[ OK ] Started OpenBSD Secure Shell server. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... [ OK ] Started Update UTMP about System Runlevel Changes. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.18' (ECDSA) to the list of known hosts. 2021/04/30 20:06:01 fuzzer started 2021/04/30 20:06:01 dialing manager at 10.128.0.163:33413 2021/04/30 20:06:01 syscalls: 1982 2021/04/30 20:06:01 code coverage: enabled 2021/04/30 20:06:01 comparison tracing: enabled 2021/04/30 20:06:01 extra coverage: enabled 2021/04/30 20:06:01 setuid sandbox: enabled 2021/04/30 20:06:01 namespace sandbox: enabled 2021/04/30 20:06:01 Android sandbox: enabled 2021/04/30 20:06:01 fault injection: enabled 2021/04/30 20:06:01 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/04/30 20:06:01 net packet injection: /dev/net/tun does not exist 2021/04/30 20:06:01 net device setup: enabled 2021/04/30 20:06:01 concurrency sanitizer: enabled 2021/04/30 20:06:01 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/04/30 20:06:01 USB emulation: /dev/raw-gadget does not exist 2021/04/30 20:06:01 hci packet injection: /dev/vhci does not exist 2021/04/30 20:06:01 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 2021/04/30 20:06:01 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 2021/04/30 20:06:01 suppressing KCSAN reports in functions: 'do_signal_stop' 'generic_write_end' 'ext4_free_inode' '__ext4_new_inode' 'tick_nohz_next_event' '__xa_clear_mark' 'blk_mq_sched_dispatch_requests' 2021/04/30 20:06:01 fetching corpus: 0, signal 0/2000 (executing program) syzkaller login: [ 17.128911][ T1743] ================================================================== [ 17.131705][ T1743] BUG: KCSAN: data-race in futex_wait_queue_me / prepare_signal [ 17.134549][ T1743] [ 17.135507][ T1743] write to 0xffff8881003830ac of 4 bytes by task 1745 on cpu 1: [ 17.138359][ T1743] futex_wait_queue_me+0x198/0x260 [ 17.139925][ T1743] futex_wait+0x143/0x430 [ 17.141398][ T1743] do_futex+0x9e8/0x1ee0 [ 17.142760][ T1743] __se_sys_futex+0x2a8/0x390 [ 17.144263][ T1743] __x64_sys_futex+0x74/0x80 [ 17.145429][ T1743] do_syscall_64+0x4a/0x90 [ 17.146257][ T1743] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 17.147883][ T1743] [ 17.148634][ T1743] read to 0xffff8881003830ac of 4 bytes by task 1743 on cpu 0: [ 17.155160][ T1743] prepare_signal+0x952/0xeb0 [ 17.159811][ T1743] __send_signal+0x64/0x760 [ 17.164288][ T1743] send_signal+0x281/0x390 [ 17.168675][ T1743] do_send_specific+0x13d/0x1c0 [ 17.173496][ T1743] __x64_sys_tgkill+0x108/0x140 2021/04/30 20:06:01 fetching corpus: 48, signal 16868/20119 (executing program) 2021/04/30 20:06:01 fetching corpus: 97, signal 26207/30526 (executing program) [ 17.178317][ T1743] do_syscall_64+0x4a/0x90 [ 17.182704][ T1743] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 17.188571][ T1743] [ 17.190867][ T1743] Reported by Kernel Concurrency Sanitizer on: [ 17.196984][ T1743] CPU: 0 PID: 1743 Comm: syz-fuzzer Not tainted 5.12.0-syzkaller #0 [ 17.204931][ T1743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 17.214968][ T1743] ================================================================== 2021/04/30 20:06:01 fetching corpus: 145, signal 34334/39408 (executing program) 2021/04/30 20:06:01 fetching corpus: 194, signal 40645/46286 (executing program) 2021/04/30 20:06:02 fetching corpus: 244, signal 44858/51092 (executing program) 2021/04/30 20:06:02 fetching corpus: 294, signal 49682/56258 (executing program) 2021/04/30 20:06:02 fetching corpus: 344, signal 53689/60535 (executing program) 2021/04/30 20:06:02 fetching corpus: 394, signal 57211/64282 (executing program) 2021/04/30 20:06:02 fetching corpus: 444, signal 60968/68053 (executing program) 2021/04/30 20:06:02 fetching corpus: 494, signal 62981/70259 (executing program) 2021/04/30 20:06:02 fetching corpus: 544, signal 64995/72427 (executing program) 2021/04/30 20:06:02 fetching corpus: 594, signal 67482/74864 (executing program) 2021/04/30 20:06:02 fetching corpus: 644, signal 69856/77071 (executing program) 2021/04/30 20:06:02 fetching