 0x5, 0xfffffffffffffffd, 0x100000001, 0x6, 0x1, 0x5, 0x7108, 0x3]}, &(0x7f0000000380)=0x100) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1120.352350][T15062] __handle_mm_fault+0x192a/0x3ec0 [ 1120.369328][T15062] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1120.369346][T15062] ? find_held_lock+0x35/0x130 [ 1120.369360][T15062] ? handle_mm_fault+0x322/0xb30 [ 1120.369383][T15062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.396891][T15062] ? kasan_check_read+0x11/0x20 [ 1120.401766][T15062] handle_mm_fault+0x43f/0xb30 [ 1120.406569][T15062] __get_user_pages+0x7b6/0x1a40 [ 1120.411543][T15062] ? follow_page_mask+0x19a0/0x19a0 [ 1120.416858][T15062] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1120.422617][T15062] get_user_pages_remote+0x21d/0x440 [ 1120.427924][T15062] copy_strings.isra.0+0x3dc/0x890 [ 1120.433253][T15062] ? remove_arg_zero+0x590/0x590 [ 1120.438195][T15062] ? prepare_binprm+0x6aa/0x940 [ 1120.443581][T15062] ? install_exec_creds+0x180/0x180 [ 1120.448794][T15062] copy_strings_kernel+0xa5/0x110 [ 1120.453816][T15062] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1120.459553][T15062] ? copy_strings_kernel+0x110/0x110 [ 1120.464856][T15062] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1120.471108][T15062] ? getname_flags+0x277/0x5b0 [ 1120.475866][T15062] ? entry_SYSENTER_compat+0x70/0x7f [ 1120.481187][T15062] __ia32_compat_sys_execve+0x94/0xc0 [ 1120.486551][T15062] do_fast_syscall_32+0x281/0xd54 [ 1120.491573][T15062] entry_SYSENTER_compat+0x70/0x7f [ 1120.496676][T15062] RIP: 0023:0xf7faf849 [ 1120.502069][T15062] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1003, 0x1fe) mknodat(r0, &(0x7f00000000c0)='./file0\x00', 0x800, 0x1) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000140)={0x0, 0x80000, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000200)={r1}) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') prctl$PR_SET_PDEATHSIG(0x1, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1120.521689][T15062] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1120.530268][T15062] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1120.539450][T15062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1120.547440][T15062] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1120.555508][T15062] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1120.563468][T15062] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x4000, 0x0) bind$netlink(r0, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfd, 0x81000000}, 0xc) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x2, 0x4) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000440)={0x40000010}) unlink(&(0x7f0000000000)='./file0\x00') lsetxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0xc7, 0x1, 0x80, "a0d216dd3fdd131d6389de7e564605af", "15cb34fcac8af36758437b5428ec9e3abae20460e9bc7d91e718c67b625bf10d5033726e511e77a86d2051a69421b94ad628db1f78f706c7d02e499da41d80cb0a9a186abe34eb1521d9a0786826825ffa277184ba9aef18ff537da5e3a7cd4e8f71a95c3cf4ad5c302a505f8140621090d7936f8acb5f22f09c00dc9e49050a31b23e0be0ecf1f062224add783fdb87c580918298d09488505dc5ff7fe4af79d5771d33c1e9091398e243e18342af9f56fc"}, 0xc7, 0x2) 12:32:52 executing program 5 (fault-call:4 fault-nth:17): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x40600, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)={0x6, 0x0, [{0x0, 0x44, &(0x7f00000000c0)=""/68}, {0x4000, 0x9e, &(0x7f0000000200)=""/158}, {0x1, 0x8, &(0x7f0000000140)=""/8}, {0xd000, 0x57, &(0x7f00000002c0)=""/87}, {0x5000, 0xf1, &(0x7f0000000340)=""/241}, {0xf000, 0xc0, &(0x7f0000000580)=""/192}]}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000100)=0x3, 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40046602, &(0x7f0000000600)=0x400) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000040)={0x0, 0x80000}) fchmod(r0, 0x20) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f00000034c0)={{0x80000001, 0x5}, {0x9, 0x9}, 0xfe, 0x2, 0x81}) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000680)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000052c0)=0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000003540)={{0x5, 0x371f}, {0x2, 0x7}, 0x4, 0x2, 0x1}) process_vm_writev(r1, &(0x7f0000005780)=[{&(0x7f0000005300)=""/75, 0x4b}, {&(0x7f0000005380)=""/127, 0x7f}, {&(0x7f0000005400)=""/67, 0x43}, {&(0x7f0000005480)=""/167, 0xa7}, {&(0x7f0000005540)=""/216, 0xd8}, {&(0x7f0000005640)=""/35, 0x23}, {&(0x7f0000005680)=""/4, 0x4}, {&(0x7f00000056c0)=""/142, 0x8e}], 0x8, &(0x7f00000058c0)=[{&(0x7f00000057c0)=""/235, 0xeb}], 0x1, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') ioctl$EVIOCSFF(r0, 0x402c4580, &(0x7f0000000140)={0x51, 0x3, 0x101, {0x8, 0x2}, {0x2c4c2eab, 0xff7}, @rumble={0x7ff, 0x1}}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000200)={0x3, 0x0, [{0x8ed}, {0x83a, 0x0, 0xd62f}, {0xbfd, 0x0, 0x1ff}]}) sendmmsg(r0, &(0x7f0000005200)=[{{&(0x7f0000000300)=@nfc={0x27, 0x0, 0x2, 0x3}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000280)="e283b21a7c3f7c60ec429438396877f82e42e7a8fc7cea139e", 0x19}, {&(0x7f0000000380)="615866269230f4877e6ebab81860ff768e213740b08906dadfa23b8728addcff94b789fe325f8550f5369b02ecc575fdb3d6d80f978c31c657124ac426ecbe", 0x3f}], 0x2, &(0x7f0000000ec0)=ANY=[@ANYBLOB="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"], 0x1446}, 0x3f}, {{&(0x7f0000000400)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @local}, 0x4, 0x4, 0x2, 0x1}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000002340)="92cd014af9e5f5e4997bb8b352c92ca44a6086eeb588f0a4aee64f990ca4aeff8f978067acd1eba4a40ddc06dc788c2d299ab985e2eed839e7895a31318dd78fc7d7f70de1062ce418d9eddea695787209ff4058e0def109bb2f61e5bbe012a0afced580b0ec3d99c9789b27667c2de1d1708cbf429e08e7a7a88a50d2e922b7c2b30563d5a8b9fccc68baf1194e235c0273138567c9b26b0251e2ce66d998c08f1f8c6fb743c4f58aa28aa3d95f4aaa7b94e33a9d032f139c609f5e91118b095ab7c02723271ddced4488307d6d953eca3fa46a99980037a02af9ca86c9fc290c29c1cf836ab60b6a539fadb94a6c37916ddc3576f10076211fe7fd742ecc0448d12662a3836efb7cfe5e5dfdc952c3a70ee1605a9b4d21fb8a682cc0ffb33f3ae0a730628a2217c0f2730e89783d0e97ada1c8bf5a97eedec025cfb1dd9ac3ba0eec8f9f95b1c5e082ee3135412b8f2f21509000801d9a96a50f74a596d64bc6a91ae0f20563b0086050773b8942a26687c9284ca3c3cb9befc7b36e1eb9e6a15a74960a59582c914b930c791956db4c9dae7682a892cfdf5ed3f68de787b689ca1ddc395f6817e50b4403168835f18481d834174c2028b5cdeef75bf4508406338296c668cafa903b5deb01ebe7506b9df057d33bc10912c4ab5868cea2aff419cfbb39d24184316e8a616c02e4f7432ebe1ec575e457769b327d810667fc69cffc7c2054beecba6aecbdaae843a04c6a0da48a7104627045253940724bd6db22076979d5273704bbe3a1119b9848d7157928345b438ec7e0d3c7bcdb1b33befbf22dbf529084e3f002f981a8077abe07a46daf97aa362a59f35697d12bbe5d306c4a76f564b6154e59623dd13a21ab4c98d069e3a9129658fa5d1cea89d139e6ee76fa374768d877f6a42cfb4ce2815be05785e29340b6eb7dc59a51a91eb243ab907dae8caaa8cd3c798c055990b6c922febb2a68244646f100e32829e4c05902892154e5e9a151f5547388d522f492f2c435cf4f71a21b8b2fd523a3aa037100c6008d388e71ccb6c4a68c2aa423089e3684eb3e44d6143cf03b05c37317cf9d76628a6b6efa013f0cdcccb1e2914d09997f4f685a4c59c87dce36f29e570d9231cba84ef2a6f976a3a6d5b016167f8da0027a0cc762fd85696a0dc5a57299e5fc92ea67aee1678d8c112913ada19a31691ebfc8b1a3caed77284ead504be56948f11d92273488b6f120ea94d3cc3e90c7e5c41660417e7b1961f1117402537cfa5a8cfa69040a6683d559f8217edaaeadd092252529fe46a881c7be07f06dea7fed37a874c3a41cb306c6e0d83f03d4ab109b48224fb841e20f6251203ad0aa15031eda718497be2c8a26ca8f6b89824f2ce51f81d9690563722c6f777c6929fd1e8dfce0bd362804492bffef47b2e8836e925c18ec44c343ac2d43b46f41e5d795ed02234f1b17537971f747f5f004b4c382b2203be8f89a002c50b81613e3d0014a49f995aa45ca68b5865e3c4764666d8db261b75251df714985a52fe53ac67343fe3d36ec5ff26c4e0508d331b7aa727742de4914e40e9379267c7c9e1751bddcab831c8f8898606ceefaba5989f4baf680036d5ac1f6636cc06ff5d4a80a9c0dfb1b1c24208db5fa39e88a7c7cb1569e1ac24ad7d1235ff18db71c71086d00601609152bf7c85189417d0e95da9a16976ed2cdb6fbb48532843e08ac4d4aa075525e71a91b7eb34984fc6cd3a013f8ad3171c97ef4da1713f704765a007d86734df8f8d00e315fbe0ff0d35dc1afdfb1cdb3cb3bfcc256f24ab133f2436531fa3c04e529be4f4806bef97e923fa002fe11496a401bfb7ba256b7a0f7792609a86c5471313c6c23d64f454a09d818a051bbec1421da1bee0b608acf3d0e64f3a51b232d6d17f76b9ceda8aece1bbfb1b187d55172dc9bf82fc11dd771a71934dde63cdf8920c0da445cb7c9853797a02637f8dde50c56ce520a46074d8a549c09e826fce3fd68cc1482d7ef8275aa84a8d55d19a28e8a9b7a9fab826f780f9cbd4cfb29d763e34c739e2f524eda262dc912bad403a22016ffd98d6277deccb7a9bfa25b83a81c9e1905517c9973330fb7d693ddecc37c70c5be8650e9cefb9ff317357c3002ca34103476df2408d00fac9976f63f7990f91dc6ff5ebddcaee688259057e8ef028837ca89b4079e5400791d8cbd260bcdb19926f9ca28a742bfdd6f95e0286da5214631c1412347a50b292945bd7794af99924eccaf7406f6a69d3178233c262346edfba73cb7c07cf64fbd0868f0b1c325ae505de993a6b0acb4d5d7f069c6550cef76b60ddc266a9ce7fe2125d82421ed2bfc72cbad5639e1ea1fcda223af750c55b1468e6cb3f7e24e6aa0794dc26fb152bab2bc2a49e8ee83e60b4a7995fbd8a08273dd391aeb86df9b96100ee6f65c72ef1acd6a9f9803d84c2f495c9b028c05f994e7eb6c98c237ac2cfd1d7a0b885f89fb2525a310410bd3f3b8fd797877a9ae4802cc9a2499bab5610c4e5362bbc1c751e8e792083126b5aea1ee07ca193a9ad4953858f346545bf347539c74350c75d23602523fca53d78f35d8a5bf17369693cc6a3ca0f0f04f3913d50384b9194ba71c41a0cd1958212216cba8f36ea88321297023e6a87350fdb420ff7c16919f2e9a7f1df1773354a231263ff9cae3a8ceef2834a8afbefd3f170c6541f762a717ae86022f13083b7052624447f83d70477ca3c6f68a9cd733ee7d3e9e816cdf81849cd1a69dfd72980d90452e0b9ffa6880d8eafb9a7659387e26148d2a9abd5ae484534ec86c1c7b1f30cfc13bb82ab9a0050140be3ad1291456b36a55964b01e1714009a2ab5ea90ffb8547200b36797e9acf28b91669ed95478714f3165530b87bdb37e2e6b6df387031a0d55af11a9fc20ebfd144e089b2440e1ec9f2c8fd4c73050f9c05f7b677ef6f3a8d3b5df26baa3562f7a0e6b47bf8551584d5bde77c9b65dc930725cb69169f3794ee902acc2412b079b2cf17618f5ba11134a7e1df051e0a6ece04a8e6a32387b3e01b533639d31e6b94c011c93cf4f193f1dd72f7966bf3851e53de6784b286882924e83bf52b0d583c4ef9e7e711ddda46091fbc829a6c94bc15fb7014a1858b7c141c384418c8f65a05db89be546add5cfce4fc268997af6f4d49a2447c217da151ca360aeeef35c78e41534452bdec382bf667f63fe32bdd08734cc3ccc0bf06ddd96e956923580c4bd7f7d26a3799dabdf3a3c783bdac9f22b3672a4260b5758a3269d26662167e7dc6ed1f678d13c574bf843f5b12981e732ae54d479a23c386afe9b80cc8474931f4d3f1fbf89a173683170fba766dca939fb1f571ccbf321ec0b317c0ff9649683219bc785bf95c3f78125f2d43d62f617106695a75dcac093c1a37f9645ec9c14cfb8217589429b3515589789e714223f6ea6efb0b282a84aadd34375be3d45767b36a096ba0d3d04129dcc345667a5f64c590db7f865e68338fdf6842e0e4bac91b6f91b7162aabaf9c56368ffc4bfd3602c9b81e4d852bec0d30ce3855adae65550786748324b90051383a02f77137e1a3988b4afa5d80a7992dedc9800211f7f08b614d2d9f8862753f3c0620caa459683c0076d794423ecb8dc21d3405d8a1d97bb86cfa73d06eb7bd212fce33f99df7bde1a2463d7e15c5867f194c6948878199b79c316fc4682129c1ae73a6f240f059391b03d090b41ee638748dd6b829e6390a64e31562d63c8f4ea2e64c28a1a34a5d4eb5ea76df3b201eff88b7b813b614872367a5a955b0204795695680383c6bbda493f21b1efc8beb6f3e58f79fee3f8480e0e51100454310ca6309a0c07e53a29d5930fd9c653b8c3cf73591c0f42132edb42e404739aee9d710e58da06c3ef64597317ee1e87074a124bc5dc673f6ba4c0f2bf8238379245457a98b16ea078d0f9da80df5f67d46923f466a1fc9b5766691047c3c2a339a818695fe810b9210edc941bbc0a68e07326026a62d18bca6ddd3d4783f645525728d814f7ae6569d360e4c3e0779a6ad56f75d744de14a7acddb7234e60b0469abf755dd954b4e5977a30f4832fd8a4c19babf7eea135b91d2f5c1c4337ca1a4e413b0891f532899c0da6d48cca9a2f16520631316c00ad870132aa9fb1f9632b71efce29e60fdafabe6ee54920ebce88ede9a4b542a386358bcca75322eb702583ad2f7a995600b44b2fea5c5170542a714cb3cb97df6af9bf999a80ffc937f636c59a7982a4e960f99bd6b5a7f321248a1d132892383978b6e4b82d46b600ee5e348b247356f02e37693d5d557bad40829ae113f81f3732ee26de937d1b9c2ac0c9eab2fb0a535fcc4f9370c1b93767b66405f19f09d49261875f05817dc1e047e5e5ca9f6d1daf463ffc08570338d7a203be7a4816dca215ac84c8f3fb4a8a4c72f3e18e56d94742b5b19cd14f9cee9ad084cce20ad9b86172b71be7239916de45f19e62613d2696638ff8fc13fbfd8eaec52639b0c959433aadc008acad2c0981a000ad3a1ad1fae92406f819faf7f20668463371899e11aab5775bcd06a5c35d1db3bad635367284c7e9419662b8f2ff3fbdee29fc4ee5915d5e15566a828f43c6ce004da4465867079e3301b93081a256c5dacb172feb442131b7ac6c77b9e210a6ff4e0282a7d896a7e5f56d04d3edbe8a186baefe2c888941a1868853812ca6f8f932390cd5ee00a4f735df6bae29e5fa051e292e92a054170ba056a8661f3e0cc58e7e2e1579656d9c88b7e43c0db24d0a0b11eea1f5b2244fe9488e424ac52d1ac0f7c67c968bd430d8546e7eb324e08cd5cd32679a8984301af7a547fac895860309a65c7d2ec184d7a6cf1938b8d32a2cdf1a53ddf7764e5e7b14c5a396638b93942a4e071b255a63721c91e0d67e1554e6f8991e2784c73eb4aa6d4fefcd0b191903df063dd540009ea251cb3bbee963f364928ec80fb35be4b3f40b8134f077c5f9f5ca2e27f8447ccc88b07532debdd4b5890306c997963d2b104fcc3cd5a5c5d59ec08d521d76355a616e97534a75839e5f4f3bc983561af0a1f36847d0192fea2e16e4eac205b1099034e83ed8643bf8a6707f006e2f3c162138a3789eee7f12ba7955fc0a2cd4d0c58937c0350ef72502cda6bc139d671618b72225a40a294957df5317afed39cb29335ebd4c41f3d5fd5b39f8efccf3253859662fead03589820b0b4b4d7772ae095dec579f5a957b3dab82b03f56b7eea50f03484037cc255a4fe64e7977261d18742dee8a6845a9d6c2d01f1094edce8f85c264d4feac39ae4abb08c4542d4f8ae21cc1c7d4d17a7696221508e9176ce853599e20268a89d82277c423af497362b921bae5c9d10934a38a26c4a570865e28c1227cf99fcf9ead09fee3829e2f3188960fbe5f43d7704447e91f142bf8a77f2252398fbbf61317387d6ff61f1defe1b14671dc68158b8b750a313c88304d6702f88c8cba845fbe0ea212175fbdb877fe7e33a61e5a56ebab1da866a49ec2e620371e4791af0da9658cb180a23af3d7313a9142f855d1d120f49e3840bae7c03c47ff855ec9c40e00212ecf28914f2e436b3e13fec839d61216fb941fe8cd475ab1d61d88aae4a3191f38f73ae3ec674c1d4352266e2b0c742637c2057857dda138af722ec230529700e775036c71b4765f4a922103c437defb23cbf9653a438792c4d18b3df7a567a6ecafb830a5a12683bb0f40ee67cfa8b6129eb40f26f91cad5e79e42f105fc8e49a36b2126734a6e67753f228edb621c12", 