_GET_DUMPABLE(0x3) socket$inet_udplite(0x2, 0x2, 0x88) r3 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000500), &(0x7f0000000000)=0x60) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r3, 0x118, 0x1, &(0x7f0000000100)=0x4, 0x4) 04:42:29 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00\x00\x00\xf2\xff\xff\xfe\x00\x00@\x00', 0x6}) r3 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x1, 0x80200) ioctl$ASHMEM_GET_SIZE(r3, 0x7704, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r5, 0x5386, &(0x7f0000000080)) ioctl$TUNSETLINK(r2, 0x400454cd, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000900)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\t\x00\x00\x00M.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9b[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xd2\x91p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') 04:42:29 executing program 2: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events\x000Y\b/\xe5I\xdd\xdd/fu7\xc6{\x06\xa2\bW]\x05\x7f\xfa\xc3\xed\xbdA~\xb1\xb0+\x1dw{\x12\xd8p\xf9\xd0s\xc2jP\xdd\xca\x9e\x1f\xe8\xe3\xce\xc7\x05\xf7s\xd6\x19\xadj\x90N\\\xf3\x86\xbb\xa9}\x9feIM\xbb\xb7b\vc\xe1c\xf6~}\x0f\xa9\x92x&T\xe7\xc8o\xaa\x86\xfa\xee\xda`H\x87\v\x04b\xc5\x9f%\xd6N\vR^\x13\x84\xddE\xe9', 0x7a05, 0x1700) write$cgroup_subtree(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="e4d29b4c9aa9ecb547766bba634fffa2e5f16096b2030000b18052a4ee1625d85b6dd088e173ff3a521957e2c3b26bcee91a64ca32607369614403db86d0aa6fa436c681f940ab5d7d759770b6c534247a67b5d24411e7f1ef3486c5bf16efc961a0117cd8f0189db5542c6530a44fbdb24d37c181e93e6de312851c5966422559a53f60134aa7c383a4a1d81bce042d9e7a617cfd0acc246ff97cc6bb7fc4b18106052bd18225d2a636e7df27b8b92e49edf20f6d4d71345157cb6a5e33c5241c00afdd8d71433e0aaff1bc1b372863de194fc200000000"], 0x200600) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1b58ec7f, 0x0, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x2) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 04:42:29 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000010700000000000001000003000000008e10"], 0x0, 0x1b}, 0x20) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, r4, 0x2d2ed000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r7, 0x6741576111f67cdd) mkdirat(r7, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000140)={0x0, 0x6}, &(0x7f0000000180)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xa, &(0x7f00000002c0)={0x7, 0x1, 0x0, 0x0, 0x700000, 0xfffff8c5, 0x8001, 0x7, r8}, &(0x7f0000000340)=0x20) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r6, 0x2403, 0x2) 04:42:29 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) [ 257.322548] audit: type=1804 audit(1574656949.290:42): pid=7151 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir932249033/syzkaller.JcxDbF/2/memory.events" dev="sda1" ino=16565 res=1 04:42:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0xfffffffe}, r6, 0x0, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xad2b3e1254f22aae}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r8 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup2(r8, r7) syncfs(r7) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000002022d8f", @ANYRES32, @ANYBLOB="b1c282a2", @ANYBLOB="07ffffca580c20ab835f8bd30277c639b051336bafeafdfee9ea9c8a876398268f3287fc8485403c64c88cd38b3028d9d59fc158aa155bedc518f94acdba95220da9f719c888e587136f1e6600fcba26c7576d74db7c7926252e27b08e4d722844c54a51f16d30c05110959e83c2", @ANYBLOB="08000609622b8f40c2f50987b4f42e8020b5b179d541d2d344144dbfd89282", @ANYRES32=0x0, @ANYBLOB="1000738a00000000"], 0x7, 0x2) [ 257.436526] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 04:42:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0xfffffffe}, r6, 0x0, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xad2b3e1254f22aae}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r8 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup2(r8, r7) syncfs(r7) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000002022d8f", @ANYRES32, @ANYBLOB="b1c282a2", @ANYBLOB="07ffffca580c20ab835f8bd30277c639b051336bafeafdfee9ea9c8a876398268f3287fc8485403c64c88cd38b3028d9d59fc158aa155bedc518f94acdba95220da9f719c888e587136f1e6600fcba26c7576d74db7c7926252e27b08e4d722844c54a51f16d30c05110959e83c2", @ANYBLOB="08000609622b8f40c2f50987b4f42e8020b5b179d541d2d344144dbfd89282", @ANYRES32=0x0, @ANYBLOB="1000738a00000000"], 0x7, 0x2) 04:42:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mknod(&(0x7f0000000340)='./file1\x00', 0x8808, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f0000000300)) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2084, &(0x7f0000000440)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x3ff}}, {@mode={'mode', 0x3d, 0x1ff}}], [{@uid_eq={'uid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) 04:42:29 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) [ 257.492850] IPVS: Error joining to the multicast group 04:42:29 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0xc0045878) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket(0x1, 0x8000d, 0x9) fchown(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0x215fb225ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 04:42:29 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0xfffffffe}, r6, 0x0, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xad2b3e1254f22aae}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r8 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup2(r8, r7) syncfs(r7) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000002022d8f", @ANYRES32, @ANYBLOB="b1c282a2", @ANYBLOB="07ffffca580c20ab835f8bd30277c639b051336bafeafdfee9ea9c8a876398268f3287fc8485403c64c88cd38b3028d9d59fc158aa155bedc518f94acdba95220da9f719c888e587136f1e6600fcba26c7576d74db7c7926252e27b08e4d722844c54a51f16d30c05110959e83c2", @ANYBLOB="08000609622b8f40c2f50987b4f42e8020b5b179d541d2d344144dbfd89282", @ANYRES32=0x0, @ANYBLOB="1000738a00000000"], 0x7, 0x2) 04:42:29 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0xfffffffe}, r6, 0x0, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xad2b3e1254f22aae}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r8 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup2(r8, r7) syncfs(r7) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000002022d8f", @ANYRES32, @ANYBLOB="b1c282a2", @ANYBLOB="07ffffca580c20ab835f8bd30277c639b051336bafeafdfee9ea9c8a876398268f3287fc8485403c64c88cd38b3028d9d59fc158aa155bedc518f94acdba95220da9f719c888e587136f1e6600fcba26c7576d74db7c7926252e27b08e4d722844c54a51f16d30c05110959e83c2", @ANYBLOB="08000609622b8f40c2f50987b4f42e8020b5b179d541d2d344144dbfd89282", @ANYRES32=0x0, @ANYBLOB="1000738a00000000"], 0x7, 0x2) [ 257.766607] overlayfs: upperdir is in-use by another mount, mount with '-o index=off' to override exclusive upperdir protection. 04:42:29 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:29 executing program 0: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mknod(&(0x7f0000000340)='./file1\x00', 0x8808, 0x2) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000080)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}}, {@lowerdir={'lowerdir', 0x3d, './bus'}}]}) getresuid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f0000000300)) mount$bpf(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x2084, &(0x7f0000000440)={[{@mode={'mode', 0x3d, 0x8}}, {@mode={'mode', 0x3d, 0x3ff}}, {@mode={'mode', 0x3d, 0x1ff}}], [{@uid_eq={'uid', 0x3d, r2}}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@appraise_type='appraise_type=imasig'}, {@subj_type={'subj_type'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) [ 257.808955] overlayfs: filesystem on './file0' not supported as upperdir [ 257.818187] audit: type=1400 audit(1574656949.780:43): avc: denied { sys_admin } for pid=7176 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 257.852120] overlayfs: filesystem on './file0' not supported as upperdir 04:42:29 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) [ 258.083548] IPVS: ftp: loaded support on port[0] = 21 04:42:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$sock_int(r0, 0x1, 0x29, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000200), 0x31b, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000980)=ANY=[@ANYBLOB="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"/528], 0x15) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x1, {0x0, 0x5}}, 0x14) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='f2fs\x00', 0x90420, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) r2 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) pwrite64(r2, &(0x7f000003bfff)='/', 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r2, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) restart_syscall() mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x0) 04:42:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x14}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)}}], 0x400000000000196, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 04:42:30 executing program 2: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, 0x0) sendfile(r4, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0xfffffffe}, r6, 0x0, r5, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0xad2b3e1254f22aae}, 0x200000000, 0x2, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$loop(0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, 0x0, 0x0, 0x0) r7 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) r8 = syz_open_dev$dspn(0x0, 0x0, 0x0) dup2(r8, r7) syncfs(r7) recvmmsg(0xffffffffffffffff, &(0x7f00000001c0), 0x460, 0xea225aec34b1dd0e, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0000000002022d8f", @ANYRES32, @ANYBLOB="b1c282a2", @ANYBLOB="07ffffca580c20ab835f8bd30277c639b051336bafeafdfee9ea9c8a876398268f3287fc8485403c64c88cd38b3028d9d59fc158aa155bedc518f94acdba95220da9f719c888e587136f1e6600fcba26c7576d74db7c7926252e27b08e4d722844c54a51f16d30c05110959e83c2", @ANYBLOB="08000609622b8f40c2f50987b4f42e8020b5b179d541d2d344144dbfd89282", @ANYRES32=0x0, @ANYBLOB="1000738a00000000"], 0x7, 0x2) 04:42:30 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:30 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0_to_bridge\x00'}, 0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x401, 0x10000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0xb, @capture={0x1000, 0x2, {0x3f, 0x4}, 0x80}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a", 0x37, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x2200) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000002c0)={0x4, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\xb7\x91\x1f\x83\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0xb) ioctl$int_out(r5, 0x2, &(0x7f00000000c0)) r6 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCCBRK(r6, 0x5428) r7 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r7) r8 = socket$inet(0x2, 0x2, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f0000000240)) [ 258.198332] overlayfs: filesystem on './file0' not supported as upperdir 04:42:30 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) [ 258.306613] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bridge, syncid = 0, id = 0 [ 258.522571] audit: type=1400 audit(1574656950.480:44): avc: denied { map } for pid=7229 comm="syz-executor.4" path=2F6D656D66643A73656375726974792E73656C696E7578202864656C6574656429 dev="tmpfs" ino=26292 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) 04:42:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x14}, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003480)=[{{0x0, 0x0, &(0x7f0000002700)}}], 0x400000000000196, 0x0, 0x0) shutdown(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000300), 0x4) 04:42:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000040)={'sVz'}, &(0x7f0000000200)='%`\xf3`\xce\xeaY3\xc2\xf3S\xa7\xe8\xb33,\x97_!=\xce\x9f\xa8\x01\x1d\xc0\xc7\x81w\xe6\xfb\x18\r\x93\x1c\x9c\xbb\x17\xa2\xba\x87\x16\xee\xee\x10\xf7\x0e\xd4\x10\x84\x1b\'{\xc1\xeb^G\xac^<\x14[P\x87\x8b\f\r\xea\'\xebm\xef\xb6\xae\xe38\xf4\xf6\xea\xf2\xa2X\x1baXyr\x13\xa6\xccl\xc7\x9e:\xb8\x10\x1d\xc4\xd6\x9eP\'\xda/Zw\x0e\xb5-\x16\xa5\a!\x8d\x16\x8e\xa3\xf5\n\x18T_\x06>\xb5\xb8Fa\n6\t^\xb0\xd3\xce)ya&/\xd3\xe4\x10A1VH3T\v>\xa7Z\xc1\xd5\'B\x8d\xbe\xe3G\b}\x87%j\x16\xbc/+<\\)\x19\xd0[\xbe\x9f\xb2U[\xfbCo\xb0\x1eQ\xff\x05\x03\xdb\x86\xe2\x9b\x9c\xc6`q', 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x17c) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x199, 0x0) r1 = socket$inet6(0xa, 0x80006, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000240)={0x9}, 0x109) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'veth1_to_hsr\x00', @ifru_flags=0x1}}) r2 = socket$inet6(0xa, 0x80006, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000240)={0x9}, 0x109) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) r3 = getpid() ptrace$peek(0x2, r3, &(0x7f0000000380)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x40082406, &(0x7f0000002940)='\'\xc4\'\v\xec\xe4\t\xc5r\x12-\x90\xda\x9a\x94\x02\xec\xea\x10\x90\x03\xcb\xf8\x1b6\xa5t\xd6\xd3\x93\xd3\xdf\x85P\x19G7Q\v\xdcHv\x03Qa\xf3\xd4\xfc(\x83\xfb\xf8C\xf6\x8a$\xb1\x90\xeb\'~\xa0\xd8\xc8\xe8\x94#\xcd\xd5Kp\xbf\xc0\x8d7\x1b?A(\xe8^\x9c\xff\x0f\x1ck\xbc\x95\x05\xcd\x17\xf7\x15o\xd4\xdc4\x84uw\xa6w\x0f\xea`1\xec\xb4\x04\xd5\r\x8d\xde\x1f]\x15\xe5\xe8\xd00\xe5\x8d\x9c\x9ec+\x02\x1d\xffa5\x94\xab\xddNe\xfe\x8c\xc4q\xbb#f\xc1\xb9\x81W\xa4$)!\v\x9b\xa7\b\x91\xe5\xeb\x88\x1c\x0f\xb2.Tr\xe4\x99\x9e\x03\xb4\xd2\xf9KW\xce\xd1cC\xd5\xcf\x97\xa9\xeab\xda\xd6:\xa91q\xf7\xc5\xc0C\xd1\'\x89\xee\x84T:\x88x\xe2\x83\xf2r\xf4&t@\x9e\xa4qf\xdf\xf4\xb5\x01\\a\x85\xd3\xe0\xb7\n\xe7\xed\x84Q\xd7s\xcd4B\xcbQ\xa4\x9f[\x99\xdfJ%\xa8\xfc\xe3`\xc1JA\xc9\xbc\xd4~}\xce\xe8\xfejH\x8fb\xdd\xbcJ\vk\'\xe7Q\xfd\xaaA`\xb5\xa1\xe4\xf8\x9eG\xcfb\xe8@\x04\xe1\xf8\xacU)(S\xed\xffA\xfaqt\xb6-\x9b5\xf6\x1e\x13$e\n\xc7\x9b\xb0X\xb6\xd4\t\x99^^\xc2>J\x16\xd0\x8c\xecy*\xa0\a\xe9Ar\xa6\xb4n9j\xe5\xba\x8a\n\xce2\xcf_\x1b.t)\x8d09A[-\xf6\xe7\xe8\x1f\x92>\xb8\xd4>-\xacY\x9e\x88\x96\xa7\xfa\xdaoL\xa6\xec\xe8\xd5\xbfaf\xd7\xfc\x03\x91w)\xcd\x1f\xbe\xc9R\xcfz\x03\xec\br\x83\x8bM-\xf8X\xfd\"\xb4RV\x7f\xda\xd3\xd4h\x1c\xdb\xbe\xa4U\xec\xcd\'\xbc\xd22\x85{,\xe6-,6\x9d\x85\xb4fL\b\x98\xe9@\xee\xc2.\xb3\xd6w\x10\x94\xb5%D\xe8\r\xfe\x98G\x82\fx,\xa2J\x12\x03ec\xd5e-\x1f6\xe7\xb6\xd9\xcf0J\xed\xb7\x9b\xfd\xfc\x00EQ\x1f\x00D\xc95\xdeG +\x1bp\xf4\t\x94\x87\xf1ZbO\xa6\xe9\f`u\xda\xb3\x1d\xf9\x94\x80\xc1\x17\xde(_\xa7\xe7\x11\x9a\xac\x8c\xb1\xd71\xc5\xe9\xd3n\xc2\xa4\x98P\x9aF\xc2\x93\xad@\xa9h\x96\x1b]2\x88\xf3\xd8\xc798\x8c\x9f\xd4W4\xf1}\aD\xa0\xd8\xda\xf4\x1bEx(t|\xf4Y\xfaJ\xc2GS\xc9R\xb5\xda\xa8\x9b\xaa\x01\xe2~\xd8f.