corpus: 694, signal 73324/79942 (executing program) 2021/04/30 20:06:02 fetching corpus: 744, signal 75203/81641 (executing program) 2021/04/30 20:06:02 fetching corpus: 794, signal 78106/83919 (executing program) 2021/04/30 20:06:02 fetching corpus: 843, signal 79139/84885 (executing program) 2021/04/30 20:06:02 fetching corpus: 893, signal 80771/86135 (executing program) 2021/04/30 20:06:02 fetching corpus: 943, signal 82195/87234 (executing program) 2021/04/30 20:06:02 fetching corpus: 993, signal 83326/88098 (executing program) 2021/04/30 20:06:02 fetching corpus: 1043, signal 85254/89350 (executing program) 2021/04/30 20:06:02 fetching corpus: 1093, signal 86693/90254 (executing program) 2021/04/30 20:06:02 fetching corpus: 1143, signal 87944/91010 (executing program) 2021/04/30 20:06:02 fetching corpus: 1193, signal 89848/92035 (executing program) 2021/04/30 20:06:02 fetching corpus: 1243, signal 91217/92726 (executing program) 2021/04/30 20:06:02 fetching corpus: 1293, signal 92661/93432 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93514 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93544 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93579 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93604 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93631 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93655 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93676 (executing program) 2021/04/30 20:06:02 fetching corpus: 1303, signal 92801/93696 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93725 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93752 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93773 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93789 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93817 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93840 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93865 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93892 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93915 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93938 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93956 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93987 (executing program) 2021/04/30 20:06:03 fetching corpus: 1303, signal 92801/93987 (executing program) 2021/04/30 20:06:04 starting 6 fuzzer processes 20:06:04 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:04 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)) 20:06:04 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xdf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r2, 0x8) gettid() r3 = getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x5, 0x60, 0x0, 0x100000000, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x3ff}, 0x0, 0x0, 0x5, 0xa, 0x4, 0x5, 0x7, 0x0, 0x2, 0x0, 0xf0}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0x80, 0x88, 0x0, 0x0, 0x20, 0x40030, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x3, 0x4}, 0x0, 0x8000, 0x5, 0x9, 0x3ff, 0x80, 0x800, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 20:06:04 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 20:06:04 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:04 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = semget$private(0x0, 0x2, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x7, 0x0) ptrace(0x10, r0) [ 19.800899][ T25] audit: type=1400 audit(1619813164.387:8): avc: denied { execmem } for pid=1754 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 19.905715][ T1759] cgroup: Unknown subsys name 'perf_event' [ 19.912211][ T1759] cgroup: Unknown subsys name 'net_cls' [ 19.942269][ T1760] cgroup: Unknown subsys name 'perf_event' [ 19.964817][ T1760] cgroup: Unknown subsys name 'net_cls' [ 19.996151][ T1763] cgroup: Unknown subsys name 'perf_event' [ 20.004569][ T1764] cgroup: Unknown subsys name 'perf_event' [ 20.008403][ T1765] cgroup: Unknown subsys name 'perf_event' [ 20.011245][ T1764] cgroup: Unknown subsys name 'net_cls' [ 20.017852][ T1763] cgroup: Unknown subsys name 'net_cls' [ 20.037143][ T1765] cgroup: Unknown subsys name 'net_cls' [ 20.043258][ T1773] cgroup: Unknown subsys name 'perf_event' [ 20.051867][ T1773] cgroup: Unknown subsys name 'net_cls' 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 3: mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) 20:06:08 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:08 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)) 20:06:08 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xdf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r2, 0x8) gettid() r3 = getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x5, 0x60, 0x0, 0x100000000, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x3ff}, 0x0, 0x0, 0x5, 0xa, 0x4, 0x5, 0x7, 0x0, 0x2, 0x0, 0xf0}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0x80, 0x88, 0x0, 0x0, 0x20, 0x40030, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x3, 0x4}, 0x0, 0x8000, 0x5, 0x9, 0x3ff, 0x80, 0x800, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 20:06:08 executing program 3: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:08 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:11 executing program 4: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = semget$private(0x0, 0x2, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x7, 0x0) ptrace(0x10, r0) 20:06:11 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)) 20:06:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 20:06:11 executing program 3: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:11 executing program 0: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:11 executing program 5: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xdf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r2, 0x8) gettid() r3 = getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x5, 0x60, 0x0, 0x100000000, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x3ff}, 0x0, 0x0, 0x5, 0xa, 0x4, 0x5, 0x7, 0x0, 0x2, 0x0, 0xf0}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0x80, 0x88, 0x0, 0x0, 0x20, 0x40030, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x3, 0x4}, 0x0, 0x8000, 0x5, 0x9, 0x3ff, 0x80, 0x800, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 20:06:11 executing program 3: mkdir(&(0x7f0000000640)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)) umount2(&(0x7f0000000000)='./file0\x00', 0x2) 20:06:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) 20:06:11 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000000)) 20:06:11 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = semget$private(0x0, 0x2, 0x0) semtimedop(r1, &(0x7f0000000080)=[{0x0, 0xe265}], 0x7, 0x0) ptrace(0x10, r0) 20:06:11 executing program 1: perf_event_open(&(0x7f0000000bc0)={0x2, 0x70, 0xdf, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x10, r2, 0x8) gettid() r3 = getpid() openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fb}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x5, 0x60, 0x0, 0x100000000, 0x0, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x1ff, 0x3ff}, 0x0, 0x0, 0x5, 0xa, 0x4, 0x5, 0x7, 0x0, 0x2, 0x0, 0xf0}, r3, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0x80, 0x88, 0x0, 0x0, 0x20, 0x40030, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x10000, 0x2, @perf_config_ext={0x3, 0x4}, 0x0, 0x8000, 0x5, 0x9, 0x3ff, 0x80, 0x800, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) 20:06:11 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8916, &(0x7f0000000140)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xbb\xbb\xb0]\t\x0f\x89d:\xfc%\xb4\x8f8b6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x82{)\xde\t\xbb\x8a\x16\xa4L\xa6\xba\xd9\xd7\xd6\x18\x82b\x87\xc0^\xfd\xac\x8e\xfd\xdf\xb8\xe2\xd4\xd8%\xb1\x8e\x80\xaa\xbfM\xb3\xe0K\xf6U\a\x00\x00\x00>\x80\x00\x00\x00\x00\x00\x00\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000000c0)='lo:|T{\xdcD\xd2\xaf>o\xd6Q\x00\x19\x02\x00\xdd\xd4\b\xbb\xbb\xb0]\t\x0f\x89d:\x8f\xecb6\xd6\xd7AF,\xa3\x00\x00\x00\x00\x91\xed\x05\x00\x00\x00C\xeb&\xc6\xd6\xcb\x85\x9a\xb6OFl\xd3\x00'/79) [ 27.119920][ C1] hrtimer: interrupt took 26221 ns