0x1000}, {&(0x7f0000000500)="b7f11459128c75322ddae2b07e9bdb68db3d33e1bb63ce44e74eb26ebd944ba03197116b1ce37d65defa9a37d5ebdf910f0b2a9e1a6513233875677a6484f42700d84b4c424098bad2ae44db883ddb105fd6a396aac91d5e0ee3972f8e2dc81443e5c2f1153c12d267cc6cbe30a5f31e0ffd00f04bc2b7e054a330e7e506ad559c9e296d259ad26b9319fd21c33c074d56205079fb0dd329b788b5f3cbc900d53ab1e8ce0177cab7e4d7e242413618d2ebba69aed8aa3582c1d6a5b86ddea9a4bb5d7d4612f702bb30ecf831c62a66a0", 0xd0}], 0x2, &(0x7f0000003340)=[{0xe8, 0xff, 0x20, "48e5d3fa8f966cb87349b3e4e1e223d48bbdc8344e79705a413cae1f06ee98987f541a839997bd5138da07398cef6154ad7b7fd9be31d65fa41d9b90fc32270f12aaed11d616e3240b6cc60fcbf4a9b12c81cbc3b3bfc8baf410b0169d06812cf345739c1e516db4620c0d091455b28e67e73f89394732367d0fbf162cd5cdcbfd658752fbc72ea5887f90826b6d2ff01ea6125ffa290fdbbe6a8a1e1c0fd1f829f7f47f2c88b9166bfcdb348e51095b0189dc1c860da8878078da4ecad8a72d86f37bb823c15e7427c3034ee1810cd5edb012aec492e231fc28"}], 0xe8}, 0x1}, {{&(0x7f0000003440)=@generic={0x3, "2e97d1c2a2d9b8a46067be97a094302752e48659910d67ea0828f374a1dd871347615316bf2998e9e38887ab47bb64cc8e1e55fa7a27445e432c103ba348d87193466542d8901565e9ce466f61e88d40e062741d84283e2b21eb011fb752ea7fef128397f10b6bfc22921c05007911c6d832f1e8c09b2d1e95f21ef15d8e"}, 0x80, &(0x7f0000003780), 0x0, &(0x7f00000037c0)=[{0x1c, 0x0, 0x80, "2852711ac7552fcc4deeb8a2798b"}, {0xd0, 0x0, 0x9, "6c07afbbe0a83738d241c2b8d3aec796e05dbe156ee7434468763ba21aff65a053ed8c806b7c127a5d83c9a5a93b0b28f01eb9215aa70c3bf729c6b3d9024b379b3314f8ee38c6651bbccd2dcff61b909cc23eb98aac1cf8829f9ab6efbd46de3d10b0f2860411f420f2520fe52dfb93b58030a110d7f6eff13cb35aaf2ddafb140e01b3e6163a575d06edcb34d45e8813602ce739f2e9c90be1684cd74121924d0f99fcd3e9a6647b3b529d1239371f18910448c490d3f9b8ecbcf81c688a7719468532"}], 0xec}, 0x2}, {{&(0x7f00000038c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x8001}, 0xfffffffffffffe14, &(0x7f0000004c00)=[{&(0x7f0000003940)="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", 0x1000}, {&(0x7f0000004940)="fc753e3d223c24ffa1e1f25fea3f8d98242b8a1c101b492a1d10e335e701cb4eae3c7ac0b9536504", 0x28}, {&(0x7f0000005900)="0e1017d08440a719d3e6cc3600d845f25e9f129e6aee548100cc00bd5a6e87172d6bbcdf2c8165be153a2cfab57fd98d6504666be9cd3418a9fd8e253d7c4ce73662e8133e3c9c27cbfb80526e93a5e83994787d945731ace56c5b2dc9ce2a1c62d5e9efb16779052cb6821f7626bb1831c244af20dcdb53c9bd8912694f0baeb0bfa8742f974a9497b6667b647c9c4d36fb30fbe264ec5d2f3f2c4ebe07552a75718eff0b1933f69ed2d1d4994dbbaf1004c4043bd34a3fa149afd04762d32641b7b1ad0820b184", 0xc8}, {&(0x7f0000004a80)="fc20c87acd3f2d96e973ba11c7f3b4510547a07dc31c5e9e4c4a8e2fdaac5359fe9f9e5889003063f8c6ff25e7d236baab7ad2bef4a2009d981b95d80068c44205ea6a81c93fc50b6a35353d6c71618eef60bcbea0533ed61122023d39f4a64349c7c8a2a5d3404b03081fb5f397cd7f5c651db6e543d5c9eaccf78e72dcf2ccb3a767b5ce72a10f3919bb6876a9bdda30ba1a624a6fd021291e64e2a0f81b78a546916da204e776954a", 0xaa}, {&(0x7f0000004b40)="75d012a81bd3d487e7f452022811dff24423c63a994e9b0c7b6377d206", 0x1d}, {&(0x7f0000004b80)="9cb01275b2ecd1f761617f7a102542c77e7277a5b7aba5d00d6983ad6593825004f5e7a5970e0c95c856e78cf68da1045b04ca77ac69be781eec91df1c07d5aa6798e936", 0x44}], 0x6, &(0x7f0000004c40)=[{0x58, 0x109, 0x5, "217616d78e06e0db84e412c0365488d2aa6653a7222f5a0361195e645b3a5e39f3fecff9c1d0f64d572dcc29634a447167bf2b2a6c2da8b8dff61a62c9f466b4b54cc55afcad022756fe"}, {0x9c, 0x10f, 0x100, "13cde42833aad204b216a9797500ebcc45a0179808724e2b2f57d0defd30c4de8972937ac0d53c5c75f4da09ff0cc0ea816e8c1772e6e26cf9d9d314cda89b0dc1c7a216af528458a2cbc727f4603a8b4d5f3ccf5d2a88f0d34903b7e536d16e6376b60fa241033f1c03800957d40a8bdade13d142d22834d99f4074e1c808a5f7583414de99ae0787155dcc52263d"}, {0x24, 0x1, 0x80, "34c7b7186e38c760c177669b6d61cd144db3bb4e4aed7d"}], 0x118}}, {{&(0x7f0000004d80)=@pppoe={0x18, 0x0, {0x1, @random="90fd46b6d526", 'veth0_to_team\x00'}}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004e00)="33331e089ceda9a3fc840d093a61a31f0287a7fa604d7dae9979ef6e8787a6f8ab5b3ea153b12c2abca9b8bafded431d180ba174a18d3d72eeceb52f6ae14432bb33f20b94e34d1b7d08be5d917c386aa3ec69ddbcad70", 0x57}, {&(0x7f0000004e80)="6e34423a60c77089eaf4a7c9b72d469eeb6555", 0x13}, {&(0x7f0000004ec0)="60ffc193908e55abda88b043a19cb6727cdb59c5d0c1cca3e951d7fe30e4dddaa40f54382b345ecf067abc86f16b6cb4a8737e9d90717719eac0194dbd9a6ba244daad03fc78b4e2ca44ad7fe6d1e284ccef1c8ca2c883fc0e7e192f3031a1d90d31a90f2f1a47c4258e8820b18262c393d2b09967dbafaa371e7342c63a84b2b0ac6df81b2c2e06c1b1b0644f8a233c0f6dfb1c40248096bbcb0e003e51c0", 0x9f}, {&(0x7f0000004f80)="1babfe2a8eaeff014e85b5a41f1c3def198716672328153262258c879c9944bb80c5f438c125bc07ca2ed0d47c4afef390858661c491fac0781c831204738cbf940c6af83e8879b6fcbc2d8a3e0960f04397aae511bb4d4b7a2d606ca68e702968e00f0a92ac93fb53372baf9374a28856c0a128d0d1080b53f32e4958b9018fa83ded046c9ea79c6881", 0x8a}, {&(0x7f0000005040)="c9a6e9af6cd034a6adfb36d28c65ef9c309232e512175046b47660b5f456bca72c8cc549391b6f5e964fc41e8193b37a7d918eb7bea2521b0854b14ae1562592db655b91e6df8c45d0b4f8d88cd796b93332f74866a80a1cb2ea5421f44b1e0f8e3e8a8b81ca5efe573b9b51f0d931522be206c530301ebd2e9e43e06bcd9077fefb2d902413d00bf970e419824c6dbc8e54054fdaff7d03918ae246b0d847d6e787c2c588b0337b015e7b9faaac3dd680c26dce2083cd1899b75568bcd0926a38a7abc731f9139b3b0d86c0361dd0a9409007eaa3e42893ab343db901b5066452e9afcbbc", 0xe5}], 0x5, &(0x7f0000005180)=[{0x50, 0x129, 0x3, "fcf74dde9bbea0bd3bbed5727c13ecf49a3c203b1fe9a765faf9fdb11088b610c76b1a403d80c06a6a15c7c5b60db97d268ddbcf7d8c5261c60b8b1d5b072b4d58dac8"}], 0x50}, 0xef}], 0x5, 0x10000000000000) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:52 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) sysfs$1(0x1, &(0x7f0000000040)='ramfs\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1120.894306][T15440] FAULT_INJECTION: forcing a failure. [ 1120.894306][T15440] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1120.967146][T15440] CPU: 1 PID: 15440 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1120.974941][T15440] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1120.985047][T15440] Call Trace: [ 1120.988370][T15440] dump_stack+0x172/0x1f0 [ 1120.992739][T15440] should_fail.cold+0xa/0x15 [ 1120.997348][T15440] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1121.003473][T15440] ? ___might_sleep+0x163/0x280 [ 1121.008717][T15440] should_fail_alloc_page+0x50/0x60 [ 1121.013957][T15440] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1121.019352][T15440] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1121.025186][T15440] ? kasan_check_write+0x14/0x20 [ 1121.030146][T15440] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1121.036406][T15440] alloc_pages_current+0x107/0x210 [ 1121.041651][T15440] pte_alloc_one+0x1b/0x1a0 [ 1121.046260][T15440] __pte_alloc+0x20/0x310 [ 1121.050595][T15440] __handle_mm_fault+0x3391/0x3ec0 [ 1121.055810][T15440] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1121.061468][T15440] ? find_held_lock+0x35/0x130 12:32:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x4e23, 0x3c655eb1, @mcast2, 0x3}, 0x1c) umount2(&(0x7f0000000040)='./file0\x00', 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x9, 0x1) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000100)) 12:32:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x800, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x20000, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x1ff, 0x9, 0x2, 0x1ff}}) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x7eb6, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000180)={0x9, 0x4, 0xfd, 0x7, '\x00', 0x5}) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x400, 0x0) io_uring_register$IORING_UNREGISTER_BUFFERS(r1, 0x1, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1121.066252][T15440] ? handle_mm_fault+0x322/0xb30 [ 1121.071249][T15440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.084474][T15440] ? kasan_check_read+0x11/0x20 [ 1121.089350][T15440] handle_mm_fault+0x43f/0xb30 [ 1121.094938][T15440] __get_user_pages+0x7b6/0x1a40 [ 1121.100036][T15440] ? follow_page_mask+0x19a0/0x19a0 [ 1121.105520][T15440] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1121.111526][T15440] get_user_pages_remote+0x21d/0x440 [ 1121.116943][T15440] copy_strings.isra.0+0x3dc/0x890 [ 1121.122261][T15440] ? remove_arg_zero+0x590/0x590 [ 1121.127211][T15440] ? prepare_binprm+0x6aa/0x940 [ 1121.132361][T15440] ? install_exec_creds+0x180/0x180 [ 1121.137921][T15440] copy_strings_kernel+0xa5/0x110 [ 1121.142953][T15440] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1121.148578][T15440] ? copy_strings_kernel+0x110/0x110 [ 1121.153852][T15440] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.160078][T15440] ? getname_flags+0x277/0x5b0 [ 1121.165217][T15440] ? entry_SYSENTER_compat+0x70/0x7f [ 1121.170500][T15440] __ia32_compat_sys_execve+0x94/0xc0 [ 1121.177003][T15440] do_fast_syscall_32+0x281/0xd54 [ 1121.182021][T15440] entry_SYSENTER_compat+0x70/0x7f [ 1121.187641][T15440] RIP: 0023:0xf7faf849 [ 1121.191738][T15440] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:53 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000000c0)='bfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lremovexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.upper\x00') chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1121.211370][T15440] RSP: 002b:00000000f5d8a0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1121.219783][T15440] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1121.227747][T15440] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1121.235747][T15440] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1121.243711][T15440] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1121.251771][T15440] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:53 executing program 5 (fault-call:4 fault-nth:18): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1121.451586][T15699] FAULT_INJECTION: forcing a failure. [ 1121.451586][T15699] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1121.476212][T15699] CPU: 1 PID: 15699 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1121.484447][T15699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1121.495141][T15699] Call Trace: [ 1121.498458][T15699] dump_stack+0x172/0x1f0 [ 1121.502815][T15699] should_fail.cold+0xa/0x15 [ 1121.507434][T15699] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1121.513344][T15699] ? ___might_sleep+0x163/0x280 [ 1121.518234][T15699] should_fail_alloc_page+0x50/0x60 [ 1121.523471][T15699] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1121.528954][T15699] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1121.534798][T15699] ? kasan_check_write+0x14/0x20 [ 1121.539944][T15699] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1121.546215][T15699] alloc_pages_current+0x107/0x210 12:32:53 executing program 1: r0 = socket$pppoe(0x18, 0x1, 0x0) ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x100, 0x0) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000680)="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", 0x1000}], 0x1, &(0x7f0000000280)=[@rights={0x18, 0x1, 0x1, [r1, r1, r1]}], 0x18}, 0x20000010) syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000300)={0x1ff, 0x2, 0xf004, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 12:32:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000000c0)='tmpfs\x00`~Y.