#\x94\xbf\x85z\xbf\xa0x62L\x1f\x91\xd2\x1e%\x88\x1f\f\xabb\x8ds\x93\x9e\xed\xd2\xdb\x02\x0e\xcf\xf5\xaf\xc8>+\x03e\xb7\xba\xb9}\xca\xfc\xe8\xed\x9b\xa2\x9ey\bMv\x8f\x8a8\xfd;\x9a5J\xee\x9a\xae\x83>$\x8a6\x05P\x8c\x05\xb8\r\xcf\xdd\x15/\xa9\xa1\xd4\x87{\xc9I4\xe3 i\xa4\xc5\xe5l\x03?\xfdM&\xc0a9}h\x8ef\x10!\xf0\x99\x80\xb72\xcc\x06\'+\xf0\xa1\a\xeeSGH\x12\x068S7s\xd3\xdaT\"\xa9jk\xed\xa2IyM\xa3&t\xfeA\xa9\"\xb4\xec\xdex\x00\x80`p\x91\x84\xbfK\xb6\x00\xa7\xa2\x06\xce\xc8X\x7f\xd1@\xf1\xcf\xdf\xae\xdb\r\xf6h\xdf\xc6+\xac\r\x9f\xc2D\xdf\xd6\xde`\xa4\xd1=\x1b\x8d\xf4\xbe#\tH\x06;a(`\xdcw\x1dc_\v\x046j\xf9`\r\xc0\a\x8d\x12:l\xc7j3E\xd7\xcaX\x97\xad\x93\xea\x99\xca\xd7m\xb8\x1e1\xb6Nz\"U/\x0eP\b=\x01W\xcd\xf1x\x85\xf4&\xe7\xf9W\x06\xa4\xf8&\xbc\xf4\xd0\xd2\xd1W\xee\x9a\xdd\xdbu\x0e\x9aV\xe2\xc5\x84`Bu\x12\xa8/=\x17\xc4F\x11\xdfm-)\xd9hc\xba\xb7\x91\xd9\x11\x9a,\x19\xf4]\xa7Y@B\x1f') setns(0xffffffffffffffff, 0x79b273858b3b9296) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 04:42:31 executing program 5: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0xc0045878) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket(0x1, 0x8000d, 0x9) fchown(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0x215fb225ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 04:42:31 executing program 0: openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0_to_bridge\x00'}, 0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x401, 0x10000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0xb, @capture={0x1000, 0x2, {0x3f, 0x4}, 0x80}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a", 0x37, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x2200) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000002c0)={0x4, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\xb7\x91\x1f\x83\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0xb) ioctl$int_out(r5, 0x2, &(0x7f00000000c0)) r6 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCCBRK(r6, 0x5428) r7 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r7) r8 = socket$inet(0x2, 0x2, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f0000000240)) 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r1) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) 04:42:31 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0xc0045878) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket(0x1, 0x8000d, 0x9) fchown(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0x215fb225ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 04:42:31 executing program 1: openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x1, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vhost-net\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000080)={0x2, 'veth0_to_bridge\x00'}, 0x18) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0xec}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x401, 0x10000) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000300)={0xb, @capture={0x1000, 0x2, {0x3f, 0x4}, 0x80}}) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendto$inet(r0, &(0x7f0000000640)="3232ce2774e7a3797748648df71c7b4542839e347be35844e42ad67454cd5e140e0ab73493d6b6921681e5536dbc0f309747cc199a7f9a", 0x37, 0x0, 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x0, 0x2200) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f00000002c0)={0x4, 0x1}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) setsockopt$sock_int(r3, 0x1, 0x8, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) sendto$inet(r0, &(0x7f0000000180)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba5c0fe3ac47b61db6b4c41bd1a5259e62506cda287b857aac", 0x8293, 0x4000002, 0x0, 0x27) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='\xb7\x91\x1f\x83\x00', 0x2, 0x0) ioctl$UI_SET_LEDBIT(r5, 0x40045569, 0xb) ioctl$int_out(r5, 0x2, &(0x7f00000000c0)) r6 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCCBRK(r6, 0x5428) r7 = socket$inet_dccp(0x2, 0x6, 0x0) dup2(0xffffffffffffffff, r7) r8 = socket$inet(0x2, 0x2, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, r8) ioctl$SIOCX25GFACILITIES(r9, 0x89e2, &(0x7f0000000240)) 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') [ 259.367015] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth0_to_bridge, syncid = 0, id = 0 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:31 executing program 0: socket$inet(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) write(0xffffffffffffffff, &(0x7f0000000240), 0x25e) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1000000000000005, 0x0) ioctl$int_in(r1, 0x800060800c5012, &(0x7f0000000000)) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f00000002c0)=""/213) socket$inet6_udp(0xa, 0x2, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$UI_SET_SWBIT(r2, 0x4004556d, 0x8) fallocate(0xffffffffffffffff, 0x0, 0xffff, 0x0) connect$bt_l2cap(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x200, 0x0) getsockopt$TIPC_NODE_RECVQ_DEPTH(0xffffffffffffffff, 0x10f, 0x83, 0x0, &(0x7f0000000100)) lstat(0x0, &(0x7f0000000580)) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r3) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x0, 0x0) umount2(&(0x7f0000000540)='./file0\x00', 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockname$tipc(r4, &(0x7f00000000c0), &(0x7f00000001c0)=0x10) 04:42:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:31 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/fib_triestat\x00') seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x8, &(0x7f0000000100)=0x4) preadv(r0, &(0x7f00000017c0), 0x331, 0x0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010500000001000000ff07000000fffffffd000800000000000000004000ffffff8500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 04:42:31 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:31 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) openat$ashmem(0xffffffffffffff9c, &(0x7f0000002800)='/dev/ashmem\x00', 0x48c880, 0x0) syz_open_procfs(0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5412, 0x0) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000001000)) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000075c0)={'team0\x00'}) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) getresuid(&(0x7f0000004180), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_dccp_buf(r4, 0x21, 0xf, &(0x7f00000000c0)="0264836e0659dc287072d3ce7adbc3e6b906ca6ad18cdd80b258026e9c26c84a19c52af1eb9cfb69473ad7803a574b65d81eaca9d69f3ab391a603625e0f7fa25a08050afaac04edff48", 0x4a) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c00000010002b0400"/20, @ANYRES32=0x0, @ANYBLOB="bd99a58400000000000000800000000062726ca323b08fdc17dc0200089fc3c53904a12cfd5d3e268fd0fef7e077e6ef37b30000dcdc9b5500000000"], 0x3c}}, 0x0) [ 259.971890] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.0'. [ 260.004407] loop5: p1 < > p2 p3 < p5 p6 > p4 [ 260.014770] loop5: p2 size 1073741824 extends beyond EOD, truncated [ 260.030847] loop5: p5 size 1073741824 extends beyond EOD, truncated 04:42:32 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0xc0045878) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket(0x1, 0x8000d, 0x9) fchown(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0x215fb225ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 04:42:32 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x207f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x20200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file1\x00') ioctl$BLKALIGNOFF(0xffffffffffffffff, 0x127a, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f00000002c0)={&(0x7f0000000240)='./file1\x00', 0x0, 0x8}, 0x10) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-simd\x00'}, 0x58) accept(r1, 0x0, 0x0) fsetxattr$security_ima(r1, 0x0, 0x0, 0x0, 0x0) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) chdir(&(0x7f0000000180)='./file0\x00') r2 = semget$private(0x0, 0x0, 0xea70940c4315047e) arch_prctl$ARCH_GET_CPUID(0x1011) semop(r2, &(0x7f0000000340)=[{0x2, 0x4, 0x800}, {0x4, 0x0, 0x1800}, {0x0, 0x7, 0x1000}, {0x0, 0x2, 0x800}], 0x4) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/s\x8e\x00\xf3\xff\x7f\x00', 0x0, 0x400) ioctl$int_in(r3, 0x800000c0045006, &(0x7f0000000940)=0x7b) read$char_usb(r3, &(0x7f00000003c0)=""/100, 0x64) recvmmsg(r3, &(0x7f0000004e40)=[{{0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f0000000500)=""/177, 0xb1}, {&(0x7f00000005c0)=""/231, 0xe7}, {&(0x7f0000000d80)=""/4096, 0x1000}, {&(0x7f0000000740)=""/127, 0x7f}, {&(0x7f0000000300)=""/42, 0x2a}, {&(0x7f0000000380)=""/47, 0x2f}, {&(0x7f00000007c0)=""/126, 0x7e}, {&(0x7f0000000840)=""/171, 0xab}, {&(0x7f0000000980)=""/226, 0xe2}, {&(0x7f0000000440)}], 0xa, &(0x7f0000000b40)=""/119, 0x77}}, {{&(0x7f0000000bc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000c40)=""/101, 0x65}], 0x1, &(0x7f0000000cc0)=""/91, 0x5b}, 0x3e32ee64}, {{&(0x7f0000001d80)=@hci, 0x80, &(0x7f0000003200)=[{&(0x7f0000001e00)=""/225, 0xe1}, {&(0x7f0000001f00)=""/4096, 0x1000}, {&(0x7f0000000900)=""/17, 0x11}, {&(0x7f0000002f00)=""/19, 0x13}, {&(0x7f0000002f40)=""/47, 0x2f}, {&(0x7f0000002f80)=""/177, 0xb1}, {&(0x7f0000003040)=""/252, 0xfc}, {&(0x7f0000003140)=""/106, 0x6a}, {&(0x7f00000031c0)}], 0x9}}, {{0x0, 0x0, &(0x7f0000003480)=[{&(0x7f0000003340)=""/73, 0x49}, {&(0x7f00000033c0)=""/131, 0x83}], 0x2, &(0x7f00000034c0)=""/4096, 0x1000}, 0x10000}, {{&(0x7f00000044c0)=@in6={0xa, 0x0, 0x0, @mcast2}, 0x80, &(0x7f0000004880)=[{&(0x7f0000004540)=""/108, 0x6c}, {&(0x7f00000045c0)=""/253, 0xfd}, {&(0x7f00000046c0)=""/148, 0x94}], 0x3, &(0x7f00000048c0)=""/16, 0x10}, 0x7}, {{&(0x7f0000004900)=@can, 0x80, &(0x7f0000004d40)=[{&(0x7f0000004980)=""/199, 0xc7}, {&(0x7f0000004a80)=""/148, 0x94}, {&(0x7f0000004b40)=""/194, 0xc2}, {&(0x7f0000004c40)=""/96, 0x60}, {&(0x7f0000004cc0)=""/108, 0x6c}], 0x5}, 0x5}], 0x6, 0x1, &(0x7f0000004fc0)={0x0, 0x989680}) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, 0x0) 04:42:32 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x31e, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1400000022000104000000090000000000000000e631ce2663708640e675ce7e7d0400000016028d7498eca07f10edf3284722ee44b87fa2ab811ed1bf8258cdca529f5ec4be8d008ed93716dee79b90803264ffffd1d1920f5b0609d5bb10ba6d9dabbc119861bba5e8c01cca379c7cb8d54b5adaabe19d1da2c22f903b99eec894b162e02fbdf8068cbac5abc212de6aa530f6e9cace1b07cbf04fa35ed23881e6d596a7dfd29dd77d6b2744197b3b0fe71dffd80977dc988ee5df882639027177093e43ee92b3a3a8a1fad0d09c61ce7aa55c1458993cda19ad0fed9e74d4a646099cb5f2b73eff82e9b231d3e09098c18f6ed44228035ae8d1283de20000000000000000000000000000000000000000000000000000a7f0eb4e1e5a1781a09cd63884de81151a64ebddef91f6cb18cedcadc99a6fd554856aafdff4e1f789db56ff08a891e8cb446d6cb0d3eb95718c2a87dbdc9fa1d4844e4cb795c5300d7f00e42383d77e83827aa0e245a99fc4934fa458d342c2ee00000024f3a8b2436c4a15c351fd65b693f25fbfd25196631d0bf7cc1952372ec6d168233255af0241c28c696cc8117c38022edae4a9ea7ae069f637fde73d0fa2329034015b2e53741df9e491c3a86f434eef9cfe812842ed17885b0d0f1888ec22cc00"/486], 0x14}}, 0x20000000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SG_SET_RESERVED_SIZE(r3, 0x2275, &(0x7f0000000000)) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000009c0)=@updpolicy={0xfc, 0x19, 0xe31, 0x0, 0x0, {{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0xa}}, [@tmpl={0x44, 0x5, [{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x0, @in6=@mcast1}]}]}, 0xfc}, 0x8}, 0x0) 04:42:32 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bind$isdn(r2, &(0x7f0000000140)={0x22, 0xe7, 0x3, 0x0, 0x7f}, 0x6) r3 = timerfd_create(0x4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x1e8000017}) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x4020, 0x0) ioctl$UFFDIO_UNREGISTER(r4, 0x8010aa01, &(0x7f00000001c0)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) signalfd4(r0, &(0x7f0000000080)={0x6}, 0x8, 0x800) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EXT4_IOC_SWAP_BOOT(r6, 0x6611) timerfd_settime(r3, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x989680}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) epoll_pwait(0xffffffffffffffff, &(0x7f00000001c0), 0x51c, 0x7, 0x0, 0x0) r7 = dup3(r3, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r7, &(0x7f0000000000)={0x2001}) [ 260.338024] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 04:42:32 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) [ 260.415892] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 260.462699] audit: type=1400 audit(1574656952.430:45): avc: denied { block_suspend } for pid=7369 comm="syz-executor.5" capability=36 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 04:42:32 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="020300031200000000000a000000380e000000000000000000000000ffffac1e0001000000000000000004000900a000000000000000020d6bfded2342273716fbaa28f7be830000000002000100000800000000000d0000000005000500000000000a00000000000000fe8000000000000000000000000000000000000000000000dd85c10ed21ce87ce1dac792a099f5615ab86ae6a3cff497ac2843cf7bd76b3b7b0f0df6f4e7da00154ef0fdebe86cb37d649b746d2447f6fd497b053e6affffffff00000000c5284a93d631415d3f5a0afbabc83d645b030b649c20cd3d60bd377510e3787142e7e906e94496d0e376681d56bd63e252eae72f07cfc700c10c07348c56d069ba0baf5f6ee3b72df4f71e730b2b1a70c9ced3b24d02b90fd120b7e1cad27f1f0dbc61e4"], 0x12c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') 04:42:32 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x2, 0x20}, {0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfc29}, {0xffffffffffffffff, 0xffffffffffffffd}, 0x0, 0x6e6bb1, 0xb9d5e1f1b6249cb4}, {{@in=@broadcast, 0x0, 0x3c}, 0x0, @in=@multicast2, 0x3}}, 0xe8) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r3, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000300)=0x80000001fe, 0x4) ftruncate(r4, 0x80006) sendfile(r3, r4, 0x0, 0x8000fffffffe) r5 = dup3(r2, r3, 0x0) socket(0xa, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@remote, @in=@empty}}, {{@in=@empty}, 0x0, @in=@broadcast}}, 0x0) setsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000140)=0x4, 0x4) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='\xff\x01\x00\x00\x00\x00\x00\x00pa/capi20\x00', 0x100000, 0x0) 04:42:32 executing program 5: perf_event_open(&(0x7f0000000640)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0xfc979a7eb3e2d389, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000340)={0x0, @in6={{0xa, 0x4e23, 0xff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7f}}, [0x1, 0x5, 0x6, 0x8, 0x10000, 0x5, 0x3, 0x7, 0x1, 0x3, 0x7, 0x40, 0x2, 0x80000000, 