\xa0r\xf8\xbb\xab\xd1;I\x85\xe1\xdf\xa0(\'\xfe\x9b\xcaW\x8e\xda\x9bj\x96\x97\xc1\xcd\x83\x15\v}\xb6\x95G@I\xca\xe4\xca\x06\x18\xb2D\x02Y\xa4\xbd0\x10~\x1b\x87\x80\xb3\x9d\xcb\xbbD\x92\xc1\xa6', 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000001c0)={'filter\x00'}, &(0x7f0000000240)=0x54) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r2, 0x800, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x8010) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000001a80)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000001ac0)={@dev={0xfe, 0x80, [], 0x26}, r3}, 0x14) [ 1121.551616][T15699] pte_alloc_one+0x1b/0x1a0 [ 1121.556251][T15699] __pte_alloc+0x20/0x310 [ 1121.560693][T15699] __handle_mm_fault+0x3391/0x3ec0 [ 1121.565825][T15699] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1121.571471][T15699] ? find_held_lock+0x35/0x130 [ 1121.571490][T15699] ? handle_mm_fault+0x322/0xb30 [ 1121.581674][T15699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.581692][T15699] ? kasan_check_read+0x11/0x20 [ 1121.581711][T15699] handle_mm_fault+0x43f/0xb30 12:32:53 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000002180)=[{{&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000200)=""/142, 0x8e}], 0x1, &(0x7f00000002c0)=""/113, 0x71}, 0x9}, {{&(0x7f0000000340)=@xdp, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)=""/105, 0x69}, {&(0x7f0000000440)=""/23, 0x17}], 0x2, &(0x7f00000004c0)=""/103, 0x67}, 0x1}, {{&(0x7f0000000540)=@rc, 0x80, &(0x7f0000000600)=[{&(0x7f00000005c0)=""/41, 0x29}, {&(0x7f0000000680)=""/193, 0xc1}], 0x2, &(0x7f00000007c0)=""/89, 0x59}, 0x3}, {{&(0x7f0000000840)=@caif=@dgm, 0x80, &(0x7f0000000a80)=[{&(0x7f00000008c0)=""/94, 0x5e}, {&(0x7f0000000940)=""/154, 0x9a}, {&(0x7f0000000a00)=""/102, 0x66}], 0x3}, 0x92a}, {{&(0x7f0000000ac0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000b40)=""/46, 0x2e}, {&(0x7f0000000b80)=""/173, 0xad}, {&(0x7f0000000c40)=""/78, 0x4e}, {&(0x7f0000000cc0)=""/168, 0xa8}, {&(0x7f0000000d80)=""/102, 0x66}], 0x5, &(0x7f0000000e40)=""/160, 0xa0}, 0x101}, {{0x0, 0x0, &(0x7f0000002100)=[{&(0x7f0000000f00)=""/4096, 0x1000}, {&(0x7f0000001f00)=""/212, 0xd4}, {&(0x7f0000002240)=""/182, 0xb6}, {&(0x7f00000020c0)}], 0x4, &(0x7f0000002140)=""/48, 0x30}, 0x2}], 0x6, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) rt_sigreturn() execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000002000)='/dev/adsp#\x00', 0x8000, 0x240000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000002040)={0x0, @in6={{0xa, 0x4e23, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xffff}}, 0x6, 0x4, 0x102, 0x0, 0x7f}, &(0x7f0000002300)=0x98) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000002400)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000002340)={r1, @in6={{0xa, 0x4e23, 0x2aa, @rand_addr="c1684264174c5eebe599831b98f1e9a7", 0x401}}}, 0x84) [ 1121.581731][T15699] __get_user_pages+0x7b6/0x1a40 [ 1121.581756][T15699] ? follow_page_mask+0x19a0/0x19a0 [ 1121.607782][T15699] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1121.613540][T15699] get_user_pages_remote+0x21d/0x440 [ 1121.618885][T15699] copy_strings.isra.0+0x3dc/0x890 [ 1121.624294][T15699] ? remove_arg_zero+0x590/0x590 [ 1121.629262][T15699] ? prepare_binprm+0x6aa/0x940 [ 1121.634220][T15699] ? install_exec_creds+0x180/0x180 [ 1121.639439][T15699] copy_strings_kernel+0xa5/0x110 [ 1121.644576][T15699] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1121.650234][T15699] ? copy_strings_kernel+0x110/0x110 [ 1121.655542][T15699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1121.662082][T15699] ? getname_flags+0x277/0x5b0 [ 1121.666942][T15699] ? entry_SYSENTER_compat+0x70/0x7f [ 1121.672232][T15699] __ia32_compat_sys_execve+0x94/0xc0 [ 1121.677603][T15699] do_fast_syscall_32+0x281/0xd54 [ 1121.682642][T15699] entry_SYSENTER_compat+0x70/0x7f [ 1121.687742][T15699] RIP: 0023:0xf7faf849 [ 1121.691905][T15699] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1121.711592][T15699] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1121.720006][T15699] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1121.728163][T15699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1121.737877][T15699] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 12:32:53 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0xc100) write$FUSE_BMAP(r1, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x8, {0xde}}, 0x18) add_key(&(0x7f0000000180)='ceph\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="a3417ef215a90db1ea484c44ea9e5daf18ea2cd0df5506dca301acf8a8c39e151c0015388aa33b53246bda59d993f60776f207a1833a4943cca4d54eb05fb73970568d43d5f409c96c6a2be68ce4ddf9fe352e466eaabfa370f4f3c6b59ad10faade43cc7a307f8de143154441247b27c88a58159cbb11afeb5aa4d0a8369a75a01c06d44f363652c5a04cf45d", 0x8d, 0x0) keyctl$get_keyring_id(0x0, r0, 0xe05f) unlink(&(0x7f0000000000)='./file0\x00') [ 1121.745861][T15699] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1121.753831][T15699] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0xffffffffffffffbc, 0x0) r0 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_int(r0, 0x1, 0x27, &(0x7f0000000040), &(0x7f00000000c0)=0x4) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x200}, 0x28, 0x3) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-control\x00', 0x2400, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f00000002c0)=0x8001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000300)="758440b33675d804ffb92088fa5cecb3eeba2d0231021745322238869033b7", &(0x7f0000000340)=""/105}, 0x18) 12:32:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:53 executing program 5 (fault-call:4 fault-nth:19): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240)='/dev/hwrng\x00', 0x401, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000280)={{0x81}, {0x7ff, 0x2}, 0x2, 0x4, 0x4}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000000c0)=0x0) perf_event_open(0x0, r1, 0xf, 0xffffffffffffffff, 0xb) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000680)={0x2, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x4, [{{0x2, 0x4e20, @local}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e20, @multicast1}}, {{0x2, 0x4e22, @empty}}]}, 0x28c) r2 = accept4$alg(0xffffffffffffff9c, 0x0, 0x0, 0x80800) getsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000200)=0x4) chdir(&(0x7f0000000100)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1122.018220][T16003] FAULT_INJECTION: forcing a failure. [ 1122.018220][T16003] name failslab, interval 1, probability 0, space 0, times 0 [ 1122.087936][T16003] CPU: 1 PID: 16003 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1122.097149][T16003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.107577][T16003] Call Trace: [ 1122.110904][T16003] dump_stack+0x172/0x1f0 [ 1122.115269][T16003] should_fail.cold+0xa/0x15 [ 1122.119869][T16003] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1122.125725][T16003] ? ___might_sleep+0x163/0x280 [ 1122.130597][T16003] __should_failslab+0x121/0x190 [ 1122.135586][T16003] should_failslab+0x9/0x14 [ 1122.140469][T16003] kmem_cache_alloc+0x2b2/0x6f0 [ 1122.145328][T16003] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1122.151769][T16003] ptlock_alloc+0x20/0x70 [ 1122.156101][T16003] pte_alloc_one+0x6d/0x1a0 [ 1122.160625][T16003] __pte_alloc+0x20/0x310 [ 1122.164961][T16003] __handle_mm_fault+0x3391/0x3ec0 [ 1122.170083][T16003] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1122.175642][T16003] ? find_held_lock+0x35/0x130 [ 1122.180586][T16003] ? handle_mm_fault+0x322/0xb30 [ 1122.185541][T16003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1122.191798][T16003] ? kasan_check_read+0x11/0x20 [ 1122.196658][T16003] handle_mm_fault+0x43f/0xb30 [ 1122.201438][T16003] __get_user_pages+0x7b6/0x1a40 [ 1122.206551][T16003] ? follow_page_mask+0x19a0/0x19a0 [ 1122.211762][T16003] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1122.217497][T16003] get_user_pages_remote+0x21d/0x440 [ 1122.222802][T16003] copy_strings.isra.0+0x3dc/0x890 [ 1122.227936][T16003] ? remove_arg_zero+0x590/0x590 [ 1122.232889][T16003] ? prepare_binprm+0x6aa/0x940 12:32:54 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x1, 0x2) recvmsg$kcm(r0, &(0x7f0000000340)={&(0x7f0000000100)=@ipx, 0x80, &(0x7f0000000280)=[{&(0x7f0000000200)=""/57, 0x39}], 0x1, &(0x7f00000002c0)=""/80, 0x50}, 0x1) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000500)={0x0, 0x84, "14f63e0e9a728ced1913903491967987f91033923101593da5b11a169a2d735ffe3665348a747fa659a8d076baa9297e1fab218a15da824268e5dad51630af8128eb4d54239da86e02827dd25ff33cc275d6a7155b7f1ce76e48cfdeba8a57cf91a20cc0d9f31227c52c99092c8320e40715e62c468c373b3da64949d8b032329788e5ce"}, &(0x7f0000000440)=0x8c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000680)={r1, 0xa7, "042dac08cf4be501f53de01039c27e7650b44610ed418fe43c88c5d5500a610e83db6bd72c2bd6b47de514acf50864a995ea8db5c72bcbc4a07190cea84ac1d345d3bd14f3d8c31b6018536d230b0fd36d4834d6fbbb3e02a3908e5c701e2571a74042755825c440e693a3acae5e58576d9fbb0de45bb7b533fe96d850b9f0b30df6b932cc941fefa4a7f5ce90a76c8f865b37d5a785cd82fcfc38b9935a42e429b34fbcd94755"}, &(0x7f00000005c0)=0xaf) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x13f, 0x8}}, 0xffffffffffffff9c) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000400)={0x7, 0x8, 0xfa00, {r2}}, 0x10) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000040)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/fscreate\x00', 0x2, 0x0) execve(&(0x7f0000000480)='./file0/file0\x00', 0x0, 0x0) [ 1122.237763][T16003] ? install_exec_creds+0x180/0x180 [ 1122.243160][T16003] copy_strings_kernel+0xa5/0x110 [ 1122.248209][T16003] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1122.253900][T16003] ? copy_strings_kernel+0x110/0x110 [ 1122.262081][T16003] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1122.268365][T16003] ? getname_flags+0x277/0x5b0 [ 1122.273344][T16003] ? entry_SYSENTER_compat+0x70/0x7f [ 1122.278642][T16003] __ia32_compat_sys_execve+0x94/0xc0 12:32:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1122.284034][T16003] do_fast_syscall_32+0x281/0xd54 [ 1122.289175][T16003] entry_SYSENTER_compat+0x70/0x7f [ 1122.294306][T16003] RIP: 0023:0xf7faf849 [ 1122.298405][T16003] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1122.318083][T16003] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1122.318095][T16003] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:32:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x77, 0x440) ioctl$VIDIOC_ENUMSTD(r0, 0xc0405619, &(0x7f0000000140)={0x2, 0x1000, "30669cc8d36af21d5c975b42d7fd856a2e395692665b656b", {0x40, 0x2}, 0x5}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x155) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000000c0)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 5 (fault-call:4 fault-nth:20): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000040)='./file0\x00') request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1122.318101][T16003] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1122.318108][T16003] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1122.318114][T16003] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1122.318120][T16003] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000600)={0x0, 0x8}, 0x8) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1122.497301][T16316] FAULT_INJECTION: forcing a failure. [ 1122.497301][T16316] name failslab, interval 1, probability 0, space 0, times 0 12:32:54 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$KVM_GET_FPU(r1, 0x81a0ae8c, &(0x7f0000000680)) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x80, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') clock_settime(0x6, &(0x7f0000000040)={0x77359400}) [ 1122.617916][T16316] CPU: 1 PID: 16316 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1122.625631][T16316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1122.635706][T16316] Call Trace: [ 1122.639009][T16316] dump_stack+0x172/0x1f0 [ 1122.643372][T16316] should_fail.cold+0xa/0x15 [ 1122.647987][T16316] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1122.653906][T16316] ? ___might_sleep+0x163/0x280 [ 1122.658871][T16316] __should_failslab+0x121/0x190 [ 1122.663839][T16316] should_failslab+0x9/0x14 [ 1122.668543][T16316] kmem_cache_alloc+0x2b2/0x6f0 [ 1122.673412][T16316] ? __might_sleep+0x95/0x190 [ 1122.678135][T16316] __anon_vma_prepare+0x62/0x3c0 [ 1122.683182][T16316] ? __pte_alloc+0x1ba/0x310 [ 1122.687777][T16316] __handle_mm_fault+0x34db/0x3ec0 [ 1122.692994][T16316] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1122.698677][T16316] ? find_held_lock+0x35/0x130 [ 1122.703446][T16316] ? handle_mm_fault+0x322/0xb30 [ 1122.708398][T16316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1122.714649][T16316] ? kasan_check_read+0x11/0x20 [ 1122.719783][T16316] handle_mm_fault+0x43f/0xb30 [ 1122.724574][T16316] __get_user_pages+0x7b6/0x1a40 [ 1122.729552][T16316] ? follow_page_mask+0x19a0/0x19a0 [ 1122.734762][T16316] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1122.740586][T16316] get_user_pages_remote+0x21d/0x440 [ 1122.745900][T16316] copy_strings.isra.0+0x3dc/0x890 [ 1122.751024][T16316] ? remove_arg_zero+0x590/0x590 [ 1122.755976][T16316] ? prepare_binprm+0x6aa/0x940 [ 1122.760861][T16316] ? install_exec_creds+0x180/0x180 [ 1122.766071][T16316] copy_strings_kernel+0xa5/0x110 [ 1122.771192][T16316] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1122.776840][T16316] ? copy_strings_kernel+0x110/0x110 [ 1122.782134][T16316] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1122.788557][T16316] ? getname_flags+0x277/0x5b0 [ 1122.793329][T16316] ? entry_SYSENTER_compat+0x70/0x7f [ 1122.798666][T16316] __ia32_compat_sys_execve+0x94/0xc0 [ 1122.804054][T16316] do_fast_syscall_32+0x281/0xd54 [ 1122.809094][T16316] entry_SYSENTER_compat+0x70/0x7f [ 1122.814204][T16316] RIP: 0023:0xf7faf849 [ 1122.818275][T16316] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1122.837895][T16316] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1122.846332][T16316] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1122.854916][T16316] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:32:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') mkdir(&(0x7f0000000040)='./file0\x00', 0x4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='hostfs\x00', 0x3000000, 0x0) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='system_u:object_r:dri_device_t:s0\x00', 0x22, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x101000, 0x0) recvfrom$unix(r0, &(0x7f0000000200)=""/242, 0xf2, 0x2002, &(0x7f0000000300)=@abs={0x1, 0x0, 0x4e20}, 0x6e) write$P9_RLCREATE(r0, &(0x7f00000000c0)={0x18, 0xf, 0x1, {{0x5, 0x1, 0x8}, 0x5}}, 0x18) [ 1122.862934][T16316] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1122.870919][T16316] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1122.879246][T16316] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:54 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:54 executing program 5 (fault-call:4 fault-nth:21): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x4800, 0x0) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000200)={0x9, "c6d671fbe00bbcd7af8affedc2642b78255cddda73aaae67ee0e0f9571e6c4f4", 0x5, 0x1c50, 0x2, 0xfffffffffffffffe, 0x4, 0x4, 0x7, 0x2f}) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/44, &(0x7f0000000180)=0x2c) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1123.070258][T16540] FAULT_INJECTION: forcing a failure. [ 1123.070258][T16540] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1123.146107][T16540] CPU: 0 PID: 16540 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1123.153724][T16540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1123.163798][T16540] Call Trace: [ 1123.167195][T16540] dump_stack+0x172/0x1f0 [ 1123.171549][T16540] should_fail.cold+0xa/0x15 [ 1123.176168][T16540] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1123.182086][T16540] ? ___might_sleep+0x163/0x280 [ 1123.186981][T16540] should_fail_alloc_page+0x50/0x60 12:32:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x200, 0x1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000500)={0x0, @in={{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x100000000, 0x8, 0x0, 0x1f, 0x9}, &(0x7f0000000440)=0x98) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000480)={r2, 0xb42d, 0xb2, 0x101, 0x6}, &(0x7f00000005c0)=0x14) ioctl$KDDELIO(r1, 0x4b35, 0x8) chdir(&(0x7f0000000400)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000000c0)='system_u:object_r:var_run_t:s0\x00', &(0x7f0000000100)='\x17\x00', &(0x7f0000000140)='keyring\x00', &(0x7f0000000200)='tmpfs\x00', &(0x7f0000000280)='system_u:object_r:var_run_t:s0\x00'], &(0x7f0000000380)=[&(0x7f0000000300)='system_u:object_r:var_run_t:s0\x00', &(0x7f0000000340)='*posix_acl_accessvboxnet0)\x00']) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x121}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000080)={'IDLETIMER\x00'}, &(0x7f0000000180)=0x1e) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000280)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10040000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x44, r1, 0x400, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x2f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x27}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4010}, 0xc4) [ 1123.192303][T16540] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1123.197701][T16540] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1123.203443][T16540] ? lock_downgrade+0x880/0x880 [ 1123.208316][T16540] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1123.214574][T16540] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1123.220834][T16540] alloc_pages_vma+0xdd/0x540 [ 1123.225530][T16540] __handle_mm_fault+0x1dd4/0x3ec0 [ 1123.230872][T16540] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1123.236410][T16540] ? find_held_lock+0x35/0x130 [ 1123.241189][T16540] ? handle_mm_fault+0x322/0xb30 [ 1123.246135][T16540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.252394][T16540] ? kasan_check_read+0x11/0x20 [ 1123.257273][T16540] handle_mm_fault+0x43f/0xb30 [ 1123.262038][T16540] __get_user_pages+0x7b6/0x1a40 [ 1123.266972][T16540] ? follow_page_mask+0x19a0/0x19a0 [ 1123.272164][T16540] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1123.277912][T16540] get_user_pages_remote+0x21d/0x440 [ 1123.283211][T16540] copy_strings.isra.0+0x3dc/0x890 [ 1123.288340][T16540] ? remove_arg_zero+0x590/0x590 [ 1123.293274][T16540] ? prepare_binprm+0x6aa/0x940 [ 1123.298108][T16540] ? install_exec_creds+0x180/0x180 [ 1123.303582][T16540] copy_strings_kernel+0xa5/0x110 [ 1123.308603][T16540] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1123.314227][T16540] ? copy_strings_kernel+0x110/0x110 [ 1123.319621][T16540] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1123.325852][T16540] ? getname_flags+0x277/0x5b0 [ 1123.330609][T16540] ? entry_SYSENTER_compat+0x70/0x7f [ 1123.336079][T16540] __ia32_compat_sys_execve+0x94/0xc0 [ 1123.341706][T16540] do_fast_syscall_32+0x281/0xd54 [ 1123.346825][T16540] entry_SYSENTER_compat+0x70/0x7f [ 1123.351947][T16540] RIP: 0023:0xf7faf849 [ 1123.356012][T16540] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1123.375861][T16540] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1123.384283][T16540] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:32:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000004c0)='ext3]', 0x41, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) perf_event_open(0x0, r0, 0x2, 0xffffffffffffffff, 0x2) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1123.392272][T16540] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1123.400229][T16540] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1123.408190][T16540] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1123.416151][T16540] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:55 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0xc0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x400, 0x68040) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000000c0)=0x5) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x152}, 0x1c) sendto$inet6(r1, 0x0, 0xffffffffffffffca, 0x20010001, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000180)) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:55 executing program 5 (fault-call:4 fault-nth:22): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6530, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x0, 0x40000) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x100, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x7ff00000000000, 0x80000) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000300)="774de873f6157fb1899f8e3f3c50b0ee", 0x10) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm-monitor\x00', 0x60401, 0x0) syz_open_dev$sndpcmc(&(0x7f00000003c0)='/dev/snd/pcmC#D#c\x00', 0xffffffffffff3279, 0x20000) openat$dsp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/dsp\x00', 0x0, 0x0) syz_open_dev$sndpcmp(&(0x7f0000000440)='/dev/snd/pcmC#D#p\x00', 0x95, 0x105000) syz_open_dev$dspn(&(0x7f0000000480)='/dev/dsp#\x00', 0x6, 0x40000) open(&(0x7f00000004c0)='./file0\x00', 0x0, 0x102) rt_sigreturn() openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/qat_adf_ctl\x00', 0x100, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000540)='/dev/mixer\x00', 0x200080, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2400800}, 0xc, &(0x7f0000000180)={&(0x7f00000007c0)={0x108, r2, 0x800, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1ff}]}, 0x108}, 0x1, 0x0, 0x0, 0x50}, 0x4000000) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/qat_adf_ctl\x00', 0xc000, 0x0) ioctl$RTC_VL_READ(r3, 0x80047013, &(0x7f0000000340)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000300)=""/43) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000040)=0xe8) setfsuid(r1) getxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=@random={'osx.', 'tmpfs\x00'}, &(0x7f00000003c0)=""/245, 0xf5) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cpuacct.usage_sys\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:55 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x82, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000040)=0xfffffffffffffff8) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.030911][T16856] FAULT_INJECTION: forcing a failure. [ 1124.030911][T16856] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1124.051157][T16856] CPU: 0 PID: 16856 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1124.058789][T16856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.068948][T16856] Call Trace: [ 1124.072267][T16856] dump_stack+0x172/0x1f0 [ 1124.076804][T16856] should_fail.cold+0xa/0x15 12:32:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x6, 0x226242bbde555960) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000200)=""/143) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.081408][T16856] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1124.087352][T16856] ? ___might_sleep+0x163/0x280 [ 1124.095004][T16856] should_fail_alloc_page+0x50/0x60 [ 1124.100228][T16856] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1124.105616][T16856] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1124.111528][T16856] ? lock_downgrade+0x880/0x880 [ 1124.116430][T16856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1124.123129][T16856] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 12:32:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000100)='selinux\x00', 0x8, 0x1) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.129505][T16856] alloc_pages_vma+0xdd/0x540 [ 1124.134311][T16856] __handle_mm_fault+0x1dd4/0x3ec0 [ 1124.139467][T16856] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 1124.145003][T16856] ? find_held_lock+0x35/0x130 [ 1124.149756][T16856] ? handle_mm_fault+0x322/0xb30 [ 1124.154713][T16856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.160942][T16856] ? kasan_check_read+0x11/0x20 [ 1124.165805][T16856] handle_mm_fault+0x43f/0xb30 [ 1124.170673][T16856] __get_user_pages+0x7b6/0x1a40 [ 1124.175637][T16856] ? follow_page_mask+0x19a0/0x19a0 [ 1124.181028][T16856] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1124.186986][T16856] get_user_pages_remote+0x21d/0x440 [ 1124.192306][T16856] copy_strings.isra.0+0x3dc/0x890 [ 1124.197449][T16856] ? remove_arg_zero+0x590/0x590 [ 1124.202467][T16856] ? prepare_binprm+0x6aa/0x940 [ 1124.207746][T16856] ? install_exec_creds+0x180/0x180 [ 1124.213063][T16856] copy_strings_kernel+0xa5/0x110 [ 1124.218181][T16856] __do_execve_file.isra.0+0x10ef/0x23a0 [ 1124.223828][T16856] ? copy_strings_kernel+0x110/0x110 [ 1124.229107][T16856] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.235341][T16856] ? getname_flags+0x277/0x5b0 [ 1124.240093][T16856] ? entry_SYSENTER_compat+0x70/0x7f [ 1124.245384][T16856] __ia32_compat_sys_execve+0x94/0xc0 [ 1124.250750][T16856] do_fast_syscall_32+0x281/0xd54 [ 1124.255771][T16856] entry_SYSENTER_compat+0x70/0x7f [ 1124.261087][T16856] RIP: 0023:0xf7faf849 [ 1124.265468][T16856] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1124.285256][T16856] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1124.293777][T16856] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1124.301741][T16856] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1124.309712][T16856] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1124.317674][T16856] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1124.325720][T16856] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:56 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x150) getsockname(r0, &(0x7f0000000200)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc044565d, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, {}, {0x7, 0x0, 0x0, 0xa000000, 0x12e7400000000000, 0x0, "9c7e21dc"}, 0x10000, 0x1, @fd, 0x4}) syz_open_dev$sndpcmp(0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x8991, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\r\xff', @ifru_names='bond_slave_1\x00\a\x00'}) ioctl$sock_ifreq(r2, 0x8990, &(0x7f0000000240)={'bond0\x00\n\x00\n\x06!!