0x8000]}, &(0x7f0000000240)=0x100) ioctl$DRM_IOCTL_INFO_BUFS(0xffffffffffffffff, 0xc0106418, &(0x7f0000000080)={0x100, 0x9, 0x80, 0x12, 0x0, 0x3}) listen(r0, 0x5) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) setsockopt$netrom_NETROM_T2(r3, 0x103, 0x2, &(0x7f0000000040)=0x8, 0x4) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x181) getpgrp(0x0) r4 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x0, 0x0, 0x0, 0x1000000000054}, 0x98) pipe(&(0x7f0000000100)) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) 04:42:32 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="020300031200000000000a000000380e000000000000000000000000ffffac1e0001000000000000000004000900a000000000000000020d6bfded2342273716fbaa28f7be830000000002000100000800000000000d0000000005000500000000000a00000000000000fe8000000000000000000000000000000000000000000000dd85c10ed21ce87ce1dac792a099f5615ab86ae6a3cff497ac2843cf7bd76b3b7b0f0df6f4e7da00154ef0fdebe86cb37d649b746d2447f6fd497b053e6affffffff00000000c5284a93d631415d3f5a0afbabc83d645b030b649c20cd3d60bd377510e3787142e7e906e94496d0e376681d56bd63e252eae72f07cfc700c10c07348c56d069ba0baf5f6ee3b72df4f71e730b2b1a70c9ced3b24d02b90fd120b7e1cad27f1f0dbc61e4"], 0x12c}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') 04:42:33 executing program 4: fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) getpid() r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$void(0xffffffffffffffff, 0xc0045878) write(0xffffffffffffffff, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x1}, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video35\x00', 0x2, 0x0) socket(0x1, 0x8000d, 0x9) fchown(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x0, 0x0) clone(0x215fb225ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x208000, 0x0) setsockopt$RDS_CONG_MONITOR(r2, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) 04:42:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)={0x0, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x2, [{}, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x3c1) 04:42:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000000)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f0000010000000000000000000000000000000000000000000000000000000100000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/128], 0x128}}, 0x0) 04:42:33 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 5: syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x2240, 0x0) r0 = socket$inet(0x2b, 0x801, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000000)=0xfffffcc0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, 0x0, 0x0) 04:42:33 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) 04:42:33 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 3: mkdir(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:33 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x005\n\xff\xd9\x15\xc1m\xd6\xcc\x05\xed\xac\xb3\xfe\x13\xadD\x1ai\xfck\x948\xcfT\xa4Q8\xcb\x9d\x80\x01V\xea\x8a\x112\xd8\xfe\x7f\x0f\"pX\xa4>\xf9\x00r\x14+\x1e\xdc\xb3]N\b\x00\x00\x00 +\xf4\xe1.\xb6\xde\xce\xe7`\xb2{\xeeu\x88b\xd7j`\xa8z\x89H\xcb\xfb\xc0\x06\xf8.\aA\xcf', 0x200002, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$pptp(0x18, 0x1, 0x2) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='notify_on_release\x00', 0x2, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) r5 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000180)=ANY=[@ANYRESOCT=0x0], 0x17) sendfile(r5, r5, &(0x7f0000000240), 0x7fff) sendfile(r2, r4, 0x0, 0x100000000) 04:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r0 = open(&(0x7f00000003c0)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ubi_ctrl\x00', 0x80001, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0x7, &(0x7f0000000380)={0x6, 0xfffffffd, 0x4e2d0cfb, 0x4}, 0x10) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000080)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x3ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6ecc}, r2}}, 0x30) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x50100, 0x0) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f00000002c0)={0x40, 0x202, 0x8000, 0x4}, 0x10) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f0000000040)=[{&(0x7f0000000180)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) socketpair$unix(0x1, 0x3, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x0, &(0x7f0000a4f000/0x1000)=nil) shmctl$IPC_SET(0x0, 0x1, 0x0) shmat(0x0, &(0x7f00000c7000/0x2000)=nil, 0x4000) shmctl$IPC_INFO(0x0, 0x3, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 04:42:34 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 04:42:34 executing program 1: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = getpgid(r0) ptrace$setregset(0x4205, r1, 0x3, &(0x7f0000000040)={&(0x7f00000000c0)="a8fad07b39e1a9bfa7aa3c2a9b25d9d9a3859aaea76765072af70a97d372c3ac396ae224c3540b5db7c0a18c6c6eacdd54b849bee960c4a849a21f35eb64b064db1f0bdd764ccaec6e7c9babff02cc957a01478e4cf33a0fe284045e1dc26b510025c81491e8cf96b9e8e3f138f81a528546", 0x72}) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) ioctl$NBD_DO_IT(r2, 0xab03) socketpair(0x11, 0x2, 0x0, &(0x7f0000000140)) r4 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x9, 0x80000) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r6, 0x4004556d, 0xf) r7 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r7, 0xb) shmctl$SHM_LOCK(r7, 0xb) ioctl$MON_IOCQ_RING_SIZE(r4, 0x9205) syz_open_dev$ndb(0x0, 0x0, 0x0) 04:42:34 executing program 0: socketpair$unix(0x1, 0x80000000000003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) fcntl$F_GET_RW_HINT(r3, 0x40b, &(0x7f0000000380)) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x1e, 0x805, 0x0) close(r7) openat$capi20(0xffffffffffffff9c, &(0x7f0000001440)='/dev/capi20\x00', 0x42, 0x0) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r8, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r7, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r9}, 0x8) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r6, 0x84, 0x17, &(0x7f0000000400)={r9, 0x0, 0x1000, "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"}, 0x1008) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000002c0)='tls\x00', 0x4) r10 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$IMCTRLREQ(0xffffffffffffffff, 0x80044945, &(0x7f00000003c0)={0x40, 0x5, 0x7f000, 0x8000}) fcntl$F_SET_FILE_RW_HINT(r10, 0x40e, &(0x7f00000001c0)) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000000)={'erspan0\x00', {0x2, 0x4e22, @loopback}}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$gfs2(&(0x7f0000000180)='gfs2\x00', &(0x7f0000000200)='./bus\x00', 0x0, 0x0, 0x0, 0x10020, &(0x7f0000000340)={[{@data_writeback='data=writeback'}], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) syz_mount_image$nfs(&(0x7f0000000040)='nfs\x00', &(0x7f0000000080)='./bus\x00', 0xfff, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000240)="6acccadd54728fde777152072c59dc76d0098578b859c267ac88ed310e3dc718e78e356bb103d111fea7d4413df84b5f7572ea36978a596098a8e7762c7ee5d4fbbad020692b679f756685d06da6b9dd87bd7081766f", 0x56, 0x9}], 0x40040, &(0x7f0000000140)='.selfbdev%,em1user{em1+\x00') [ 262.950970] block nbd1: Receive control failed (result -107) [ 263.056584] block nbd1: shutting down sockets 04:42:35 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:35 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) 04:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="020300031200000000000a000000380e000000000000000000000000ffffac1e0001000000000000000004000900a000000000000000020d6bfded2342273716fbaa28f7be830000000002000100000800000000000d0000000005000500000000000a00000000000000fe8000000000000000000000000000000000000000000000dd85c10ed21ce87ce1dac792a099f5615ab86ae6a3cff497ac2843cf7bd76b3b7b0f0df6f4e7da00154ef0fdebe86cb37d649b746d2447f6fd497b053e6affffffff00000000c5284a93d631415d3f5a0afbabc83d645b030b649c20cd3d60bd377510e3787142e7e906e94496d0e376681d56bd63e252eae72f07cfc700c10c07348c56d069ba0baf5f6ee3b72df4f71e730b2b1a70c9ced3b24d02b90fd120b7e1cad27f1f0dbc61e4"], 0x12c}}, 0x0) 04:42:35 executing program 5: pipe(&(0x7f0000000300)={0xffffffffffffffff}) lsetxattr$security_evm(&(0x7f0000000140)='./bus\x00', &(0x7f0000000200)='security.evm\x00', &(0x7f00000004c0)=@v1={0x2, "5b342af2fefa54c7f722d53f6af90af8"}, 0x11, 0x2) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) openat$rtc(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rtc\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext={0x7}, 0x0, 0xfffffffffffffffc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf17) unshare(0x40040400) ioctl$SNDRV_TIMER_IOCTL_GINFO(0xffffffffffffffff, 0xc0f85403, 0x0) getsockopt(0xffffffffffffffff, 0x3f, 0x0, 0x0, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="778741f35c670000d500918f8745d5c11fe0a8a4ec52e633dc11b51bce84705d99f76cf4e5c992445df511040b0e91cd05bc21b0770cbfd78373cf1a04d9020641a09392b5b0b076cdabce76eb97e37cb654b8734caf3c", @ANYRES32, @ANYBLOB="d82ccbdd8c7aca71c3458d3b1922550052506468ed7c5ac2ceffe94084390ca7b9d0490b7b0bb308fe6b18cc10e31de396c0617187772c304a3adbed343cd1bed598d77a6824ad542b42e1bc0fd476555aee2efed039aa253d0f2e0c09eaeb74ca8fcd9a65bccbe5950200"], 0x3}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000180), 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xc) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) socket$inet6_sctp(0xa, 0x0, 0x84) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x40d09) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x400001) accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f00000000c0)=0x1, 0x4) 04:42:35 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:35 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x12c}}, 0x0) 04:42:35 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) close(r0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) r1 = fanotify_init(0x0, 0x1000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000001c0)={{{@in6, @in=@initdev}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000100)=0xe8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)={'\x00', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}, {@posixacl='posixacl'}, {@fscache='fscache'}, {@access_client='access=client'}, {@access_user='access=user'}, {@access_uid={'access', 0x3d, r3}}, {@cache_fscache='cache=fscache'}]}}) 04:42:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:35 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000b6dfc8)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB="020300031200000000000a000000380e000000000000000000000000ffffac1e0001000000000000000004000900a000000000000000020d6bfded2342273716fbaa28f7be830000000002000100000800000000000d0000000005000500000000000a00000000000000fe8000000000000000000000000000000000000000000000dd85c10ed21ce87ce1dac792a099f5615ab86ae6a3cff497ac2843cf7bd76b3b7b0f0df6f4e7da00154ef0fdebe86cb37d649b746d2447f6fd497b053e6affffffff00000000c5284a93d631415d3f5a0afbabc83d645b030b649c20cd3d60bd377510e3787142e7e906e94496d0e376681d56bd63e252eae72f07cfc700c10c07348c56d069ba0baf5f6ee3b72df4f71e730b2b1a70c9ced3b24d02b90fd120b7e1cad27f1f0dbc61e4"], 0x12c}}, 0x0) 04:42:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_SET_PROT_MASK(r1, 0x40087705, &(0x7f0000000140)={0xdda, 0x2}) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000000)='.//ile0\x00') getsockname(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$mice(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x1) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="020000000100000000000000040000000000000008000000", @ANYRES32=r3, @ANYRES32=r3, @ANYBLOB="100006000000000020000000000000"], 0x4, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 04:42:35 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:35 executing program 4: sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x2000107, 0x6031, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x63eb, 0x2000000000002) r0 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) fcntl$getflags(r0, 0x408) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCSTI(r2, 0x5412, 0x5) 04:42:36 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0xfcd3) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000480)={0x9, 0x8d}, 0x0) r2 = getpid() r3 = syz_open_procfs(0x0, 0x0) mq_timedsend(r3, 0x0, 0x0, 0x4, &(0x7f0000000540)={0x0, 0x989680}) getsockname$packet(r3, &(0x7f0000000100), &(0x7f0000000140)=0x14) sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000a40)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000), 0x0, &(0x7f0000000140), 0x8) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = getpid() rt_tgsigqueueinfo(r6, r6, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r6, 0x388, 0xfffffffffffffffe) kcmp$KCMP_EPOLL_TFD(r6, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000180)={r4, r1, 0x6}) r7 = socket$inet(0x2, 0x2000080001, 0x84) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) sendmsg(r7, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="24000000520007031dfffd946fa2830081200a0009000300001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000023c0)=[{{&(0x7f00000004c0)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000600)=[{0x0}, {&(0x7f0000002540)=""/178, 0xb2}, {&(0x7f0000000280)=""/41, 0x29}], 0x3, &(0x7f0000000640)=""/106, 0x6a}}, {{&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001fc0)=[{0x0}, {&(0x7f0000002480)=""/170, 0xaa}, {&(0x7f0000001f40)=""/85, 0x55}], 0x3, &(0x7f0000002040)=""/164, 0xa4}, 0x8}], 0x2, 0x10344, 0x0) 04:42:36 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) add_key$keyring(&(0x7f0000000100)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, r3) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000500)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000540)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(0xffffffffffffffff, 0xc040563e, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x20000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmp(0x0, 0x0, 0x261801) syz_open_dev$admmidi(0x0, 0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000200), 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) pipe2(&(0x7f00000006c0)={0xffffffffffffffff}, 0x4000) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r6, 0x84, 0x20, &(0x7f00000000c0)=0x3ffc0000, 0x4) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="72e4aba62137e104543c00"], 0x16) sendfile(r4, r4, 0x0, 0x40fdf) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000008000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 04:42:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:36 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:36 