\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000780)={0x3, 0x70, 0x10000, 0x58f, 0x3c00956, 0x9, 0x0, 0x8000, 0x8, 0xb, 0x4, 0x80000001, 0xfffffffffffffffe, 0x3, 0xfc, 0x4, 0x2, 0x3, 0x2800000000000, 0x64d, 0x8, 0x3, 0x80, 0x140000000000, 0x1, 0x4, 0x9, 0x400, 0xe70e, 0x1, 0x1fc, 0x3720, 0x6, 0x9, 0x8, 0x2, 0x9, 0x8608, 0x0, 0x3f, 0x1, @perf_config_ext={0x3}, 0x80, 0x4, 0x100000001, 0xc, 0xf5, 0xbe000000, 0xfd1b}, r0, 0xb, r1, 0x8) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000500)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x97b, 0xffffffff}, 0x0, 0x0, &(0x7f00000002c0)={0x101, 0x6, 0x7, 0x3}, &(0x7f0000000300)=0x7, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x4}}, 0x10) lsetxattr$security_evm(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='security.evm\x00', &(0x7f0000000680)=@v2={0x5, 0x2, 0x9, 0x81, 0xe4, "c3269307fb268b9c6b49f2a199fed5b47847e278bf08b9df7d68d9cc230116bcb3dc083fbdd88c3b3d290259a0c942218f4a6c2d8a3945317280498570c152cbe98d099f35db91cfa7908c3ac4bc528b6c23d4a4e8327291ff5574afd3789f4006c2cc04d6bc029685e86047cc1750cd3350d837e644b949f79bae7746471ba0ee494598f69a52e9b896e0c31227daa045ea06337d75f47104cb952f83a8bf932ebea06031f04495c751519587f51aa687a66760cae72f1d3a7c5b61a11aa6927d39facb61361dca1fe0c49c673b237c1e17106c4d0744e2e4b11caab6a3a645ab733fdb"}, 0xee, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c, 0x800) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000140)) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 12:32:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:56 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x5, 0x800) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e22, @local}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000880)='system=\x8fe\x05bject_r:!pt_var_lib_t:s0\x00\x1c]\xb4\xd3 \xf7}\xb06\xe7\x8d\x10\x9ea\xe5\x80\xf7\f>0\x0e\x90\"7\xe36\xc4\xaazE\"\xbc\xbb\xec\xff\xff\x00\x00\x00\x00\x00\x00\xec\xd5\xa9\x99$\x80\x0e\xd9\xd2\x1c\x9a\xcf\xdf\xbfP\xa1\xe8\xdc\xb0:sq\xac\t\xce\xfc\xea\xfa', 0xa4c0, 0x2) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000100)=ANY=[@ANYRES32=0x0, @ANYBLOB="4a000000b353c4630efe61020b68077b67316c328a8464c4748e0857f43ddfe974ce08c94c50497ad80d217749927adc3105f64ce10febf4486171e8adeff56a77a7c152a6a1299746491265322c"], &(0x7f0000000200)=0x52) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000280)={r2, 0x0, 0x10000, 0x20, 0x6, 0x8}, &(0x7f00000002c0)=0x14) chdir(&(0x7f00000000c0)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000540)='./file0\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@broadcast, @in6=@ipv4={[], [], @broadcast}}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000400)=0xe8) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:56 executing program 5 (fault-call:4 fault-nth:23): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.529239][T17080] bond0: Releasing backup interface bond_slave_1 12:32:56 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x2000, 0x0) ioctl$TUNGETFILTER(r0, 0x800854db, &(0x7f0000000080)=""/12) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:56 executing program 1: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) dup(r0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x18102, 0x140) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000140)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.601336][T17099] FAULT_INJECTION: forcing a failure. [ 1124.601336][T17099] name failslab, interval 1, probability 0, space 0, times 0 [ 1124.684991][T17099] CPU: 1 PID: 17099 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1124.692612][T17099] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1124.702767][T17099] Call Trace: [ 1124.706195][T17099] dump_stack+0x172/0x1f0 [ 1124.710558][T17099] should_fail.cold+0xa/0x15 [ 1124.715227][T17099] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1124.721157][T17099] ? ___might_sleep+0x163/0x280 [ 1124.726219][T17099] __should_failslab+0x121/0x190 [ 1124.731219][T17099] should_failslab+0x9/0x14 [ 1124.735745][T17099] kmem_cache_alloc_trace+0x2d1/0x760 [ 1124.741152][T17099] tomoyo_find_next_domain+0x12c/0x1f8a [ 1124.746714][T17099] ? mark_held_locks+0xf0/0xf0 [ 1124.751490][T17099] ? mark_held_locks+0xf0/0xf0 [ 1124.756360][T17099] ? tomoyo_dump_page+0x510/0x510 [ 1124.761521][T17099] ? lock_acquire+0x16f/0x3f0 [ 1124.766212][T17099] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1124.772123][T17099] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1124.777846][T17099] ? tomoyo_bprm_check_security+0xe3/0x1b0 12:32:56 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1124.783748][T17099] security_bprm_check+0x69/0xb0 [ 1124.788699][T17099] search_binary_handler+0x77/0x570 [ 1124.793929][T17099] ? kasan_check_read+0x11/0x20 [ 1124.798801][T17099] __do_execve_file.isra.0+0x1394/0x23a0 [ 1124.804542][T17099] ? copy_strings_kernel+0x110/0x110 [ 1124.809839][T17099] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1124.816088][T17099] ? getname_flags+0x277/0x5b0 [ 1124.820881][T17099] ? entry_SYSENTER_compat+0x70/0x7f [ 1124.826470][T17099] __ia32_compat_sys_execve+0x94/0xc0 [ 1124.831954][T17099] do_fast_syscall_32+0x281/0xd54 [ 1124.836990][T17099] entry_SYSENTER_compat+0x70/0x7f [ 1124.842130][T17099] RIP: 0023:0xf7faf849 [ 1124.846203][T17099] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1124.865901][T17099] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1124.874326][T17099] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1124.882303][T17099] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1124.890274][T17099] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1124.898247][T17099] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1124.906218][T17099] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:56 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net\x00') recvfrom(r0, &(0x7f0000000280)=""/155, 0x9b, 0x2000, &(0x7f0000000100)=@ax25={{0x3, @bcast, 0x1}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') 12:32:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 5 (fault-call:4 fault-nth:24): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1125.333830][T17436] FAULT_INJECTION: forcing a failure. [ 1125.333830][T17436] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.348213][T17436] CPU: 1 PID: 17436 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1125.355882][T17436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1125.366300][T17436] Call Trace: [ 1125.369658][T17436] dump_stack+0x172/0x1f0 [ 1125.374013][T17436] should_fail.cold+0xa/0x15 [ 1125.378796][T17436] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1125.384625][T17436] ? ___might_sleep+0x163/0x280 [ 1125.389523][T17436] __should_failslab+0x121/0x190 [ 1125.394491][T17436] should_failslab+0x9/0x14 [ 1125.399269][T17436] kmem_cache_alloc_trace+0x2d1/0x760 [ 1125.404670][T17436] tomoyo_find_next_domain+0x12c/0x1f8a [ 1125.410409][T17436] ? mark_held_locks+0xf0/0xf0 [ 1125.415184][T17436] ? mark_held_locks+0xf0/0xf0 [ 1125.420048][T17436] ? tomoyo_dump_page+0x510/0x510 [ 1125.425107][T17436] ? lock_acquire+0x16f/0x3f0 [ 1125.429797][T17436] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1125.435621][T17436] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1125.441347][T17436] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1125.447264][T17436] security_bprm_check+0x69/0xb0 [ 1125.452219][T17436] search_binary_handler+0x77/0x570 [ 1125.457437][T17436] ? kasan_check_read+0x11/0x20 [ 1125.462402][T17436] __do_execve_file.isra.0+0x1394/0x23a0 [ 1125.468257][T17436] ? copy_strings_kernel+0x110/0x110 [ 1125.473823][T17436] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1125.473852][T17436] ? getname_flags+0x277/0x5b0 [ 1125.473868][T17436] ? entry_SYSENTER_compat+0x70/0x7f [ 1125.473885][T17436] __ia32_compat_sys_execve+0x94/0xc0 [ 1125.473906][T17436] do_fast_syscall_32+0x281/0xd54 [ 1125.473930][T17436] entry_SYSENTER_compat+0x70/0x7f [ 1125.484922][T17436] RIP: 0023:0xf7faf849 [ 1125.484938][T17436] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 12:32:57 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') lsetxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000200)='\x00', 0x1, 0x3) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vfio/vfio\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f00000002c0)=0x6, 0x4) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='io.stat\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000240)=0x2, 0x4) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:57 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x40, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x64) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x69f, 0x180) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000200)=0x4) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x0, 0x0) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f00000001c0)={0x10001, 0x80, 0xfff, 0x5, 0x1, 0x2}) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) 12:32:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1125.484945][T17436] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1125.484956][T17436] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1125.484963][T17436] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1125.484970][T17436] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1125.484977][T17436] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1125.484984][T17436] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='hfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x301000, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000380)=0x5, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0xffffffff}, &(0x7f0000000100)=0xea) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='cdg\x00', 0x4) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000680)=ANY=[@ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000140)=0x1008) prctl$PR_GET_TIMERSLACK(0x1e) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={r0, 0x10, &(0x7f0000000480)={&(0x7f00000016c0)=""/195, 0xc3, 0x0}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0xffffff09, &(0x7f0000000440)={&(0x7f0000000240)=""/106, 0x6a, r2}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r3, 0x4) execve(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 5 (fault-call:4 fault-nth:25): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f00000000c0)='system_u:object_r:lost_found_t:s0\x00', 0xff02, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000100)="3654b0") execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x8, 0x20000) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000080)={0xffffffffffffffff, 0x401, 0xffffffffffff8001, 0x2, 0x3}) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x49c2, 0x40200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f0000000140)={r1, 0x1}) 12:32:57 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x400, 0x82000) write$P9_RLOCK(r0, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x1}, 0x8) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x80000, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r0}, 0x10) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x7) syslog(0x3, &(0x7f0000000200)=""/242, 0xf2) r0 = socket(0xb, 0xf, 0x2) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x40, 0x0) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000300)={[{0x1ff, 0xfff, 0x8, 0x6, 0x7ff, 0x80, 0x2, 0x0, 0x7, 0x140, 0x8496a28, 0x80, 0x9}, {0x7, 0x7fff, 0x7ff, 0x3, 0x9, 0x6, 0x278, 0x81, 0x9f39, 0x3, 0x78, 0x4, 0x3c0d48df}, {0x40, 0x3b1, 0x8, 0x3ff, 0x8, 0x6926, 0x3f, 0x6, 0x7, 0x1, 0x7, 0x0, 0x9}], 0xf15}) getsockopt$inet6_udp_int(r0, 0x11, 0x65, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 12:32:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:58 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) r0 = socket(0x13, 0x805, 0xfff) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000040)={'\x00', 0xfffffffeffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1126.043392][T17859] FAULT_INJECTION: forcing a failure. [ 1126.043392][T17859] name failslab, interval 1, probability 0, space 0, times 0 [ 1126.156411][T17859] CPU: 1 PID: 17859 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1126.164039][T17859] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.174134][T17859] Call Trace: [ 1126.177459][T17859] dump_stack+0x172/0x1f0 [ 1126.181906][T17859] should_fail.cold+0xa/0x15 [ 1126.186606][T17859] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.192713][T17859] ? ___might_sleep+0x163/0x280 [ 1126.197634][T17859] __should_failslab+0x121/0x190 [ 1126.237686][T17859] should_failslab+0x9/0x14 [ 1126.242227][T17859] kmem_cache_alloc+0x2b2/0x6f0 [ 1126.247285][T17859] getname_kernel+0x53/0x370 [ 1126.251915][T17859] kern_path+0x20/0x40 [ 1126.256009][T17859] tomoyo_realpath_nofollow+0x74/0xdb [ 1126.263259][T17859] ? tomoyo_realpath_from_path+0x730/0x730 [ 1126.269088][T17859] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1126.275422][T17859] ? tomoyo_init_request_info+0x105/0x1d0 [ 1126.281166][T17859] tomoyo_find_next_domain+0x28c/0x1f8a [ 1126.286730][T17859] ? mark_held_locks+0xf0/0xf0 [ 1126.291506][T17859] ? mark_held_locks+0xf0/0xf0 [ 1126.296283][T17859] ? tomoyo_dump_page+0x510/0x510 [ 1126.301325][T17859] ? lock_acquire+0x16f/0x3f0 [ 1126.301340][T17859] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1126.301360][T17859] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1126.317653][T17859] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1126.323742][T17859] security_bprm_check+0x69/0xb0 [ 1126.328949][T17859] search_binary_handler+0x77/0x570 12:32:58 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') socket$inet6(0xa, 0x80000, 0xffffffffffffffc1) r0 = getpgrp(0x0) capget(&(0x7f0000000040)={0x20080522, r0}, &(0x7f00000000c0)={0x9, 0x2, 0x0, 0x5, 0x8}) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1126.328963][T17859] ? kasan_check_read+0x11/0x20 [ 1126.328991][T17859] __do_execve_file.isra.0+0x1394/0x23a0 [ 1126.344900][T17859] ? copy_strings_kernel+0x110/0x110 [ 1126.350647][T17859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1126.357083][T17859] ? getname_flags+0x277/0x5b0 [ 1126.361868][T17859] ? entry_SYSENTER_compat+0x70/0x7f [ 1126.367176][T17859] __ia32_compat_sys_execve+0x94/0xc0 [ 1126.372769][T17859] do_fast_syscall_32+0x281/0xd54 [ 1126.377812][T17859] entry_SYSENTER_compat+0x70/0x7f [ 1126.383755][T17859] RIP: 0023:0xf7faf849 [ 1126.387830][T17859] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1126.408045][T17859] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1126.416923][T17859] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1126.425003][T17859] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1126.433810][T17859] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1126.441794][T17859] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1126.449785][T17859] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:58 executing program 5 (fault-call:4 fault-nth:26): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x101000, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r0, 0x2, 0x1, 0x8, &(0x7f00000000c0)=[0x0, 0x0, 0x0], 0x3}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x1200c, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x600}}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize'}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@max_read={'max_read', 0x3d, 0x3}}, {@default_permissions='default_permissions'}], [{@dont_hash='dont_hash'}, {@subj_role={'subj_role', 0x3d, '@'}}]}}) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:58 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fadvise64(r0, 0x0, 0x7fffffff, 0x2) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) read$FUSE(r1, &(0x7f0000000680), 0x1000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000000c0)=0x0) ptrace$setopts(0x4206, r2, 0x38, 0x100046) syz_open_procfs$namespace(r2, &(0x7f0000000100)='ns/mnt\x00') symlink(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00') setxattr$security_selinux(0x0, 0x0, &(0x7f0000000140)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000200)) chdir(&(0x7f0000000540)='./file0\x00') ioctl$VT_DISALLOCATE(r1, 0x5608) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:58 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:58 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r2 = fcntl$getown(r0, 0x9) r3 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffff8, 0x280000) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000180)={r3, r0, 0x7ff00000}) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:32:58 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/191, 0xbf) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1126.741573][T18235] FAULT_INJECTION: forcing a failure. [ 1126.741573][T18235] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1126.755009][T18235] CPU: 1 PID: 18235 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1126.762546][T18235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1126.762553][T18235] Call Trace: [ 1126.762577][T18235] dump_stack+0x172/0x1f0 [ 1126.762598][T18235] should_fail.cold+0xa/0x15 [ 1126.762626][T18235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.762658][T18235] should_fail_alloc_page+0x50/0x60 [ 1126.762676][T18235] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1126.762692][T18235] ? kmem_cache_alloc_trace+0x151/0x760 [ 1126.762706][T18235] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 1126.762717][T18235] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 1126.762732][T18235] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1126.762744][T18235] ? find_held_lock+0x35/0x130 [ 1126.762764][T18235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1126.762787][T18235] cache_grow_begin+0x9c/0x860 [ 1126.841590][T18235] ? getname_kernel+0x53/0x370 [ 1126.846378][T18235] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1126.852664][T18235] kmem_cache_alloc+0x62d/0x6f0 [ 1126.857538][T18235] getname_kernel+0x53/0x370 [ 1126.862151][T18235] kern_path+0x20/0x40 [ 1126.865553][T18227] vivid-001: kernel_thread() failed [ 1126.866232][T18235] tomoyo_realpath_nofollow+0x74/0xdb [ 1126.866255][T18235] ? tomoyo_realpath_from_path+0x730/0x730 [ 1126.866274][T18235] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 12:32:58 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x6, 0x40) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000080)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x3) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1126.889286][T18235] ? tomoyo_init_request_info+0x105/0x1d0 [ 1126.895029][T18235] tomoyo_find_next_domain+0x28c/0x1f8a [ 1126.900859][T18235] ? mark_held_locks+0xf0/0xf0 [ 1126.905643][T18235] ? mark_held_locks+0xf0/0xf0 [ 1126.910437][T18235] ? tomoyo_dump_page+0x510/0x510 [ 1126.915499][T18235] ? lock_acquire+0x16f/0x3f0 [ 1126.920554][T18235] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1126.926382][T18235] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1126.932143][T18235] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1126.938150][T18235] security_bprm_check+0x69/0xb0 [ 1126.943100][T18235] search_binary_handler+0x77/0x570 [ 1126.948420][T18235] ? kasan_check_read+0x11/0x20 [ 1126.953383][T18235] __do_execve_file.isra.0+0x1394/0x23a0 [ 1126.959210][T18235] ? copy_strings_kernel+0x110/0x110 [ 1126.964539][T18235] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1126.970790][T18235] ? getname_flags+0x277/0x5b0 [ 1126.975570][T18235] ? entry_SYSENTER_compat+0x70/0x7f [ 1126.980869][T18235] __ia32_compat_sys_execve+0x94/0xc0 [ 1126.986262][T18235] do_fast_syscall_32+0x281/0xd54 12:32:59 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x84100, 0x120) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x1244a1e23197969e) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1126.991562][T18235] entry_SYSENTER_compat+0x70/0x7f [ 1126.997033][T18235] RIP: 0023:0xf7faf849 [ 1127.001108][T18235] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1127.020815][T18235] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1127.029333][T18235] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:32:59 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x7, 0x2) ioctl$KVM_GET_IRQCHIP(r0, 0xc208ae62, &(0x7f0000000400)={0x0, 0x0, @ioapic}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip6_tables_targets\x00') setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10) clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) add_key(&(0x7f0000000040)='trusted\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r2) unlink(&(0x7f0000000000)='./file0\x00') ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40086410, &(0x7f0000000280)={0x1000, &(0x7f0000000cc0)="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"}) 12:32:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) [ 1127.037320][T18235] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1127.045479][T18235] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1127.053644][T18235] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1127.061722][T18235] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:59 executing program 5 (fault-call:4 fault-nth:27): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000240)="03856378df5945be01f1fb690cbc7f432beda43b55cfe751bab48405e8b6777790c7d6d8d571f7b67007c15c30a217b637f117eb583d5054d15dcfba58c44cc15755f34a4092e0cc37a3902e91359f8220b47c62b3a7b6523c63f3864ddffba4aebbf3950af9f6bac05faa20c1820586d8d6e9", 0x73}], 0x1}}], 0x1, 0x0) ioctl(r0, 0x80001000008912, &(0x7f0000000700)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91930f0124eda133fa20430fbafce842f66188d0d4430fc7f314c1ab5be2f9660f3a0fae5e090000ba44d8d1b63ac4817d73d74ec482310d46f449f216c863fa43c4c2750ade1bdbae95c4e1a05d6b06aa420f383c02c401405c6bfd499768d768f833fefbc402c1dc49086464660f38323c8f26dbc1a1fe5ff6f6df0804f49fc4daefa59c0f01c4288ba6452e000054c4431d5c") 12:32:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x82840, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)=""/221, 0xdd) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1127.332903][T18699] FAULT_INJECTION: forcing a failure. [ 1127.332903][T18699] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1127.346180][T18699] CPU: 1 PID: 18699 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1127.354010][T18699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1127.364081][T18699] Call Trace: [ 1127.367389][T18699] dump_stack+0x172/0x1f0 [ 1127.371747][T18699] should_fail.cold+0xa/0x15 [ 1127.376359][T18699] ? fault_create_debugfs_attr+0x1e0/0x1e0 12:32:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)=0x0) getpgid(r1) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f00000000c0)={0xef, 0x0, 'client1\x00', 0x3, "421869ae86e2394b", "649f0ee72cc8a84f8dbf18cf009321f5d846045bf925694c19b341f27850e66c", 0x5, 0xc9}) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1127.382587][T18699] should_fail_alloc_page+0x50/0x60 [ 1127.387809][T18699] __alloc_pages_nodemask+0x1a1/0x8d0 [ 1127.393290][T18699] ? kmem_cache_alloc_trace+0x151/0x760 [ 1127.398853][T18699] ? tomoyo_find_next_domain+0x12c/0x1f8a [ 1127.404786][T18699] ? tomoyo_bprm_check_security+0x12a/0x1b0 [ 1127.410785][T18699] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 1127.416715][T18699] ? find_held_lock+0x35/0x130 [ 1127.421510][T18699] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1127.427609][T18699] cache_grow_begin+0x9c/0x860 [ 1127.432399][T18699] ? getname_kernel+0x53/0x370 [ 1127.437169][T18699] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1127.443514][T18699] kmem_cache_alloc+0x62d/0x6f0 [ 1127.448402][T18699] getname_kernel+0x53/0x370 [ 1127.453149][T18699] kern_path+0x20/0x40 [ 1127.457254][T18699] tomoyo_realpath_nofollow+0x74/0xdb [ 1127.462992][T18699] ? tomoyo_realpath_from_path+0x730/0x730 [ 1127.468843][T18699] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1127.475103][T18699] ? tomoyo_init_request_info+0x105/0x1d0 [ 1127.480942][T18699] tomoyo_find_next_domain+0x28c/0x1f8a [ 1127.486503][T18699] ? mark_held_locks+0xf0/0xf0 [ 1127.491303][T18699] ? mark_held_locks+0xf0/0xf0 [ 1127.496148][T18699] ? tomoyo_dump_page+0x510/0x510 [ 1127.501196][T18699] ? lock_acquire+0x16f/0x3f0 [ 1127.505904][T18699] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1127.511859][T18699] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1127.517593][T18699] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1127.523420][T18699] security_bprm_check+0x69/0xb0 [ 1127.528568][T18699] search_binary_handler+0x77/0x570 [ 1127.533785][T18699] ? kasan_check_read+0x11/0x20 [ 1127.538670][T18699] __do_execve_file.isra.0+0x1394/0x23a0 [ 1127.544324][T18699] ? copy_strings_kernel+0x110/0x110 [ 1127.549623][T18699] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1127.555882][T18699] ? getname_flags+0x277/0x5b0 [ 1127.560656][T18699] ? entry_SYSENTER_compat+0x70/0x7f [ 1127.565963][T18699] __ia32_compat_sys_execve+0x94/0xc0 [ 1127.571357][T18699] do_fast_syscall_32+0x281/0xd54 [ 1127.576398][T18699] entry_SYSENTER_compat+0x70/0x7f [ 1127.581531][T18699] RIP: 0023:0xf7faf849 [ 1127.585613][T18699] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1127.605221][T18699] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1127.613731][T18699] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1127.621717][T18699] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 12:32:59 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x28400, 0x0) accept4$inet6(r0, 0x0, &(0x7f00000000c0), 0x80800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1127.629701][T18699] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1127.637708][T18699] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1127.645718][T18699] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 12:32:59 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, 0x0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(0x0, 0x0, 0x0) 12:32:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) mount(&(0x7f0000000040)=@loop={'/dev/loop', 0x0}, &(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)='ext4\x00', 0x2000, &(0x7f0000000140)='tmpfs\x00') r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) getsockname(r0, &(0x7f0000000200)=@rc, &(0x7f0000000280)=0x80) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000680)={0x7, {{0xa, 0x4e22, 0x81, @ipv4={[], [], @multicast1}, 0x6}}, 0x1, 0x6, [{{0xa, 0x4e1d, 0xda, @remote, 0x5}}, {{0xa, 0x4e21, 0x1, @mcast2, 0x3}}, {{0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x1c}, 0x3}}, {{0xa, 0x4e24, 0xca91, @rand_addr="830a1d5cb8a2e0e20ee90ce40a918cdd", 0x1000}}, {{0xa, 0x4e21, 0x613f, @loopback, 0x5}}, {{0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, [], 0xe}, 0x3f}}]}, 0x38c) 12:32:59 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) gettid() r0 = getpgid(0x0) sched_setaffinity(r0, 0x453, &(0x7f0000000140)=0xf1000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000040)='./file0\x00') 12:32:59 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64EXEC\x00', &(0x7f0000000100)='ppp1eth0nodevvmnet1loself(+GPL(ppp1\x00', 0x24, 0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x129400, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:32:59 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='cpuset\x00', 0x2100000, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x200, 0x228442) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x102010}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x98, r1, 0x8, 0x70bd2b, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xc3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5c}]}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4000}, 0x20000005) ioctl$TIOCGPTPEER(r0, 0x5441, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') sigaltstack(&(0x7f0000fff000/0x1000)=nil, &(0x7f0000000280)) symlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000080)='./file0\x00') open$dir(&(0x7f0000000480)='./file0\x00', 0x12002, 0x100) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000200)=0x1004004, 0x4) 12:32:59 executing program 4: r0 = socket$inet6(0xa, 0x40000000000005, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x7b, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x2, @remote}], 0x1c) 12:33:00 executing program 5 (fault-call:4 fault-nth:28): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000100)={0x0, 0x0, 0x0, @broadcast, 'syz_tun\x00'}) ioctl(r0, 0x80001000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000180)="f2af91cd800f0124eda133fa20430fbafce842f66188d067f2412d00000000e1801c65ab39ff5bf9e2f9d7c442d1b6265e090000bac7bae4c6d18f26088f65240000dbc46440983af4ad5f48140e660f76cc433d0020d76ec863fa43c4a19b5da200800000f043835a00a9f340ae65657c7c730f8052043822de0ff8a10000000026460f740346d9f880ba0000000083fee7df0804f4c441a5609c8ba800000054838b") syz_execute_func(0x0) syz_execute_func(&(0x7f00000003c0)="994a2ae92c104c0f05bf03000000c4a37bf0c50441e2e9c422e9aabb3c0000004a0fc7a4ea70dbfeffffff0f383a9e02000000110f4e5bc4a265aa104b26660f38091e2fa2631bc421045f46070f01ddc44114c65d990000000000f045f619e564640f6f43a030fffdfd262e2e66450f7d64c6080383397fd3ff3a0065f20f7cd8efa1a12ad764d38f53efaf6766f2ab440fec3f67ddeac462b1f72e66420ffe3d99899999c4899294d800000000000fc4634148f70000c2a0c10b00cca27a0e0fc442cd376d000f9f3c6436b2aa46b3120fc465000505e39978c104d9a1e88b9e2fddcd2e66410fe34599660f38346800c5014526c4c1045ccc7d75c4426507af0f0000000f5fd2f1c4c2b1be0293c4c2d128faf30f5ea5a9a50000ffff660f79ca553131b8f63a00a2f1f13cfbfb6208db") 12:33:00 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r0, 0x80000003) unlink(&(0x7f0000000000)='./file0\x00') 12:33:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000300)=""/11, 0xb) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff5, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) 12:33:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) sendto(r0, &(0x7f0000000280)="bbefddc7d0d6e2b53dd1de79e73fd10366e348202825dd0736e4d88e6c2fb79b90307a63511f6a475c304dbc361b87fecbf87476ff5c7dc6b5f88a86a818a653225480e3f56dbb141f8b15e303c871353429a7324579a169ac6838c32169562e98b6e3c43372205d2500522d8e6e143878ea33681562cdff42eec2a597ca98cdd40c3b97db284ca307b22fc259f62a1bd0fae56d634460557a4b7b86de41e3ff0e7be6ce81d37191708d825b27c8faab003678c35513baf8f60952be8795d085bdf1f3e5f53ae31ab314cd5f59ab9033622d6e138300f273d74daa24c515ee5d9eca", 0xe2, 0x10, &(0x7f0000000380)=@rc={0x1f, {0x3, 0x7fffffff, 0x4cf, 0x6, 0x658, 0x77f5}, 0x3edf0c80}, 0x80) r1 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x10001, 0x80000) ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000140)) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x55, 0x88000) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000000680)={'filter\x00', 0x7, 0x4, 0x460, 0x114, 0x254, 0x114, 0x37c, 0x37c, 0x37c, 0x4, &(0x7f00000000c0), {[{{@uncond, 0xf0, 0x114}, @unspec=@CLASSIFY={0x24, 'CLASSIFY\x00', 0x0, {0x7}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @empty, @dev={0xac, 0x14, 0x14, 0xc}, @dev={0xac, 0x14, 0x14, 0x22}, 0x2}}}, {{@uncond, 0xf0, 0x128}, @unspec=@RATEEST={0x38, 'RATEEST\x00', 0x0, {'syz0\x00', 0x3, 0x2, 0x3}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x4ac) 12:33:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open$cgroup(&(0x7f00000000c0)={0x3, 0x70, 0x6, 0x9, 0x7ff, 0x7, 0x0, 0xfffffffffffffffd, 0x40000, 0x8, 0x1, 0x3, 0x8, 0x7f, 0x703d, 0x7ff, 0x8, 0x3ff, 0x1, 0x3, 0x3ff, 0x159, 0x80, 0x3, 0x5, 0x2, 0x3, 0x3, 0x7561, 0xa41, 0x100000000, 0x2, 0x9, 0x100, 0x1f, 0xccc5, 0x7, 0xffff, 0x0, 0x2, 0x4, @perf_config_ext={0xcc, 0x3}, 0x20000, 0x1, 0x5, 0x0, 0x1, 0x68a, 0xffffffffffffffff}, 0xffffffffffffffff, 0x9, 0xffffffffffffff9c, 0x8) r1 = perf_event_open(0x0, 0x0, 0x0, r0, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r1, &(0x7f0000000200)=""/70, 0x46) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400100, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0x3, 0x4) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) [ 1128.237974][T19249] FAULT_INJECTION: forcing a failure. [ 1128.237974][T19249] name failslab, interval 1, probability 0, space 0, times 0 [ 1128.279587][T19249] CPU: 0 PID: 19249 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1128.287203][T19249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1128.297288][T19249] Call Trace: [ 1128.300687][T19249] dump_stack+0x172/0x1f0 [ 1128.305139][T19249] should_fail.cold+0xa/0x15 [ 1128.309761][T19249] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1128.315603][T19249] ? ___might_sleep+0x163/0x280 [ 1128.321045][T19249] __should_failslab+0x121/0x190 [ 1128.326025][T19249] should_failslab+0x9/0x14 [ 1128.330550][T19249] __kmalloc_track_caller+0x2d8/0x740 [ 1128.335957][T19249] ? ima_collect_measurement+0x375/0x5c0 [ 1128.341621][T19249] krealloc+0x66/0xd0 [ 1128.345654][T19249] ima_collect_measurement+0x375/0x5c0 [ 1128.351135][T19249] ? ima_get_action+0xa0/0xa0 [ 1128.355858][T19249] process_measurement+0xeca/0x1570 [ 1128.361078][T19249] ? ima_add_template_entry.cold+0x48/0x48 [ 1128.367180][T19249] ? aa_get_task_label+0x3a6/0x720 [ 1128.373009][T19249] ? find_held_lock+0x35/0x130 [ 1128.377866][T19249] ? aa_get_task_label+0x3a6/0x720 [ 1128.377927][T19249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1128.389449][T19249] ? refcount_sub_and_test_checked+0x154/0x200 [ 1128.389467][T19249] ? refcount_dec_not_one+0x1f0/0x1f0 [ 1128.389490][T19249] ? refcount_dec_and_test_checked+0x1b/0x20 [ 1128.407224][T19249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1128.413486][T19249] ? apparmor_task_getsecid+0x94/0xd0 [ 1128.419067][T19249] ima_bprm_check+0xf4/0x270 [ 1128.419084][T19249] ? ima_file_mmap+0x130/0x130 [ 1128.419108][T19249] security_bprm_check+0x98/0xb0 [ 1128.433604][T19249] search_binary_handler+0x77/0x570 [ 1128.438826][T19249] ? kasan_check_read+0x11/0x20 [ 1128.443699][T19249] __do_execve_file.isra.0+0x1394/0x23a0 [ 1128.449530][T19249] ? copy_strings_kernel+0x110/0x110 [ 1128.454826][T19249] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1128.454842][T19249] ? getname_flags+0x277/0x5b0 [ 1128.454860][T19249] ? entry_SYSENTER_compat+0x70/0x7f [ 1128.454876][T19249] __ia32_compat_sys_execve+0x94/0xc0 12:33:00 executing program 4: r0 = socket$inet6(0xa, 0x40000000000005, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0xffffffffffffffff, 0x2) dup3(r0, r1, 0x0) 12:33:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) 12:33:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x81, 0x8100) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f00000000c0)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc00c6419, &(0x7f0000000480)={0x6, &(0x7f0000000200)=""/125, &(0x7f0000000780)=[{0x400, 0xdb, 0x8, &(0x7f0000000280)=""/219}, {0x7, 0x78, 0x1, &(0x7f0000000380)=""/120}, {0x200, 0xa, 0x6, &(0x7f0000000400)=""/10}, {0x1, 0xb, 0x4, &(0x7f0000000440)=""/11}, {0x9ec, 0xeb, 0x100000000, &(0x7f0000000680)=""/235}, {0x9372, 0xa4, 0x0, &(0x7f0000000580)=""/164}]}) 12:33:00 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 1128.454897][T19249] do_fast_syscall_32+0x281/0xd54 [ 1128.481837][T19249] entry_SYSENTER_compat+0x70/0x7f [ 1128.486976][T19249] RIP: 0023:0xf7faf849 [ 1128.491055][T19249] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1128.511018][T19249] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1128.519447][T19249] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 12:33:00 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) listxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)=""/191, 0xbf) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000200)=0x14) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000380)=ANY=[@ANYBLOB="6a87"], 0x1) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000003c0)='tmpfs\x00\xbd\xd2x\xef\xfe\xdd\xfcbF\xbaY\xe3?\x84o:\xe5\fLm\xb9\xdfg\xb7RL\x96\r*\xeb\xdcv\x99\xb1\"\tx\x98\x8c\xbeo\x89\x19\x1f\x05\r\x14\xf1\x1d?E\xec|\xcf\xb7\xfd\xc2\x9b\xcd\x9b\xa9\xb6~\x1b\x15\xf8\xbc\x11\xb5\xb6\xc5\xccb\xcb\x124Z\xe9\xd9\x85\x17\xddE>\xf9\x94A\x9dBi\x8c}-\xff\xb4\b]\vt\x8c\xdeJ`s\x01 \xed\xf0', 0x20000, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000300)={0x8, 0x5, 0x9, 0x4}) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000280)={'icmp6\x00'}, &(0x7f00000002c0)=0x1e) r1 = fcntl$getown(0xffffffffffffff9c, 0x9) r2 = perf_event_open(0x0, r1, 0x0, 0xffffffffffffffff, 0x4) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rxrpc(0x21, 0x2, 0xa) chdir(&(0x7f0000000540)='./file0\x00') utime(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x76f, 0x80000001}) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000340)={0x0}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000480)={r3, @in={{0x2, 0x4e24, @multicast2}}}, &(0x7f0000000580)=0x84) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1128.527422][T19249] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1128.527431][T19249] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1128.527439][T19249] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1128.527454][T19249] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1128.750905][ T26] audit: type=1800 audit(1557491580.706:35): pid=19249 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.5" name="file0" dev="ramfs" ino=342537 res=0 12:33:00 executing program 5 (fault-call:4 fault-nth:29): mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:00 executing program 3: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000240)='./file0\x00') symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) inotify_init() unlink(&(0x7f0000000000)='./file0\x00') 12:33:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) lstat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getuid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r5 = getegid() fstat(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getgid() stat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000780)=0x0, &(0x7f00000007c0), &(0x7f0000000800)) getgroups(0x1, &(0x7f0000000840)=[0xee01]) getgroups(0x4, &(0x7f0000000880)=[0xee01, 0x0, 0xffffffffffffffff, 0xee00]) lsetxattr$system_posix_acl(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='system.posix_acl_access\x00', &(0x7f00000008c0)={{}, {0x1, 0x1}, [{0x2, 0x6, r1}, {0x2, 0x4, r2}, {0x2, 0x0, r3}], {0x4, 0x4}, [{0x8, 0x3, r4}, {0x8, 0x4, r5}, {0x8, 0x3, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x3, r9}, {0x8, 0x6, r10}, {0x8, 0x5, r11}, {0x8, 0x1, r12}, {0x8, 0x2, r13}], {0x10, 0x1}, {0x20, 0x5}}, 0x8c, 0x3) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x1) 12:33:00 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') socket$inet6(0xa, 