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r0, &(0x7f0000000300), 0x12) 04:42:36 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:36 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) [ 265.290913] syz-executor.0 (7652) used greatest stack depth: 24376 bytes left 04:42:37 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 04:42:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:37 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:37 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:37 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:37 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) pipe2$9p(&(0x7f0000000100), 0x4800) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x2}, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x100000000, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r5) io_setup(0x3d8, &(0x7f00000004c0)) io_submit(0x0, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000140)) socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_procfs(0x0, 0x0) readv(r6, &(0x7f0000000580), 0x3c1) syz_open_procfs(0x0, 0x0) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f00000011c0)=ANY=[@ANYBLOB="1000000017024046ff2e2f66696c65301197f4da5865dab2c0f583a09c0e532068b07b531924829695cfae09dabd0f1d0626073fb0e0cc50166c85d3055ef2518806000000000000001f00bb11d8a4578495a4dfa63608419196ab971fcee27885de23f3651e7ca8795c6b2a506e69f5d0210a1b4bbc92883dfbf976e78c63a072fa4df5258ecf"], 0x2d) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETX(0xffffffffffffffff, 0x5432, &(0x7f00000002c0)) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000002740)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) r8 = socket$inet(0xa, 0x801, 0x84) connect$inet(r8, &(0x7f0000000080)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x50) listen(r8, 0x8) r9 = accept4(r8, 0x0, 0x0, 0x0) close(r9) setsockopt$inet6_opts(r9, 0x29, 0x3b, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000001bbaba7eeb26f8cf46eb4e19b3ce3d45535db62d6800f5000430507b8b30c4792fe443c46706c3cbe774c16f49e9ad1196a94709cab0ed1632734753ed4a454653384b1a250d5abbfed6dac47be88dea55ac33677a325453c038"], 0x1) setsockopt$inet6_opts(r9, 0x29, 0x0, &(0x7f0000001280)=ANY=[], 0x0) sendmmsg(r7, &(0x7f0000007e00), 0x136a88c8311572c, 0x11) 04:42:37 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:38 executing program 4: close(0xffffffffffffffff) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x200048c0, &(0x7f0000000040)={0xa, 0x20004e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000000)='tls\x00', 0xc498ead121f97dd6) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "d44eb8c7308ec7c4", "442065238929350ade91900b51fc9534", "6bdda720", "7ee51430da3f51b3"}, 0x28) sendto$inet6(r0, &(0x7f0000000080)="39a110", 0xffffffffffffffc1, 0x40, 0x0, 0xfffffffffffffe5b) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) semctl$IPC_RMID(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) 04:42:38 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) [ 266.794949] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 04:42:38 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:39 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000001400)=[{&(0x7f0000000400)="f894cf2728ce3d4a83f12a2e7d948e24f6ecf0e894b390d312ced99358c3b4e941c1f35b83097237235c13969f84263af0a5541cc0ba8d2423ae80c547a51896bfc033d364fba1c4bdb4bd169ff14b04fcfd35365a35b40677517d6289c2d7d6bce656da15c67075d96b39483c85e52ede3887bbe1befda91236ec8b0986bda1388ff75aa8b32445f3bb0f9bb8e9401f3bb17787650f4f717e2e04f20c79d3b8bdea9568a053d6fcdf0df624e0046fb89707a56f650a4627ec1f12b632871ec679e61f6a83e41bf5796848aacb30bf8617e62b181d84a96e8e34c74fddfb071ae2e852077e737b8f0ce04b638273755d9624abbfa79642a5278e4921272a3ad61a566283b318f66be573fb7b5f9197d9f87dfa0d8e34a741c391bb4017191426da6bf1ca1f822649b3a594dd61ce306b2764a542c20ab3a4af14784213d05db54c", 0x141, 0xbf}]) bind$pptp(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x2, {0x8, @multicast1}}, 0x1e) 04:42:39 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) [ 267.150931] Dev loop0: unable to read RDB block 1 [ 267.156040] loop0: unable to read partition table [ 267.190384] loop0: partition table beyond EOD, truncated 04:42:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:39 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) [ 267.231839] loop_reread_partitions: partition scan of loop0 () failed (rc=-5) 04:42:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) socket$key(0xf, 0x3, 0x2) 04:42:39 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:39 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:39 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:40 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) 04:42:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:40 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:40 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:40 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:40 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:40 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:41 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, 0x0) setreuid(0x0, r3) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:41 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:41 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:41 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:41 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:41 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0x5) setreuid(0x0, 0x0) write$cgroup_pid(r1, &(0x7f0000000300), 0x12) 04:42:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:41 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:41 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:42 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) 04:42:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:42 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) 04:42:42 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:42 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r2) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000300), 0x12) 04:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, 0x0, 0x0) 04:42:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:43 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, 0x0, 0x0) 04:42:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:43 executing program 3: mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x7a04, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setreuid(0x0, r3) write$cgroup_pid(r1, 0x0, 0x0) 04:42:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:44 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:44 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:44 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:45 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 04:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) 04:42:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:46 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:46 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:46 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:46 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:46 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 04:42:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 04:42:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(0x0, 0x0, 0x0) 04:42:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:49 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:49 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) 04:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000400e0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000060001200726663343130362867636d2861657329290000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000060000000e59b133cc78cecc57debbcd162da13cd1a1514ae"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 04:42:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) 04:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r3, 0x0]) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000680), &(0x7f00000006c0)=0xc) syz_open_procfs(0x0, 0x0) 04:42:50 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:51 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200), &(0x7f0000000240), 0x0) 04:42:51 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) poll(0x0, 0x0, 0xffffffff) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ac1e00010000000000000000000000000800"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x150}, 0x1, 0x0, 0x0, 0x40000}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000240), 0x0) getgroups(0x3, &(0x7f0000000500)=[0xee00, r2, 0x0]) socket$inet_udplite(0x2, 0x2, 0x88) 04:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:51 executing program 2 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:51 executing program 0 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:51 executing program 1 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:51 executing program 4 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 279.415579] FAULT_INJECTION: forcing a failure. [ 279.415579] name failslab, interval 1, probability 0, space 0, times 1 [ 279.417237] FAULT_INJECTION: forcing a failure. [ 279.417237] name failslab, interval 1, probability 0, space 0, times 1 [ 279.440873] FAULT_INJECTION: forcing a failure. [ 279.440873] name failslab, interval 1, probability 0, space 0, times 1 [ 279.456010] CPU: 0 PID: 8746 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 279.463873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.473328] Call Trace: [ 279.476057] dump_stack+0x142/0x197 [ 279.479839] should_fail.cold+0x10f/0x159 [ 279.484179] should_failslab+0xdb/0x130 [ 279.488181] kmem_cache_alloc_node+0x287/0x780 [ 279.492836] ? get_pid_task+0x98/0x140 [ 279.496771] copy_process.part.0+0x17d5/0x6a00 [ 279.501429] ? save_trace+0x290/0x290 [ 279.505262] ? proc_fail_nth_write+0x7d/0x180 [ 279.509848] ? proc_cwd_link+0x1b0/0x1b0 [ 279.513939] ? __f_unlock_pos+0x19/0x20 [ 279.517908] ? find_held_lock+0x35/0x130 [ 279.521974] ? __cleanup_sighand+0x50/0x50 [ 279.526214] ? lock_downgrade+0x740/0x740 [ 279.530362] _do_fork+0x19e/0xce0 [ 279.533816] ? fork_idle+0x280/0x280 [ 279.537561] ? fput+0xd4/0x150 [ 279.540779] ? SyS_write+0x15e/0x230 [ 279.544507] SyS_clone+0x37/0x50 [ 279.547867] ? sys_vfork+0x30/0x30 [ 279.551468] do_syscall_64+0x1e8/0x640 [ 279.555347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.560227] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.565410] RIP: 0033:0x45a639 [ 279.569042] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 279.576765] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 279.584034] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 279.591296] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.598556] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 279.605938] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:51 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x3, 0x44040) write$rfkill(r0, &(0x7f0000000040)={0xffff, 0x6, 0x2, 0x1, 0x1}, 0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f00000000c0)={0xebf, 0xe0, 0x8000000, 0x1, 0xfffffff9, 0x1, 0x40, 0x1, 0x7, 0x3, 0x20, 0x1, 0x6, 0x2, &(0x7f0000000080)=""/5, 0x9, 0x6, 0x2}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) [ 279.613238] CPU: 1 PID: 8744 Comm: syz-executor.2 Not tainted 4.14.156-syzkaller #0 [ 279.621062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.630426] Call Trace: [ 279.633031] dump_stack+0x142/0x197 [ 279.636675] should_fail.cold+0x10f/0x159 [ 279.640864] should_failslab+0xdb/0x130 [ 279.644850] kmem_cache_alloc_node+0x287/0x780 [ 279.649429] ? get_pid_task+0x98/0x140 [ 279.653404] copy_process.part.0+0x17d5/0x6a00 [ 279.657997] ? save_trace+0x290/0x290 [ 279.661810] ? proc_fail_nth_write+0x7d/0x180 04:42:51 executing program 3 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 279.666309] ? proc_cwd_link+0x1b0/0x1b0 [ 279.670368] ? __f_unlock_pos+0x19/0x20 [ 279.674338] ? find_held_lock+0x35/0x130 [ 279.678409] ? __cleanup_sighand+0x50/0x50 [ 279.682652] ? lock_downgrade+0x740/0x740 [ 279.686817] _do_fork+0x19e/0xce0 [ 279.690288] ? fork_idle+0x280/0x280 [ 279.694010] ? fput+0xd4/0x150 [ 279.697213] ? SyS_write+0x15e/0x230 [ 279.700939] SyS_clone+0x37/0x50 [ 279.704313] ? sys_vfork+0x30/0x30 [ 279.707869] do_syscall_64+0x1e8/0x640 [ 279.711765] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.716613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.721801] RIP: 0033:0x45a639 [ 279.723512] FAULT_INJECTION: forcing a failure. [ 279.723512] name failslab, interval 1, probability 0, space 0, times 1 [ 279.724987] RSP: 002b:00007f90fec93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 279.725000] RAX: ffffffffffffffda RBX: 00007f90fec93c90 RCX: 000000000045a639 [ 279.725006] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 279.725012] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 279.725018] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90fec946d4 [ 279.725025] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 279.736570] CPU: 0 PID: 8745 Comm: syz-executor.1 Not tainted 4.14.156-syzkaller #0 [ 279.758738] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.758744] Call Trace: [ 279.758762] dump_stack+0x142/0x197 [ 279.758786] should_fail.cold+0x10f/0x159 [ 279.758807] should_failslab+0xdb/0x130 [ 279.812002] kmem_cache_alloc+0x2d7/0x780 [ 279.816142] ? lock_downgrade+0x740/0x740 [ 279.820290] getname_flags+0xcb/0x580 [ 279.824083] getname+0x1a/0x20 [ 279.827267] do_sys_open+0x1e7/0x430 [ 279.830974] ? filp_open+0x70/0x70 [ 279.834521] SyS_open+0x2d/0x40 [ 279.837802] ? do_sys_open+0x430/0x430 [ 279.841715] do_syscall_64+0x1e8/0x640 [ 279.845591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 279.850431] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 279.855608] RIP: 0033:0x4143d1 [ 279.858799] RSP: 002b:00007f04433c67a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 279.866500] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004143d1 [ 279.873758] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f04433c6850 [ 279.881104] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 279.888362] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f04433c76d4 [ 279.895631] R13: 00000000004ca4f8 R14: 00000000004e2568 R15: 0000000000000004 [ 279.903262] audit: type=1800 audit(1574656971.710:46): pid=8754 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="collect_data" cause="failed(directio)" comm="syz-executor.4" name="vcs3" dev="sda1" ino=16730 res=0 [ 279.926342] CPU: 0 PID: 8753 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 279.934177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.943709] Call Trace: [ 279.946301] dump_stack+0x142/0x197 [ 279.949937] should_fail.cold+0x10f/0x159 [ 279.954082] should_failslab+0xdb/0x130 [ 279.958061] kmem_cache_alloc_node+0x287/0x780 [ 279.962634] ? get_pid_task+0x98/0x140 [ 279.966525] copy_process.part.0+0x17d5/0x6a00 [ 279.971107] ? save_trace+0x290/0x290 [ 279.974909] ? proc_fail_nth_write+0x7d/0x180 [ 279.979394] ? proc_cwd_link+0x1b0/0x1b0 [ 279.983446] ? __f_unlock_pos+0x19/0x20 [ 279.987409] ? find_held_lock+0x35/0x130 [ 279.991480] ? __cleanup_sighand+0x50/0x50 [ 279.995702] ? lock_downgrade+0x740/0x740 [ 279.999847] _do_fork+0x19e/0xce0 [ 280.003293] ? fork_idle+0x280/0x280 [ 280.006999] ? fput+0xd4/0x150 [ 280.010180] ? SyS_write+0x15e/0x230 [ 280.013888] SyS_clone+0x37/0x50 [ 280.017242] ? sys_vfork+0x30/0x30 [ 280.020775] do_syscall_64+0x1e8/0x640 [ 280.024652] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.029492] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.034687] RIP: 0033:0x45a639 [ 280.037865] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.045565] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 280.052847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 280.060123] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:42:52 executing program 2 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 280.067405] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 280.074683] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:52 executing program 0 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:52 executing program 3 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 280.151643] FAULT_INJECTION: forcing a failure. [ 280.151643] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 280.164818] CPU: 1 PID: 8760 Comm: syz-executor.2 Not tainted 4.14.156-syzkaller #0 [ 280.172627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.181991] Call Trace: [ 280.184601] dump_stack+0x142/0x197 [ 280.185465] FAULT_INJECTION: forcing a failure. [ 280.185465] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 280.188246] should_fail.cold+0x10f/0x159 [ 280.188341] __alloc_pages_nodemask+0x1d6/0x7a0 [ 280.188378] ? fs_reclaim_acquire+0x20/0x20 [ 280.213307] ? __alloc_pages_slowpath+0x2930/0x2930 [ 280.218326] cache_grow_begin+0x80/0x400 [ 280.222387] kmem_cache_alloc_node+0x6a4/0x780 [ 280.226967] ? get_pid_task+0x98/0x140 [ 280.230854] copy_process.part.0+0x17d5/0x6a00 [ 280.235431] ? save_trace+0x290/0x290 [ 280.239236] ? proc_fail_nth_write+0x7d/0x180 [ 280.243758] ? proc_cwd_link+0x1b0/0x1b0 [ 280.247831] ? __f_unlock_pos+0x19/0x20 [ 280.251797] ? find_held_lock+0x35/0x130 [ 280.255856] ? __cleanup_sighand+0x50/0x50 [ 280.260093] ? lock_downgrade+0x740/0x740 [ 280.264249] _do_fork+0x19e/0xce0 [ 280.267711] ? fork_idle+0x280/0x280 [ 280.271435] ? fput+0xd4/0x150 [ 280.274639] ? SyS_write+0x15e/0x230 [ 280.278345] SyS_clone+0x37/0x50 [ 280.281699] ? sys_vfork+0x30/0x30 [ 280.285268] do_syscall_64+0x1e8/0x640 [ 280.289146] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.293988] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.293997] RIP: 0033:0x45a639 04:42:52 executing program 5 (fault-call:1 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:52 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x101000, 0x0) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) fcntl$setflags(r0, 0x2, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:52 executing program 1 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:52 executing program 2 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 280.294001] RSP: 002b:00007f90fec93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.294012] RAX: ffffffffffffffda RBX: 00007f90fec93c90 RCX: 000000000045a639 [ 280.294016] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 280.294021] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.294026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90fec946d4 [ 280.294032] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 280.347365] FAULT_INJECTION: forcing a failure. [ 280.347365] name failslab, interval 1, probability 0, space 0, times 0 [ 280.354740] CPU: 0 PID: 8764 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 280.366404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.373020] FAULT_INJECTION: forcing a failure. [ 280.373020] name failslab, interval 1, probability 0, space 0, times 0 [ 280.375775] Call Trace: [ 280.375801] dump_stack+0x142/0x197 [ 280.375827] should_fail.cold+0x10f/0x159 [ 280.375916] ? __might_sleep+0x93/0xb0 [ 280.388870] FAULT_INJECTION: forcing a failure. [ 280.388870] name failslab, interval 1, probability 0, space 0, times 0 [ 280.389658] __alloc_pages_nodemask+0x1d6/0x7a0 [ 280.389680] ? __alloc_pages_slowpath+0x2930/0x2930 [ 280.389793] ? rcu_read_lock_sched_held+0x110/0x130 [ 280.427237] copy_process.part.0+0x26a/0x6a00 [ 280.431753] ? save_trace+0x290/0x290 [ 280.435565] ? proc_fail_nth_write+0x7d/0x180 [ 280.440062] ? proc_cwd_link+0x1b0/0x1b0 [ 280.444138] ? __f_unlock_pos+0x19/0x20 [ 280.448116] ? find_held_lock+0x35/0x130 [ 280.452271] ? __cleanup_sighand+0x50/0x50 [ 280.456501] ? lock_downgrade+0x740/0x740 [ 280.460660] _do_fork+0x19e/0xce0 [ 280.464135] ? fork_idle+0x280/0x280 [ 280.467942] ? fput+0xd4/0x150 [ 280.471128] ? SyS_write+0x15e/0x230 [ 280.475016] SyS_clone+0x37/0x50 [ 280.478380] ? sys_vfork+0x30/0x30 [ 280.481919] do_syscall_64+0x1e8/0x640 [ 280.485802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.490655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.495847] RIP: 0033:0x45a639 [ 280.499206] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.506909] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 280.514170] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 280.521435] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.528710] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 280.535981] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 280.543346] CPU: 1 PID: 8771 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 04:42:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) [ 280.551162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.560539] Call Trace: [ 280.563145] dump_stack+0x142/0x197 [ 280.566978] should_fail.cold+0x10f/0x159 [ 280.571146] should_failslab+0xdb/0x130 [ 280.571162] kmem_cache_alloc_node+0x287/0x780 [ 280.571173] ? get_pid_task+0x98/0x140 [ 280.571201] copy_process.part.0+0x17d5/0x6a00 [ 280.571226] ? save_trace+0x290/0x290 [ 280.588250] ? proc_fail_nth_write+0x7d/0x180 [ 280.588264] ? proc_cwd_link+0x1b0/0x1b0 [ 280.588278] ? __f_unlock_pos+0x19/0x20 [ 280.600621] ? find_held_lock+0x35/0x130 [ 280.600649] ? __cleanup_sighand+0x50/0x50 [ 280.600662] ? lock_downgrade+0x740/0x740 [ 280.600687] _do_fork+0x19e/0xce0 [ 280.600706] ? fork_idle+0x280/0x280 [ 280.600725] ? fput+0xd4/0x150 [ 280.600740] ? SyS_write+0x15e/0x230 [ 280.600761] SyS_clone+0x37/0x50 [ 280.600770] ? sys_vfork+0x30/0x30 [ 280.600789] do_syscall_64+0x1e8/0x640 [ 280.600801] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.600826] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.600837] RIP: 0033:0x45a639 [ 280.627570] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 280.627588] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 280.627596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 280.627603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 280.627612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 280.655347] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 280.658118] CPU: 1 PID: 8773 Comm: syz-executor.1 Not tainted 4.14.156-syzkaller #0 [ 280.707460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.716826] Call Trace: [ 280.719431] dump_stack+0x142/0x197 [ 280.723079] should_fail.cold+0x10f/0x159 [ 280.724909] FAULT_INJECTION: forcing a failure. [ 280.724909] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 280.727233] should_failslab+0xdb/0x130 [ 280.727245] kmem_cache_alloc+0x2d7/0x780 [ 280.727255] ? save_stack+0xa9/0xd0 [ 280.727271] get_empty_filp+0x8c/0x3f0 [ 280.754648] path_openat+0x8f/0x3f70 [ 280.758353] ? get_pid_task+0x98/0x140 [ 280.762249] ? path_lookupat.isra.0+0x7b0/0x7b0 [ 280.766998] ? save_trace+0x290/0x290 [ 280.770786] ? __alloc_fd+0x1d4/0x4a0 [ 280.774583] do_filp_open+0x18e/0x250 [ 280.778377] ? may_open_dev+0xe0/0xe0 [ 280.782184] ? lock_downgrade+0x740/0x740 [ 280.786327] ? do_raw_spin_unlock+0x16b/0x260 [ 280.790809] ? _raw_spin_unlock+0x2d/0x50 [ 280.794950] ? __alloc_fd+0x1d4/0x4a0 [ 280.798744] do_sys_open+0x2c5/0x430 [ 280.802461] ? filp_open+0x70/0x70 [ 280.806001] SyS_open+0x2d/0x40 [ 280.809264] ? do_sys_open+0x430/0x430 [ 280.813139] do_syscall_64+0x1e8/0x640 [ 280.817008] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 280.821853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 280.827036] RIP: 0033:0x4143d1 [ 280.830227] RSP: 002b:00007f04433c67a0 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 280.837932] RAX: ffffffffffffffda RBX: 6666666666666667 RCX: 00000000004143d1 [ 280.845195] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f04433c6850 [ 280.852450] RBP: 000000000075bf20 R08: 000000000000000f R09: 0000000000000000 [ 280.859710] R10: 0000000000000064 R11: 0000000000000293 R12: 00007f04433c76d4 [ 280.866968] R13: 00000000004ca4f8 R14: 00000000004e2568 R15: 0000000000000004 [ 280.885565] CPU: 1 PID: 8767 Comm: syz-executor.2 Not tainted 4.14.156-syzkaller #0 [ 280.893404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.902762] Call Trace: 04:42:52 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.\az0\x8c', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x87a1c, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r2) prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b) r3 = open(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x218200, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) write$FUSE_LSEEK(r4, &(0x7f00000002c0)={0x18, 0x0, 0x7, {0x200}}, 0x18) fchmod(r3, 0x6741576111f67cdd) getsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r5, 0xc080661a, &(0x7f0000000140)={{0x2, 0x0, @reserved="3f08bbeac91f959d68933929b8bf9acb22f8764cbaa5a269d70d5a8c2686d6b6"}}) r6 = dup2(r3, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$bt_rfcomm_RFCOMM_LM(r8, 0x12, 0x3, &(0x7f0000000240)=0xa, 0x4) setsockopt$bt_l2cap_L2CAP_OPTIONS(r6, 0x6, 0x1, &(0x7f0000000000)={0x200, 0x0, 0xe0aa, 0x3, 0xfc, 0xff, 0x3}, 0xc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 280.905354] dump_stack+0x142/0x197 [ 280.908993] should_fail.cold+0x10f/0x159 [ 280.913160] should_failslab+0xdb/0x130 [ 280.917145] kmem_cache_alloc+0x2d7/0x780 [ 280.921291] ? creds_are_invalid+0x48/0x110 [ 280.925620] ? __validate_process_creds+0x14c/0x200 [ 280.930624] prepare_creds+0x3e/0x380 [ 280.934411] copy_creds+0x7b/0x4f0 [ 280.937946] ? lockdep_init_map+0x9/0x10 [ 280.942004] copy_process.part.0+0x868/0x6a00 [ 280.946497] ? save_trace+0x290/0x290 [ 280.950289] ? proc_fail_nth_write+0x7d/0x180 [ 280.954788] ? proc_cwd_link+0x1b0/0x1b0 [ 280.958854] ? __f_unlock_pos+0x19/0x20 [ 280.963011] ? __cleanup_sighand+0x50/0x50 [ 280.967257] ? lock_downgrade+0x740/0x740 [ 280.971396] _do_fork+0x19e/0xce0 [ 280.974841] ? fork_idle+0x280/0x280 [ 280.978548] ? fput+0xd4/0x150 [ 280.981734] ? SyS_write+0x15e/0x230 [ 280.985444] SyS_clone+0x37/0x50 [ 280.988794] ? sys_vfork+0x30/0x30 [ 280.992322] do_syscall_64+0x1e8/0x640 [ 280.996196] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.001044] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.006230] RIP: 0033:0x45a639 [ 281.009404] RSP: 002b:00007f90fec93c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 281.017137] RAX: ffffffffffffffda RBX: 00007f90fec93c90 RCX: 000000000045a639 [ 281.024414] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 281.031682] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 281.038941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f90fec946d4 [ 281.046739] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 281.054015] CPU: 0 PID: 8780 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 281.061840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.071182] Call Trace: [ 281.073771] dump_stack+0x142/0x197 [ 281.077387] should_fail.cold+0x10f/0x159 [ 281.081517] ? __might_sleep+0x93/0xb0 [ 281.085392] __alloc_pages_nodemask+0x1d6/0x7a0 [ 281.090046] ? __alloc_pages_slowpath+0x2930/0x2930 [ 281.095046] ? rcu_read_lock_sched_held+0x110/0x130 [ 281.100055] copy_process.part.0+0x26a/0x6a00 [ 281.104541] ? save_trace+0x290/0x290 [ 281.108354] ? proc_fail_nth_write+0x7d/0x180 [ 281.112864] ? proc_cwd_link+0x1b0/0x1b0 [ 281.116926] ? __f_unlock_pos+0x19/0x20 [ 281.120903] ? find_held_lock+0x35/0x130 [ 281.124982] ? __cleanup_sighand+0x50/0x50 [ 281.129216] ? lock_downgrade+0x740/0x740 [ 281.133369] _do_fork+0x19e/0xce0 [ 281.136827] ? fork_idle+0x280/0x280 [ 281.141222] ? fput+0xd4/0x150 [ 281.144398] ? SyS_write+0x15e/0x230 [ 281.148098] SyS_clone+0x37/0x50 [ 281.151449] ? sys_vfork+0x30/0x30 [ 281.154974] do_syscall_64+0x1e8/0x640 [ 281.158841] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.163674] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.168856] RIP: 0033:0x45a639 [ 281.172030] RSP: 002b:00007fda5d330c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 281.179725] RAX: ffffffffffffffda RBX: 00007fda5d330c90 RCX: 000000000045a639 [ 281.186982] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 281.194235] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 04:42:53 executing program 0 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 281.201489] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3316d4 [ 281.208741] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000003 [ 281.248956] FAULT_INJECTION: forcing a failure. [ 281.248956] name failslab, interval 1, probability 0, space 0, times 0 [ 281.284316] CPU: 1 PID: 8793 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 04:42:53 executing program 3 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 281.292167] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.301526] Call Trace: [ 281.301546] dump_stack+0x142/0x197 [ 281.301566] should_fail.cold+0x10f/0x159 [ 281.307770] should_failslab+0xdb/0x130 [ 281.316665] kmem_cache_alloc+0x2d7/0x780 [ 281.320865] ? creds_are_invalid+0x48/0x110 [ 281.325202] ? __validate_process_creds+0x14c/0x200 [ 281.330234] prepare_creds+0x3e/0x380 [ 281.334041] copy_creds+0x7b/0x4f0 [ 281.337589] ? lockdep_init_map+0x9/0x10 [ 281.341681] copy_process.part.0+0x868/0x6a00 