0x80000, 0xffffffffffffffc1) r0 = getpgrp(0x0) capget(&(0x7f0000000040)={0x20080522, r0}, &(0x7f00000000c0)={0x9, 0x2, 0x0, 0x5, 0x8}) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') 12:33:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0x1f, 0x0) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x100, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x4000000c}) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:00 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x6, 0x226242bbde555960) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) semctl$GETALL(r0, 0x0, 0xd, &(0x7f0000000200)=""/143) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000001c00)='./file0\x00', &(0x7f0000001c40)='trusted.overlay.nlink\x00', &(0x7f0000001c80)={'U+', 0x5}, 0x28, 0x1) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x8000, 0x0) r2 = gettid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001780)={{{@in6=@ipv4, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000480)=0xe8) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001880)={0xffffffffffffffff, r0, 0x0, 0x2, &(0x7f0000000600)='y\x00', 0xffffffffffffffff}, 0x30) getresuid(&(0x7f00000018c0)=0x0, &(0x7f0000001900), &(0x7f0000001940)) r7 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000019c0)={0x0, r0, 0x0, 0x3, &(0x7f0000001980)='-\\\x00'}, 0x30) signalfd(r1, &(0x7f0000001bc0)={0x7}, 0x8) r9 = getuid() fstat(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000001a80)={0x0, 0x0}) r12 = getuid() r13 = getegid() sendmsg$unix(r1, &(0x7f0000001b80)={&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000440)=[{&(0x7f00000002c0)="33a2f3758621fa099fca36961e4570f3137a353c3edda5b2c5cb5f50db373d202e27d3f81ab7c6857d3feed94a1be504e30435b75119eab9c1a60b3bceec2094b11412818a8f1b7bda462c3295e6f34b17409c8d59e5f76864bb99f370b8a9024dfe3404e287f1b9df3e4799a25f71cfb9f499cb18aab20ac894b7899c59cdc30bd84d1ce1c0c5c0df13246cb774c809dd504655907a81bbd48587ee5499eef5e918d277540878ec912688168fd44bc351413129168ea35fe14514e624068b30011f7c58b57c16340f5533b8ae", 0xcd}, {&(0x7f0000000680)="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", 0x1000}, {&(0x7f00000003c0)="e55d10ab04d8a9e64854ae4775882d300d08f0696567d3dab3a130d07bf07a36efe5c82a4db7bd56053c1063609fe003e484b32c58e88144bc48fcfbd211aae7d796d867f55cceb403ad1a04e1e25dc94e38cb7b887b09915fcedecb4014c0a951743a97f1f56d6e0348eaffe440aec1075948d312c68ac1", 0x78}, {&(0x7f0000001680)="76d2244138c71533fd3a2965ae6f0d4195493578b40e45e3dbadcfba8fa1675d1228f2a401bc628146a246edc168e71c0d1bf5d64f5253e0d477bcad90884fe80a9a8c00731b5d2396694f601855fedb20337949c0519b5399d426946034845ac5fbde97896613cf1021f76c8de6a2b2305fd8fccd46e30a982ee6c2eb7b0c20ac24289f9e579b8fd29234d27956f12c4529c438586381552caf98a248f066384832d82da67d909c9a56d421e1452745233b3a9fddd03bfd052ed3dcc003f0ba825ea68778059edae312e69bcf6d7e2303dca9226d50105294df79", 0xdb}], 0x4, &(0x7f0000001ac0)=[@rights={0x18, 0x1, 0x1, [r0, r0, r0]}, @rights={0x34, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x18, 0x1, 0x2, r2, r3, r4}, @cred={0x18, 0x1, 0x2, r5, r6, r7}, @cred={0x18, 0x1, 0x2, r8, r9, r10}, @cred={0x18, 0x1, 0x2, r11, r12, r13}], 0xac, 0x8000}, 0x0) chdir(&(0x7f0000000540)='./file0\x00') lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) signalfd(r0, &(0x7f0000000140)={0x66d400}, 0x8) 12:33:00 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') socket$inet6(0xa, 0x80000, 0xffffffffffffffc1) r0 = getpgrp(0x0) capget(&(0x7f0000000040)={0x20080522, r0}, &(0x7f00000000c0)={0x9, 0x2, 0x0, 0x5, 0x8}) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1128.937886][T19884] FAULT_INJECTION: forcing a failure. [ 1128.937886][T19884] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.010809][T19884] CPU: 0 PID: 19884 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1129.018407][T19884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.028462][T19884] Call Trace: [ 1129.028491][T19884] dump_stack+0x172/0x1f0 [ 1129.028512][T19884] should_fail.cold+0xa/0x15 [ 1129.028529][T19884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 1129.028548][T19884] ? ___might_sleep+0x163/0x280 [ 1129.028571][T19884] __should_failslab+0x121/0x190 [ 1129.057128][T19884] should_failslab+0x9/0x14 [ 1129.061654][T19884] __kmalloc+0x2dc/0x740 [ 1129.066607][T19884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.072870][T19884] ? d_absolute_path+0x11b/0x170 [ 1129.077832][T19884] ? __d_path+0x140/0x140 [ 1129.082179][T19884] ? tomoyo_encode2.part.0+0xf5/0x400 [ 1129.087569][T19884] tomoyo_encode2.part.0+0xf5/0x400 [ 1129.093124][T19884] tomoyo_encode+0x2b/0x50 [ 1129.097553][T19884] tomoyo_realpath_from_path+0x1c6/0x730 [ 1129.103201][T19884] tomoyo_realpath_nofollow+0xc8/0xdb 12:33:01 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xca, 0x30100) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/attr/exec\x00', 0x2, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f00000000c0)=0x4c, 0x4) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) renameat(r0, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000300)="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", 0xfc) setxattr$security_selinux(0x0, 0x0, &(0x7f0000000240)='system_u:object_r:var_run_t:s0\x00', 0xffffffffffffffd1, 0x1) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file1\x00') execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f00000004c0)='tmpfs\x00', 0x2000000, 0x0) uselib(0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000200)=[@in6={0xa, 0x4e22, 0x81, @empty, 0x7}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, [], 0x12}, 0x5}, @in6={0xa, 0x4e22, 0x2, @loopback, 0x59695b46}], 0x64) chdir(&(0x7f0000000540)='./file0\x00') symlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2c0040, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r1, 0x40186417, &(0x7f00000000c0)={0xb58, 0x72b18557, 0x3, 0x7fffffff, 0x8, 0x7}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x800}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_id=r2, 0x4) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 12:33:01 executing program 2: mkdir(&(0x7f0000000780)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x8040, 0x1) recvmmsg(0xffffffffffffffff, &(0x7f0000008380)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000007300)=[{&(0x7f0000007280)=""/14, 0xe}], 0x1, &(0x7f0000007340)=""/219, 0xdb}}, {{&(0x7f0000007900)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, 0x0}}, {{&(0x7f0000007a80)=@hci, 0x80, &(0x7f0000007ec0)=[{&(0x7f0000007b00)=""/199, 0xc7}, {&(0x7f0000007c00)=""/112, 0x70}, {&(0x7f0000007c80)=""/123, 0x7b}, {&(0x7f0000007d00)=""/102, 0x66}, {&(0x7f0000007d80)=""/192, 0xc0}, {0x0}, {&(0x7f0000007e80)=""/55, 0x37}], 0x7, &(0x7f0000007f00)=""/123, 0x7b}, 0x3ff}, {{&(0x7f0000007f80)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, 0x80, &(0x7f0000008300)=[{&(0x7f0000008000)=""/39, 0x27}, {&(0x7f0000008040)=""/117, 0x75}, {&(0x7f00000080c0)=""/113, 0x71}, {&(0x7f0000008140)=""/64, 0x40}, {&(0x7f0000008180)=""/152, 0x98}, {0x0}, {&(0x7f00000082c0)=""/22, 0x16}], 0x7, &(0x7f0000008340)=""/25, 0x19}}], 0x5, 0x0, 0x0) ioctl$RTC_VL_READ(0xffffffffffffffff, 0x80047013, &(0x7f0000007980)) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 1129.108573][T19884] ? tomoyo_realpath_from_path+0x730/0x730 [ 1129.114391][T19884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1129.120643][T19884] ? tomoyo_init_request_info+0x105/0x1d0 [ 1129.126386][T19884] tomoyo_find_next_domain+0x28c/0x1f8a [ 1129.131990][T19884] ? mark_held_locks+0xf0/0xf0 [ 1129.136775][T19884] ? mark_held_locks+0xf0/0xf0 [ 1129.141559][T19884] ? tomoyo_dump_page+0x510/0x510 [ 1129.146601][T19884] ? lock_acquire+0x16f/0x3f0 [ 1129.151297][T19884] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1129.157129][T19884] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1129.162859][T19884] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1129.168682][T19884] security_bprm_check+0x69/0xb0 [ 1129.173723][T19884] search_binary_handler+0x77/0x570 [ 1129.178937][T19884] ? kasan_check_read+0x11/0x20 [ 1129.183803][T19884] __do_execve_file.isra.0+0x1394/0x23a0 [ 1129.189437][T19884] ? copy_strings_kernel+0x110/0x110 [ 1129.194715][T19884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.200964][T19884] ? getname_flags+0x277/0x5b0 [ 1129.205713][T19884] ? entry_SYSENTER_compat+0x70/0x7f [ 1129.211005][T19884] __ia32_compat_sys_execve+0x94/0xc0 [ 1129.216368][T19884] do_fast_syscall_32+0x281/0xd54 [ 1129.221387][T19884] entry_SYSENTER_compat+0x70/0x7f [ 1129.226495][T19884] RIP: 0023:0xf7faf849 [ 1129.230544][T19884] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1129.250132][T19884] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b 12:33:01 executing program 4: mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000c80)='./file0\x00') socket$inet6(0xa, 0x80000, 0xffffffffffffffc1) r0 = getpgrp(0x0) capget(&(0x7f0000000040)={0x20080522, r0}, &(0x7f00000000c0)={0x9, 0x2, 0x0, 0x5, 0x8}) symlink(0x0, &(0x7f0000000080)='./file0\x00') clone(0x10040004, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) request_key(&(0x7f0000000340)='syzkaller\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)='/dev/snapshot\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, 0x0, 0xe05c) unlink(&(0x7f0000000000)='./file0\x00') [ 1129.258536][T19884] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1129.266497][T19884] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1129.274460][T19884] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1129.282679][T19884] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1129.290638][T19884] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1129.343476][T19884] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1129.405087][T19884] Kernel panic - not syncing: MAC Initialization failed. [ 1129.412178][T19884] CPU: 1 PID: 19884 Comm: syz-executor.5 Not tainted 5.1.0+ #5 [ 1129.419730][T19884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1129.430232][T19884] Call Trace: [ 1129.433534][T19884] dump_stack+0x172/0x1f0 [ 1129.438232][T19884] panic+0x2cb/0x65c [ 1129.443376][T19884] ? __warn_printk+0xf3/0xf3 [ 1129.448005][T19884] ? kfree+0x173/0x230 [ 1129.452093][T19884] ? tomoyo_realpath_from_path+0x1d1/0x730 [ 1129.453796][ T3880] kobject: 'loop4' (000000000196dfe8): kobject_uevent_env [ 1129.457906][T19884] ? kfree+0x173/0x230 [ 1129.466990][ T3880] kobject: 'loop4' (000000000196dfe8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1129.469071][T19884] ? tomoyo_warn_oom.cold+0x24/0x43 [ 1129.469091][T19884] tomoyo_warn_oom.cold+0x35/0x43 [ 1129.469112][T19884] tomoyo_realpath_from_path+0x3a8/0x730 [ 1129.495571][T19884] tomoyo_realpath_nofollow+0xc8/0xdb [ 1129.500966][T19884] ? tomoyo_realpath_from_path+0x730/0x730 [ 1129.506795][T19884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1129.513061][T19884] ? tomoyo_init_request_info+0x105/0x1d0 [ 1129.518814][T19884] tomoyo_find_next_domain+0x28c/0x1f8a [ 1129.524741][T19884] ? mark_held_locks+0xf0/0xf0 [ 1129.529515][T19884] ? mark_held_locks+0xf0/0xf0 [ 1129.534303][T19884] ? tomoyo_dump_page+0x510/0x510 [ 1129.539339][T19884] ? lock_acquire+0x16f/0x3f0 [ 1129.544033][T19884] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1129.549842][T19884] tomoyo_bprm_check_security+0x12a/0x1b0 [ 1129.555610][T19884] ? tomoyo_bprm_check_security+0xe3/0x1b0 [ 1129.561406][T19884] security_bprm_check+0x69/0xb0 [ 1129.566337][T19884] search_binary_handler+0x77/0x570 [ 1129.571526][T19884] ? kasan_check_read+0x11/0x20 [ 1129.576394][T19884] __do_execve_file.isra.0+0x1394/0x23a0 [ 1129.582053][T19884] ? copy_strings_kernel+0x110/0x110 [ 1129.587351][T19884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1129.593678][T19884] ? getname_flags+0x277/0x5b0 [ 1129.598452][T19884] ? entry_SYSENTER_compat+0x70/0x7f [ 1129.603752][T19884] __ia32_compat_sys_execve+0x94/0xc0 [ 1129.609112][T19884] do_fast_syscall_32+0x281/0xd54 [ 1129.614125][T19884] entry_SYSENTER_compat+0x70/0x7f [ 1129.619222][T19884] RIP: 0023:0xf7faf849 [ 1129.623274][T19884] Code: 85 d2 74 02 89 0a 5b 5d c3 8b 04 24 c3 8b 14 24 c3 8b 3c 24 c3 90 90 90 90 90 90 90 90 90 90 90 90 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 eb 0d 90 90 90 90 90 90 90 90 90 90 90 90 [ 1129.642873][T19884] RSP: 002b:00000000f5dab0cc EFLAGS: 00000296 ORIG_RAX: 000000000000000b [ 1129.651457][T19884] RAX: ffffffffffffffda RBX: 00000000200001c0 RCX: 0000000000000000 [ 1129.659432][T19884] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1129.667394][T19884] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1129.675362][T19884] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 1129.683334][T19884] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 1129.693285][T19884] Kernel Offset: disabled [ 1129.697779][T19884] Rebooting in 86400 seconds..