04:42:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x1132}) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$bt_hci(r1, 0x0, 0x1, &(0x7f0000000080)=""/57, &(0x7f00000000c0)=0x39) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffff36) openat$tun(0xffffffffffffff9c, &(0x7f0000000780)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 281.346199] ? save_trace+0x290/0x290 [ 281.350015] ? proc_fail_nth_write+0x7d/0x180 [ 281.354525] ? proc_cwd_link+0x1b0/0x1b0 [ 281.358592] ? __f_unlock_pos+0x19/0x20 [ 281.362700] ? __cleanup_sighand+0x50/0x50 [ 281.366950] ? lock_downgrade+0x740/0x740 [ 281.371109] _do_fork+0x19e/0xce0 [ 281.371125] ? fork_idle+0x280/0x280 [ 281.371140] ? fput+0xd4/0x150 [ 281.371151] ? SyS_write+0x15e/0x230 [ 281.371163] SyS_clone+0x37/0x50 [ 281.371170] ? sys_vfork+0x30/0x30 [ 281.371184] do_syscall_64+0x1e8/0x640 [ 281.371192] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.371209] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.371217] RIP: 0033:0x45a639 [ 281.371223] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 281.371235] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 281.371241] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 281.371247] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 281.371253] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 281.371259] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 281.392014] FAULT_INJECTION: forcing a failure. [ 281.392014] name failslab, interval 1, probability 0, space 0, times 0 [ 281.407524] CPU: 1 PID: 8802 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 281.417732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.417737] Call Trace: [ 281.417756] dump_stack+0x142/0x197 [ 281.417776] should_fail.cold+0x10f/0x159 [ 281.417792] should_failslab+0xdb/0x130 [ 281.439957] kmem_cache_alloc+0x2d7/0x780 [ 281.439971] ? creds_are_invalid+0x48/0x110 [ 281.439983] ? __validate_process_creds+0x14c/0x200 [ 281.439995] prepare_creds+0x3e/0x380 [ 281.440010] copy_creds+0x7b/0x4f0 [ 281.454555] ? lockdep_init_map+0x9/0x10 [ 281.483126] copy_process.part.0+0x868/0x6a00 [ 281.483149] ? save_trace+0x290/0x290 [ 281.483161] ? proc_fail_nth_write+0x7d/0x180 [ 281.483171] ? proc_cwd_link+0x1b0/0x1b0 [ 281.483183] ? __f_unlock_pos+0x19/0x20 [ 281.483199] ? __cleanup_sighand+0x50/0x50 [ 281.483214] ? lock_downgrade+0x740/0x740 [ 281.483230] _do_fork+0x19e/0xce0 [ 281.483243] ? fork_idle+0x280/0x280 [ 281.483254] ? fput+0xd4/0x150 [ 281.483266] ? SyS_write+0x15e/0x230 [ 281.483280] SyS_clone+0x37/0x50 [ 281.483286] ? sys_vfork+0x30/0x30 [ 281.483299] do_syscall_64+0x1e8/0x640 [ 281.489506] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.489528] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.489537] RIP: 0033:0x45a639 [ 281.489543] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:42:53 executing program 5 (fault-call:1 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:53 executing program 3 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:53 executing program 0 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x65ee1592bab6b842}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 281.489554] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 281.489562] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 281.501814] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 281.501820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 281.501826] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SIOCRSACCEPT(r1, 0x89e3) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = eventfd(0x10000) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_FEATURES(r4, 0x4008af00, &(0x7f0000000000)=0x100000000) sync_file_range(r2, 0xc6a, 0x80, 0x4) [ 281.668007] FAULT_INJECTION: forcing a failure. [ 281.668007] name failslab, interval 1, probability 0, space 0, times 0 [ 281.686058] FAULT_INJECTION: forcing a failure. [ 281.686058] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 281.688816] CPU: 1 PID: 8813 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 281.705726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.715351] Call Trace: [ 281.717954] dump_stack+0x142/0x197 [ 281.721596] should_fail.cold+0x10f/0x159 [ 281.725751] should_failslab+0xdb/0x130 [ 281.729733] __kmalloc_track_caller+0x2ec/0x790 [ 281.734459] ? check_preemption_disabled+0x3c/0x250 [ 281.739484] ? prepare_creds+0x3e/0x380 [ 281.743572] ? selinux_cred_prepare+0x49/0xb0 [ 281.748130] kmemdup+0x27/0x60 [ 281.751331] selinux_cred_prepare+0x49/0xb0 [ 281.755703] security_prepare_creds+0x7d/0xb0 [ 281.760220] prepare_creds+0x2cf/0x380 [ 281.764107] copy_creds+0x7b/0x4f0 04:42:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0xfffffffffffffcb1, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x1, 0x8) [ 281.767653] ? lockdep_init_map+0x9/0x10 [ 281.771722] copy_process.part.0+0x868/0x6a00 [ 281.776230] ? save_trace+0x290/0x290 [ 281.780041] ? proc_fail_nth_write+0x7d/0x180 [ 281.784537] ? proc_cwd_link+0x1b0/0x1b0 [ 281.788600] ? __f_unlock_pos+0x19/0x20 [ 281.792579] ? __cleanup_sighand+0x50/0x50 [ 281.796815] ? lock_downgrade+0x740/0x740 [ 281.800976] _do_fork+0x19e/0xce0 [ 281.804433] ? fork_idle+0x280/0x280 [ 281.808138] ? fput+0xd4/0x150 [ 281.810723] FAULT_INJECTION: forcing a failure. [ 281.810723] name failslab, interval 1, probability 0, space 0, times 0 [ 281.811323] ? SyS_write+0x15e/0x230 [ 281.811339] SyS_clone+0x37/0x50 [ 281.811348] ? sys_vfork+0x30/0x30 [ 281.811363] do_syscall_64+0x1e8/0x640 [ 281.811372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.811393] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.811406] RIP: 0033:0x45a639 [ 281.850259] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 281.857981] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 281.865260] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 281.865267] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 281.865272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 281.865278] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 281.882786] CPU: 0 PID: 8815 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 281.894421] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.894429] Call Trace: [ 281.894449] dump_stack+0x142/0x197 [ 281.894472] should_fail.cold+0x10f/0x159 [ 281.894485] ? __might_sleep+0x93/0xb0 [ 281.894504] __alloc_pages_nodemask+0x1d6/0x7a0 [ 281.911652] ? __alloc_pages_slowpath+0x2930/0x2930 [ 281.911665] ? rcu_read_lock_sched_held+0x110/0x130 [ 281.911697] copy_process.part.0+0x26a/0x6a00 [ 281.917906] ? save_trace+0x290/0x290 [ 281.925928] ? proc_fail_nth_write+0x7d/0x180 [ 281.935589] ? proc_cwd_link+0x1b0/0x1b0 [ 281.945159] ? __f_unlock_pos+0x19/0x20 [ 281.953533] ? find_held_lock+0x35/0x130 [ 281.953557] ? __cleanup_sighand+0x50/0x50 [ 281.953570] ? lock_downgrade+0x740/0x740 [ 281.961844] _do_fork+0x19e/0xce0 [ 281.961863] ? fork_idle+0x280/0x280 [ 281.961883] ? fput+0xd4/0x150 [ 281.970147] ? SyS_write+0x15e/0x230 [ 281.970176] SyS_clone+0x37/0x50 [ 281.977755] ? sys_vfork+0x30/0x30 [ 281.984636] do_syscall_64+0x1e8/0x640 [ 281.991677] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 281.991705] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 281.999267] RIP: 0033:0x45a639 04:42:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) uselib(&(0x7f0000000000)='./file0\x00') 04:42:54 executing program 5 (fault-call:1 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.009260] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.020170] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 282.027454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 282.027463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.042193] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 282.049488] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:54 executing program 3 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.091056] CPU: 1 PID: 8814 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 282.098898] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.106640] FAULT_INJECTION: forcing a failure. [ 282.106640] name failslab, interval 1, probability 0, space 0, times 0 [ 282.108254] Call Trace: [ 282.108274] dump_stack+0x142/0x197 [ 282.108295] should_fail.cold+0x10f/0x159 [ 282.108315] should_failslab+0xdb/0x130 [ 282.108331] kmem_cache_alloc+0x2d7/0x780 [ 282.137984] ? creds_are_invalid+0x48/0x110 [ 282.142310] ? __validate_process_creds+0x14c/0x200 [ 282.147328] prepare_creds+0x3e/0x380 [ 282.151143] copy_creds+0x7b/0x4f0 [ 282.154694] ? lockdep_init_map+0x9/0x10 [ 282.158769] copy_process.part.0+0x868/0x6a00 [ 282.163061] FAULT_INJECTION: forcing a failure. [ 282.163061] name failslab, interval 1, probability 0, space 0, times 0 [ 282.165892] ? save_trace+0x290/0x290 [ 282.165905] ? proc_fail_nth_write+0x7d/0x180 [ 282.165916] ? proc_cwd_link+0x1b0/0x1b0 04:42:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)=ANY=[@ANYBLOB="8ce90000160000408d8c80810e0dff070000000000000102870a0701080b"]) [ 282.165929] ? __f_unlock_pos+0x19/0x20 [ 282.165951] ? __cleanup_sighand+0x50/0x50 [ 282.165962] ? lock_downgrade+0x740/0x740 [ 282.165979] _do_fork+0x19e/0xce0 [ 282.205290] ? fork_idle+0x280/0x280 [ 282.209014] ? fput+0xd4/0x150 [ 282.212232] ? SyS_write+0x15e/0x230 [ 282.215941] SyS_clone+0x37/0x50 [ 282.219304] ? sys_vfork+0x30/0x30 [ 282.222864] do_syscall_64+0x1e8/0x640 [ 282.226767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.231607] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.236794] RIP: 0033:0x45a639 [ 282.239974] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.247676] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 282.254951] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 282.262228] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.269494] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 282.276773] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 282.284066] CPU: 0 PID: 8837 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 282.291880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.291887] Call Trace: [ 282.291906] dump_stack+0x142/0x197 [ 282.291931] should_fail.cold+0x10f/0x159 [ 282.311728] should_failslab+0xdb/0x130 [ 282.315714] kmem_cache_alloc+0x2d7/0x780 [ 282.319876] ? creds_are_invalid+0x48/0x110 [ 282.324210] ? selinux_is_enabled+0x9/0x50 [ 282.328461] ? creds_are_invalid+0x48/0x110 [ 282.332901] __delayacct_tsk_init+0x20/0x80 [ 282.337265] copy_process.part.0+0x1a6c/0x6a00 [ 282.341893] ? save_trace+0x290/0x290 [ 282.345714] ? proc_fail_nth_write+0x7d/0x180 [ 282.350234] ? proc_cwd_link+0x1b0/0x1b0 [ 282.354308] ? __f_unlock_pos+0x19/0x20 [ 282.358494] ? __cleanup_sighand+0x50/0x50 [ 282.362756] ? lock_downgrade+0x740/0x740 [ 282.366932] _do_fork+0x19e/0xce0 [ 282.370406] ? fork_idle+0x280/0x280 [ 282.374128] ? fput+0xd4/0x150 [ 282.377361] ? SyS_write+0x15e/0x230 [ 282.381072] SyS_clone+0x37/0x50 [ 282.384424] ? sys_vfork+0x30/0x30 [ 282.387959] do_syscall_64+0x1e8/0x640 [ 282.391834] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.396683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.401861] RIP: 0033:0x45a639 [ 282.405038] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.412750] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 282.420026] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 282.427304] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.434570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 282.441833] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 282.449135] CPU: 1 PID: 8834 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 282.456958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.466334] Call Trace: [ 282.468929] dump_stack+0x142/0x197 [ 282.472553] should_fail.cold+0x10f/0x159 [ 282.476696] should_failslab+0xdb/0x130 [ 282.480657] kmem_cache_alloc+0x2d7/0x780 [ 282.484807] ? creds_are_invalid+0x48/0x110 [ 282.489129] ? __validate_process_creds+0x14c/0x200 [ 282.494137] prepare_creds+0x3e/0x380 [ 282.497947] copy_creds+0x7b/0x4f0 [ 282.501478] ? lockdep_init_map+0x9/0x10 [ 282.505530] copy_process.part.0+0x868/0x6a00 [ 282.510032] ? save_trace+0x290/0x290 [ 282.513825] ? proc_fail_nth_write+0x7d/0x180 [ 282.518320] ? proc_cwd_link+0x1b0/0x1b0 [ 282.522380] ? __f_unlock_pos+0x19/0x20 [ 282.526357] ? __cleanup_sighand+0x50/0x50 [ 282.530584] ? lock_downgrade+0x740/0x740 [ 282.534727] _do_fork+0x19e/0xce0 [ 282.538172] ? fork_idle+0x280/0x280 [ 282.541878] ? fput+0xd4/0x150 [ 282.546123] ? SyS_write+0x15e/0x230 [ 282.549841] SyS_clone+0x37/0x50 [ 282.553196] ? sys_vfork+0x30/0x30 [ 282.556825] do_syscall_64+0x1e8/0x640 [ 282.560704] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.565630] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 282.570810] RIP: 0033:0x45a639 [ 282.573989] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.581691] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 04:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000000)={0x5, 0x9, 0x800, 0x4, 0x9, 0x800}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000000c0)=0x8) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000080)={0x0, 0x200}) 04:42:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) ioctl$SIOCRSACCEPT(r1, 0x89e3) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSSERIAL(0xffffffffffffffff, 0x541f, &(0x7f0000000040)={0x26, 0x101, 0x6, 0x3b, 0x7, 0x200, 0x8, 0x1ff, 0x9, 0x3f, 0xdb, 0x221, 0x2, 0x4, &(0x7f0000000000)=""/39, 0x2, 0xfffffffd, 0x7f}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.588970] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 282.596226] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.603483] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 282.610739] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:54 executing program 3 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.716796] FAULT_INJECTION: forcing a failure. [ 282.716796] name failslab, interval 1, probability 0, space 0, times 0 [ 282.748335] CPU: 0 PID: 8864 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 282.756224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.765606] Call Trace: [ 282.768221] dump_stack+0x142/0x197 [ 282.771893] should_fail.cold+0x10f/0x159 [ 282.776075] should_failslab+0xdb/0x130 [ 282.780072] kmem_cache_alloc+0x2d7/0x780 [ 282.784300] ? trace_hardirqs_on_caller+0x400/0x590 [ 282.789321] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 282.794417] dup_fd+0x85/0xa40 [ 282.797826] ? refcount_inc_not_zero+0x88/0xe0 [ 282.802400] ? refcount_inc+0x1f/0x40 [ 282.806207] copy_process.part.0+0x1b5a/0x6a00 [ 282.810784] ? save_trace+0x290/0x290 [ 282.814576] ? proc_fail_nth_write+0x7d/0x180 [ 282.819068] ? proc_cwd_link+0x1b0/0x1b0 [ 282.823126] ? __cleanup_sighand+0x50/0x50 [ 282.827348] ? lock_downgrade+0x740/0x740 [ 282.831488] _do_fork+0x19e/0xce0 [ 282.835034] ? fork_idle+0x280/0x280 [ 282.838747] ? fput+0xd4/0x150 [ 282.841939] ? SyS_write+0x15e/0x230 [ 282.845652] SyS_clone+0x37/0x50 [ 282.849002] ? sys_vfork+0x30/0x30 [ 282.852531] do_syscall_64+0x1e8/0x640 [ 282.856406] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 282.861250] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:42:54 executing program 0 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/llc\x00') clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r1, 0xc0385720, &(0x7f0000000000)={0x1, {0x0, 0x989680}, 0x1, 0x1}) 04:42:54 executing program 1: perf_event_open(&(0x7f000001d000)={0xd92cab26a3159ae0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6962f475712538e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:54 executing program 5 (fault-call:1 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.866426] RIP: 0033:0x45a639 [ 282.869601] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 282.877297] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 282.884559] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 282.891842] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 282.899098] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 282.906355] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x8042, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0x5) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f0000000040)=0x1f, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000100)) 04:42:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.940222] FAULT_INJECTION: forcing a failure. [ 282.940222] name failslab, interval 1, probability 0, space 0, times 0 04:42:54 executing program 3 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 282.995346] FAULT_INJECTION: forcing a failure. [ 282.995346] name failslab, interval 1, probability 0, space 0, times 0 [ 283.022780] CPU: 0 PID: 8872 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 283.030662] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.040133] Call Trace: [ 283.042745] dump_stack+0x142/0x197 [ 283.046413] should_fail.cold+0x10f/0x159 [ 283.050594] should_failslab+0xdb/0x130 [ 283.054599] __kmalloc_track_caller+0x2ec/0x790 [ 283.059285] ? check_preemption_disabled+0x3c/0x250 [ 283.064333] ? prepare_creds+0x3e/0x380 [ 283.068331] ? selinux_cred_prepare+0x49/0xb0 [ 283.072858] kmemdup+0x27/0x60 [ 283.076072] selinux_cred_prepare+0x49/0xb0 [ 283.080413] security_prepare_creds+0x7d/0xb0 [ 283.084931] prepare_creds+0x2cf/0x380 [ 283.088839] copy_creds+0x7b/0x4f0 [ 283.092388] ? lockdep_init_map+0x9/0x10 [ 283.096473] copy_process.part.0+0x868/0x6a00 [ 283.101010] ? save_trace+0x290/0x290 [ 283.104827] ? proc_fail_nth_write+0x7d/0x180 [ 283.109340] ? proc_cwd_link+0x1b0/0x1b0 [ 283.113421] ? __f_unlock_pos+0x19/0x20 [ 283.117437] ? __cleanup_sighand+0x50/0x50 [ 283.121703] ? lock_downgrade+0x740/0x740 [ 283.125894] _do_fork+0x19e/0xce0 [ 283.129387] ? fork_idle+0x280/0x280 [ 283.133137] ? fput+0xd4/0x150 [ 283.136381] ? SyS_write+0x15e/0x230 [ 283.140138] SyS_clone+0x37/0x50 [ 283.143525] ? sys_vfork+0x30/0x30 [ 283.147096] do_syscall_64+0x1e8/0x640 [ 283.151018] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.155901] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.161131] RIP: 0033:0x45a639 [ 283.164348] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.172085] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 283.179380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 283.186699] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x480080, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000080)={[0x801, 0x100000001, 0x1, 0x5, 0x1ff, 0x6, 0x1bd49be9, 0x100, 0x8, 0xa1, 0xcb, 0xb11a, 0x0, 0x1f, 0x6, 0x8], 0x1200b, 0x20800}) sendto(r1, &(0x7f0000000040)="71b6c1e960b7798a6958687f5736815aaaac3bd6e5281f7f85823a09041f69ba6388d5d352bdd85772d4d6303628a9dfa1f90593560e38", 0x37, 0x40, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0xc0000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xa, 0x8, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffc}, @map_val={0x18, 0x0, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8}, @call={0x85, 0x0, 0x0, 0x59}, @call={0x85, 0x0, 0x0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x83b}], &(0x7f0000000080)='GPL\x00', 0x7fffffff, 0x92, &(0x7f00000000c0)=""/146, 0x100, 0xaf423035762a7d51, [], 0x0, 0xc, r4, 0x8, &(0x7f0000000180)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000001c0)={0x4, 0x8, 0x7, 0x4}, 0x10}, 0x70) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000280)={r0, r5, 0x1e, 0x3}, 0x10) 04:42:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:55 executing program 2: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 283.193995] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 283.201310] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 283.217118] CPU: 0 PID: 8881 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 283.224984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.227743] FAULT_INJECTION: forcing a failure. [ 283.227743] name failslab, interval 1, probability 0, space 0, times 0 [ 283.234449] Call Trace: [ 283.234478] dump_stack+0x142/0x197 [ 283.234505] should_fail.cold+0x10f/0x159 [ 283.234536] should_failslab+0xdb/0x130 [ 283.260070] __kmalloc_track_caller+0x2ec/0x790 [ 283.264766] ? check_preemption_disabled+0x3c/0x250 [ 283.269798] ? prepare_creds+0x3e/0x380 [ 283.273770] ? selinux_cred_prepare+0x49/0xb0 [ 283.278265] kmemdup+0x27/0x60 [ 283.281452] selinux_cred_prepare+0x49/0xb0 [ 283.285767] security_prepare_creds+0x7d/0xb0 [ 283.290258] prepare_creds+0x2cf/0x380 [ 283.294139] copy_creds+0x7b/0x4f0 [ 283.297680] ? lockdep_init_map+0x9/0x10 [ 283.301732] copy_process.part.0+0x868/0x6a00 [ 283.306243] ? save_trace+0x290/0x290 [ 283.310038] ? proc_fail_nth_write+0x7d/0x180 [ 283.314526] ? proc_cwd_link+0x1b0/0x1b0 [ 283.318582] ? __f_unlock_pos+0x19/0x20 [ 283.322571] ? __cleanup_sighand+0x50/0x50 [ 283.326795] ? lock_downgrade+0x740/0x740 [ 283.330940] _do_fork+0x19e/0xce0 [ 283.334391] ? fork_idle+0x280/0x280 [ 283.338100] ? fput+0xd4/0x150 [ 283.341282] ? SyS_write+0x15e/0x230 [ 283.345021] SyS_clone+0x37/0x50 [ 283.348374] ? sys_vfork+0x30/0x30 [ 283.351919] do_syscall_64+0x1e8/0x640 [ 283.355796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.360660] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.365837] RIP: 0033:0x45a639 [ 283.369018] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.376727] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 283.383999] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 283.391262] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.398546] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 283.405813] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 283.413106] CPU: 1 PID: 8910 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 283.420919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.430287] Call Trace: [ 283.432904] dump_stack+0x142/0x197 [ 283.436554] should_fail.cold+0x10f/0x159 [ 283.440713] should_failslab+0xdb/0x130 [ 283.444709] kmem_cache_alloc+0x47/0x780 [ 283.448807] ? save_trace+0x290/0x290 [ 283.452678] __debug_object_init+0x5b8/0x8e0 [ 283.457080] ? fs_reclaim_acquire+0x20/0x20 [ 283.461418] ? debug_object_destroy+0x250/0x250 [ 283.466129] debug_object_init+0x16/0x20 [ 283.470280] hrtimer_init+0x2a/0x2e0 [ 283.478470] init_dl_task_timer+0x1b/0x50 [ 283.482634] __sched_fork+0x222/0xab0 [ 283.486440] sched_fork+0x34/0xc10 [ 283.489987] ? __lockdep_init_map+0x10c/0x570 04:42:55 executing program 0 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:55 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x400000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) fchmod(r3, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) fcntl$setsig(r2, 0xa, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getpeername$unix(r1, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$VFIO_CHECK_EXTENSION(r4, 0x3b65, 0x2) 04:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x6a, 0xda, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001140), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendmsg$inet(r0, &(0x7f0000001100)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000000)="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", 0x1000}, {&(0x7f0000001000)="37afbc644065fc03497c2b00b7d2f32c8a76aaafaa89acad8185b8355df8265724da74c0973c1d91fab8dbbbcd636e252ed8679b9452e1194901d931e75ff3b21cc2b65b10e4783ae214b040e1ac72139438fe054d", 0x55}], 0x2, &(0x7f00000010c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0xffff}}], 0x18}, 0x80) 04:42:55 executing program 5 (fault-call:1 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$VIDIOC_EXPBUF(0xffffffffffffffff, 0xc0405610, &(0x7f0000000040)={0x1d, 0x9, 0x200000, 0x4800, r0}) fsetxattr$security_smack_transmute(r1, &(0x7f0000000080)='security.SMACK64TRANSMUTE\x00', &(0x7f00000000c0)='TRUE', 0x4, 0x0) [ 283.494500] copy_process.part.0+0x15b7/0x6a00 [ 283.499101] ? save_trace+0x290/0x290 [ 283.502899] ? proc_fail_nth_write+0x7d/0x180 [ 283.502909] ? proc_cwd_link+0x1b0/0x1b0 [ 283.502933] ? __cleanup_sighand+0x50/0x50 [ 283.502942] ? lock_downgrade+0x740/0x740 [ 283.502956] _do_fork+0x19e/0xce0 [ 283.502969] ? fork_idle+0x280/0x280 [ 283.502982] ? fput+0xd4/0x150 [ 283.502995] ? SyS_write+0x15e/0x230 [ 283.527474] SyS_clone+0x37/0x50 [ 283.537738] ? sys_vfork+0x30/0x30 [ 283.541290] do_syscall_64+0x1e8/0x640 [ 283.541299] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.541317] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.541325] RIP: 0033:0x45a639 [ 283.541331] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.541343] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 283.541349] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 283.541355] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.541361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 04:42:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x2, 0x4, 0x40, 0x1, 0x0, 0x24f6, 0x80000, 0x19, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x510, 0x48}, 0x8000, 0x430e, 0x5cfedbb2, 0x5, 0xfc, 0x0, 0x7}, 0x0, 0x7, r0, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000080)) fsetxattr$security_smack_transmute(r0, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x0) [ 283.541366] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 283.567753] FAULT_INJECTION: forcing a failure. [ 283.567753] name failslab, interval 1, probability 0, space 0, times 0 [ 283.598791] FAULT_INJECTION: forcing a failure. [ 283.598791] name failslab, interval 1, probability 0, space 0, times 0 [ 283.645333] CPU: 1 PID: 8920 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 283.653215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.662587] Call Trace: [ 283.665202] dump_stack+0x142/0x197 [ 283.668858] should_fail.cold+0x10f/0x159 [ 283.673023] should_failslab+0xdb/0x130 [ 283.673036] __kmalloc_track_caller+0x2ec/0x790 [ 283.673049] ? check_preemption_disabled+0x3c/0x250 [ 283.673068] ? prepare_creds+0x3e/0x380 [ 283.673080] ? selinux_cred_prepare+0x49/0xb0 [ 283.673100] kmemdup+0x27/0x60 [ 283.673113] selinux_cred_prepare+0x49/0xb0 [ 283.673131] security_prepare_creds+0x7d/0xb0 [ 283.673150] prepare_creds+0x2cf/0x380 [ 283.711546] copy_creds+0x7b/0x4f0 [ 283.715104] ? lockdep_init_map+0x9/0x10 [ 283.719191] copy_process.part.0+0x868/0x6a00 [ 283.723722] ? save_trace+0x290/0x290 [ 283.727536] ? proc_fail_nth_write+0x7d/0x180 [ 283.732045] ? proc_cwd_link+0x1b0/0x1b0 [ 283.736108] ? __f_unlock_pos+0x19/0x20 [ 283.740099] ? __cleanup_sighand+0x50/0x50 [ 283.744509] ? lock_downgrade+0x740/0x740 [ 283.748663] _do_fork+0x19e/0xce0 [ 283.752122] ? fork_idle+0x280/0x280 [ 283.755849] ? fput+0xd4/0x150 [ 283.759038] ? SyS_write+0x15e/0x230 [ 283.762763] SyS_clone+0x37/0x50 [ 283.766119] ? sys_vfork+0x30/0x30 [ 283.769681] do_syscall_64+0x1e8/0x640 [ 283.773567] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.778417] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.783604] RIP: 0033:0x45a639 [ 283.786782] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.794481] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 283.801747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 283.809030] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.816338] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 283.823643] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 283.835546] CPU: 0 PID: 8923 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 04:42:55 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x3a, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82810, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x10000, 0x2000000000000000, 0x80, 0x0, 0x660}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = dup3(r0, r1, 0x80000) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000000)) [ 283.843404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.852767] Call Trace: [ 283.852788] dump_stack+0x142/0x197 [ 283.852814] should_fail.cold+0x10f/0x159 [ 283.863173] should_failslab+0xdb/0x130 [ 283.867162] kmem_cache_alloc+0x2d7/0x780 [ 283.871323] ? creds_are_invalid+0x48/0x110 [ 283.875699] ? selinux_is_enabled+0x9/0x50 [ 283.879947] ? creds_are_invalid+0x48/0x110 [ 283.879972] __delayacct_tsk_init+0x20/0x80 [ 283.879988] copy_process.part.0+0x1a6c/0x6a00 [ 283.893221] ? save_trace+0x290/0x290 [ 283.897048] ? proc_fail_nth_write+0x7d/0x180 [ 283.901570] ? proc_cwd_link+0x1b0/0x1b0 [ 283.905646] ? __f_unlock_pos+0x19/0x20 [ 283.909651] ? __cleanup_sighand+0x50/0x50 [ 283.913913] ? lock_downgrade+0x740/0x740 [ 283.918093] _do_fork+0x19e/0xce0 [ 283.921573] ? fork_idle+0x280/0x280 [ 283.925308] ? fput+0xd4/0x150 [ 283.928516] ? SyS_write+0x15e/0x230 [ 283.932251] SyS_clone+0x37/0x50 [ 283.935632] ? sys_vfork+0x30/0x30 [ 283.939191] do_syscall_64+0x1e8/0x640 [ 283.943093] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 283.947968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 283.953177] RIP: 0033:0x45a639 [ 283.956385] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 283.964125] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 283.971569] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 283.978828] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 283.986104] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 04:42:56 executing program 3 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x5, 0x2) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000040)=@urb_type_control={0x2, {0x4, 0x1}, 0xfe, 0x93, &(0x7f0000000000)={0x40, 0xb, 0x5, 0x7, 0xf000}, 0x8, 0x28000, 0xfffffff8, 0x0, 0x1, 0x401, &(0x7f0000000480)="f818e9e87a1a9a202a85da5fc67ceaa33a013e981ddeeed1a6455f232a0e60c569ddac07795f854e5c8b142c2b378ffa668a640a98bf435ee941d610811084ea37f31b1f9778f6111a6f9ad24017655de3c2053316d43ca909c250ad331024b7727e5afc71b7157a52bb934f21cda1a4fb67a7a50ad8023a9956f9c982990163a28168d3e73e2bbd9449246519c0a66529337b9398a47d04e7ad788f25c5db0898f1da397a7377c9a85992227f3e926c67f64fc66db85f79402c2d9259c73757373287f234ffb012685c9942a0de3dbd2a548106a1a1555b11a0a0df2badba8644b0a736250fda85fde52454870bbb83f17b9ae288c83f34e0b30a45c31ee205088213bf0948f897094b273ac720ce5dc3c11c68a3cc1f9ac57c3897fa80bb102b7f7e66cfc6577a762454d46dff586d95fffb2963bc1bab0b5bfb8eb2b3e0eae2392b30aa17b622f41b56b2e6ca7858de71937ee1e1ec1b38fc30200203caacf0573f220f899134e265e3c4ea0345123b987f4258c6b1cc5bf955ac275b5d3d25e0d7da9be26436227323ad7730c2df03d86dbb337669cfa760463317a69b7bcddbfc739eb7ba164a963b1a0f1d7c7bfae66e9daee4e51649d87d572795225f2ee5663d4535aa36962991cd0393abd0f5fe79c465c1b5d96e41efdb0739aba671168d5aded8a876c6703b3873358ed75947bedb5c4afe42587512d86cd1749b782ee0af9ceb4d86c8a08b1ba2de2b5f46b1f44eed58640e8167c1fd18a0213935887f099fc59182016ebe986e3b07b840c11d8d4fb87fc87ac0d5625a03aa50c0d51d9cf976f0b75dfd672e1dd60d81c1cef440cea0366cd152ac5889de2b7070c75a0e997b0116a1125cf79deda705ad2ff05c00fd5b387942890dd34bc9aeefe7a0f9a2dd140d586f2680e4b756c4c88aeb709adf414d77f884a5bdfb1bfad21ef704342987843e4132864a7d047f3ed30e1247da61c3d99a436e2a33d4eff954e2e055c35e38d1dc279f25c9391dc7d58b71154870438d90f3146605f64e525dd26002907e492393a7089cad9ed4daeda925fe5bdc90233eff60fd4f3e27c93381394fd314a79beb989217ff3edc92c8f44e67fb658db2f532e5e2da366291cda4294d9e6acc6b1baa61dc555d4c8eb68f20aaf520a323a14ee94528c14b69e7f7439d2a3d7cae9e145d6d16879ccc5bb8a66439aad06a67422a4c00dc1503d58efd88c73840b7f98c7478573bee328d30fddab815c792d9a9567859fed3842c95bf235878d15dce16f60c2cb85eaeeb1103b5bd88206854fdd934c5a139fdf4ba958750023669ceab6a703554f96b669dd9e52045c0806f62348a1529f4d77df51e9cd90f4329bd5f2e727046108878973aa70690ba3226894ffb83065ffd9faf2754797e93b7b03d6a4428e4fa26c01905d66c5f26a969c6beaf38286cb0d66048ddb97226265f590f7d7aca380d37d1301d35e95d7f1943bf28395f6cc1f90539841131fbb743c236788eab2b600a9109ea0377d90e5af7b19a87fccf621b116df8536ce6145edac21fd4001a9327c3538d9c6d95f2c077812fe1b2ffcaad0a5492b1bf7370f683e508775f22c7f8237b56edd6b9a878f6a5149a917076b196d0c26c3a1735517218917f113e94a2bae577a320f291323070fab77c7934cc870b79a674e61dcf821ab041476307f2348836bdbdd388162734499ba6c5c1c6743655e737e6d3dc66ff22321ad723c7daf61bf7118885b2ca32793b1e36f728713918bc14e82959a76e065147cfe9e90f490696c7f68c3c55fa665f23b6191ec44e2e5ef09e67dbef113bb3b8673fbfe8a8223e7d4cc06ace84435269c38cf01826f37c6dbb3aa7b86988625627424d6b1b82f455bf8baa58283c6fdcfe88326b949a694d9b6cb663935e395cd6bd0c410fc9d5e3902513bfd7115dfcc94e14601227a24309818a538f816ebd44c7bffc724ff73f7168a3db66c03fdaf1ef6c21701ac0ba41d552dad3fb72e61f2705d241c6e3105db9843ab84153cb7a258ce5570fb51fce91a6909e87815449d4ed72ec442476df4d60face1b8c574a3895efbd506efd74cc158a9f8c8489d952f1c34fef6aaecabf7d33de5820059f03b987fd4e94c86e579ba9d75e329acd21082b27f7a1dc7c3c2632dc33a88b45c3a47e969a08cc31c537a7c530ba598f1cb6f7aa6e731e700dc9107a2665a88fe434dd85813182a609209840f48963f13c242abf2c8436a0e2c4f6b3ec8fc154c6f274bf9501880d70c9159c51206902bea2384100fa8ff704337412cc87a50cad1e541ec93bfb09f07f233d52db960a011f447e4710ffc222c4497bc9e0da7f3dcdf9808481f2f7b52bda54f46b6a3bfc81760c73919ac89ccc03755bf741493b3873ca9432ca24bc93465a8c426e5fa2e8df73f37d4b128f0928bf8039801ff7df41049d0397e7d6d14503467bae1f435b1146aa2628a6edc3ba9f3a1df5008be9c186bc2982e41b3296c45d6a5e9a42bd9efea06e875aa1880ca38edbabce99a814a5ce6c87f94cbf41e21e7a0b9237f72db55457db5447ec6cf061d67f1a5591ed4c92a55af24d73c932ac413dcc56bf2af97c93ba0759d452127b13bf5a19ad5e437b406c5ff98a32fd05345eab3dd53c7a555df71449c6c37bfc75d7832083f0669ff198f7d3f445b0c584eee4cc96c6775d4688bc73be046790bb9e22fa194538fab5cc3a6adb2dd2dd20081dcca8e87b75d9417ea20d5416c3d069f36e67151075c02c077eff6062aeb7cefe567c483ca077c3f0387b6b57b7890bbc7302fb06153786cc9ce298a92d3d7e48def35291fbdd75008bb1370542216c9e8b65cc2b066568fdf8c796b611213c1c065d2a8869cc873b6856ead71829e484262815aeb3c03c180131269324e2257fbb0b9458c9444cd559478e5d6e76c5432827b57d2352cca86ad28cf874ebb0d20c19e1dcb7416f1a6f80512252b2e14185ddbc798d450111a302abb14416e0e16345d555e457bda9862c6666a5907a224fbc6cd782228ebd4bf08bf4365604f43a182e5fdabe62a5c1e36e6b166e13d319a91b48a8dfed92dc0cfff8f1f3adda4624d971bc3155aefe608f1a619f74ce0f41687d7cfde7b148b7aaa6372dd32795a6a9160b05b7313af3112ce954c47b1daa9b11789b80b36f5bb8bd334d930ddcb881421715f9a890e65d628a08bdbb15d773d613eed42b2c65052b71ac5c691f027140bda12e04cafc3df1ae536a78557a28beba34f144cfafb076198688866c069b082bffd2cb2129f0a6cda5021c5ffd10325c612c22a69f4ad4d81d96089f3a6d60a44bf8b96b2471c6166aeb3bbbce9f9d0639258b4c0545af8cb14c23ff24dc5de714a0a399afa53a8defe4798978eaa3c26c510a68c70e85e0b023b1197c71c02f5e77d6aab7e1edcbb6715a862765c00435b0af198a161bad533a699244a298db63e746662f1e7b0cb14ec788a46754b229904f38305d944fc04bb2a34cbbbedb741130770c32a71b0eb0f4ab860d4808a4fc8b2580a4d7b0d8389011e322f8570058f47273c34879d2708d2721f17bf7e34f6483beb83a8292258a64fe52e9b0546d7639807cc9fcdaa0cad13512e701eaa8ad032a5eeba97c51c1f49db6c8367e2429bf3a0768002543fc89670db13fb1cb6faebad31ee44bede00fb18e0b10d262b7d4dda58df545bb226e6c6674c50c49f08101db82e85386f298e556096a8d758de136dd5dd87135734b14d3901d242da1d4c043ca1db26fa0851ed0b4e80e41ab51f6247dfca6f44cd8cffa9512fb06e1a837b055d87b887d7367041c01744f202f6aad69cd8e94c0474fbd30dddd748a4911e06391ed92b20c5efa4cac70d3177b9f960225c9e29a6e0f233ee069315d21030069fd2003eb0cd9e5e8076a49bd6e94ebba45c3ab523a2c2bcbd845923500716cb43b26acb7b20093aead4d924dc413d91adaf76035cbcd7bcfe69705b52ee426b3f6cf0235717a4c1eecb91be3a01556483f6ef86f6c8fae2e64b632948578f83ab693331fb50aaa24c7395a5c560b1c5d26a10702b88387a2fae5fd8e1dda09163a52aedb24dfad2315f31013ecbef389d552cbdb6cc0a4113e5bd2443d91adf7e460f8a27ae71dff8ff0f04ecac566106f1fcfce9e95512c161531e84a9ccbfd9a92af9486462f9ee10ab5720619fec6bfc4b6434c13050a5627ff9c267419391a1ab193e523aca4447d800e3aee4c6e5276661c2af702bdb8fe7a3bdf8a2477b3497bfc17e0d0529d583fdc1502f0cb1f6f7a8913719aea1db819634885af980d802d3e96dcc4072ebf8cf9641eec79658aee355c1a5546d73d9dca7e22a729da25a90481878b5643f7c87cc1618b42c2a7c3aebc7ec354c2e944416344ed072078fe09528e88062fbcaba40848c1710c26215a41a686a208169dde1b0e469ef04b2c6c000a6c38f6675c370e99a305f0da1d7f1037c7ae0ebda0143d4baa9c052714bf792388da8f6284917f44f9ad1d285d820a87995db15a5f9e099de34b5c5cffde802da162fe78cd05c6ef2ac14255b51d00edbaf4aa2afa3673e19ce61946b64e29a31d6f98cbb5e0d203d2f2ab4f8efca8b9b3cac9711f55cf7db86920c216ec3afaaceaccf9a9cc320307211ea79554cb1275e24ea439e713c558c846a7edeef0178e9c5f6dd849cdf5ee7d27a240758d530da2e4a34ad50b45817d66f73cfb93576602b6aa5518691524cdf3bcc01814a5c56cc07555e97fc1ca8962c592d087a166cabe0ca6b3d54fff33cbccca39367e59614cc2f2ab1575fcfd98b9ded35bd45433f09a6462f1f42920965180f7397cda53cffb1d8a1b354d9ad5f3108ef95d55b46729a1412a9493ea0afd96804f2852ec91c1f60a0a777eaf415047128db4ac60970cb7b5a925fb09ed645fb76208cf9b47fc06eae0cf056413f030d9fdad11cfe7bb3de7f5676a7139e422230fcdb45bcb6a10f27280fbb753a3f108e3c5b843bbb9c0ea1a368e2889ef91b5828c27c3fffde1f368fe01a1b3cd3b1c9afab056ec03163f01128c178dfdea3902f522e4c35e09febee72e0897d83525983af7522065b284c457b3d4f3cd1366f295141e0131e634a28e8dd8166eb9d8f8e4f763c400526aeb708de9f8dd4ea641228c8482d76fef3885e80cb3f90a6016fb868721d8bc57ca01ee618786ef3aedb11a2c718d65e384991d04463f56027fc4d31d4b9778deeca6770f4198a1cc0cbcb1189dac6b0486179cb4620907e90ed82f81a93c66ff52cbe98bd662ab88b81456b47734ead2c4f0c4eb5519d060c2ce40c503a433158483d5f63e316f4110c45c1f8d88cf7b339f036f994da49b4697a744be50fc90366c2e18dfb026fb8f7c226a9d1a58ca87fe81eb8488ce11e223ee263ccc03a7e393bf43f768ea3c0954ee5b80e73a8a209df8a65e444c14dc2065bab0783fdc0290dada5826d5dddf4c05c1c33fbb81017cc1d4970ab94e609f80e018aafd1938aaafab7fabc284ea6ec74507fde7662f4338d491e5cc3fbdcfbfebf25b213de426020faef46e98b3239d6a2a6badc79d4c7f5458c381839253b4d1d7c6a6cef9a96611c006576aa744319493a081f7a0b630dad4d468296d73876f24445f4153854a67802d423d6867397b449be77b744ec88144b535075d0d48474fdc97dcc6ee115a3dd6110add9d2210c0202e4f4ad11eaae94ebf699e6679c4492ec9fa10c7890e6d30cdf3c498843906b55a0608b51b6f6927c3b3b03bddb97655d002ef83076e4fe34031"}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) close(r7) clone(0x10000, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffc67, 0xda, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_bp={&(0x7f0000000080), 0xa}, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) renameat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$usbfs(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x18d701) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="150e1df9454053bfd4481466d1d67fd03a8a4418b5d7dcda6321f398b7cf8c009ac5e7cba0ffc7121f23bf9044c21c4deb14aad200039160fa2e71c6170956ec11db3de997730076656b77458c7f34f754bfbca95842ae3e2c2e284f4c9e7a75d61e57bbf40cb58f987120655a28c44ab6849b6ac3182563c503d1a0f9c17a30f33f54e826864216a7175403f18e196bfce1323555b4fb623ade64ae6e2c964ed015e33081ab4f54cfe32b38356a2d92961cc6c0d9caf1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x20) syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x20, 0x2004) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget$private(0x0, 0x207, 0x0) semop(r0, &(0x7f0000000100)=[{0x0, 0x6}], 0x1) semop(r0, &(0x7f0000000080)=[{}], 0x188) semctl$IPC_RMID(r0, 0x0, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)=[0x62, 0x20]) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:56 executing program 5 (fault-call:1 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 283.993561] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:56 executing program 0 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.072842] FAULT_INJECTION: forcing a failure. [ 284.072842] name failslab, interval 1, probability 0, space 0, times 0 [ 284.087868] FAULT_INJECTION: forcing a failure. [ 284.087868] name failslab, interval 1, probability 0, space 0, times 0 [ 284.107206] CPU: 1 PID: 8958 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 284.113624] FAULT_INJECTION: forcing a failure. [ 284.113624] name failslab, interval 1, probability 0, space 0, times 0 [ 284.115049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.115056] Call Trace: [ 284.115077] dump_stack+0x142/0x197 [ 284.115099] should_fail.cold+0x10f/0x159 [ 284.115117] should_failslab+0xdb/0x130 [ 284.115161] kmem_cache_alloc_node_trace+0x280/0x770 [ 284.138316] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 284.150036] __kmalloc_node+0x3d/0x80 [ 284.150052] kvmalloc_node+0x4e/0xe0 [ 284.150065] alloc_fdtable+0xcf/0x280 [ 284.150075] dup_fd+0x693/0xa40 [ 284.150093] copy_process.part.0+0x1b5a/0x6a00 [ 284.150111] ? save_trace+0x290/0x290 [ 284.150123] ? proc_fail_nth_write+0x7d/0x180 [ 284.150132] ? proc_cwd_link+0x1b0/0x1b0 [ 284.150152] ? __cleanup_sighand+0x50/0x50 [ 284.196559] ? lock_downgrade+0x740/0x740 [ 284.200716] _do_fork+0x19e/0xce0 [ 284.204361] ? fork_idle+0x280/0x280 [ 284.208089] ? fput+0xd4/0x150 [ 284.211310] ? SyS_write+0x15e/0x230 [ 284.215046] SyS_clone+0x37/0x50 [ 284.218552] ? sys_vfork+0x30/0x30 04:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000040)=0x80000000) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100, 0x0, 0x0, 0x9}, 0x0, 0x4, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/\xce\xfa\xff\xff\xff\xff\xff\x00', 0x0, 0x200000) [ 284.222100] do_syscall_64+0x1e8/0x640 [ 284.226003] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.230852] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.236146] RIP: 0033:0x45a639 [ 284.239330] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.247038] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 284.254308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 284.261581] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.261588] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 284.261594] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 284.288428] CPU: 0 PID: 8960 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 284.296275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.305649] Call Trace: [ 284.308275] dump_stack+0x142/0x197 [ 284.311923] should_fail.cold+0x10f/0x159 [ 284.311949] should_failslab+0xdb/0x130 04:42:56 executing program 3 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.320202] kmem_cache_alloc+0x2d7/0x780 [ 284.324391] ? creds_are_invalid+0x48/0x110 [ 284.328743] ? selinux_is_enabled+0x9/0x50 [ 284.333004] ? creds_are_invalid+0x48/0x110 [ 284.337359] __delayacct_tsk_init+0x20/0x80 [ 284.341715] copy_process.part.0+0x1a6c/0x6a00 [ 284.341744] ? save_trace+0x290/0x290 [ 284.350128] ? proc_fail_nth_write+0x7d/0x180 [ 284.350142] ? proc_cwd_link+0x1b0/0x1b0 [ 284.350157] ? __f_unlock_pos+0x19/0x20 [ 284.350186] ? __cleanup_sighand+0x50/0x50 [ 284.367025] ? lock_downgrade+0x740/0x740 [ 284.368910] FAULT_INJECTION: forcing a failure. [ 284.368910] name failslab, interval 1, probability 0, space 0, times 0 [ 284.371199] _do_fork+0x19e/0xce0 [ 284.371219] ? fork_idle+0x280/0x280 [ 284.371239] ? fput+0xd4/0x150 [ 284.392752] ? SyS_write+0x15e/0x230 [ 284.396486] SyS_clone+0x37/0x50 [ 284.399847] ? sys_vfork+0x30/0x30 [ 284.403411] do_syscall_64+0x1e8/0x640 [ 284.407305] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.412163] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.417352] RIP: 0033:0x45a639 [ 284.420659] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.428365] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 284.435624] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 284.442884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.450143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 284.457418] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 284.464770] CPU: 1 PID: 8973 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 284.472580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.481942] Call Trace: [ 284.484544] dump_stack+0x142/0x197 [ 284.488206] should_fail.cold+0x10f/0x159 [ 284.492350] should_failslab+0xdb/0x130 [ 284.496311] kmem_cache_alloc_node_trace+0x280/0x770 [ 284.501420] ? kasan_unpoison_shadow+0x35/0x50 [ 284.506093] __kmalloc_node+0x3d/0x80 [ 284.509914] kvmalloc_node+0x4e/0xe0 [ 284.513620] alloc_fdtable+0x13b/0x280 [ 284.517500] dup_fd+0x693/0xa40 [ 284.520792] copy_process.part.0+0x1b5a/0x6a00 [ 284.525374] ? save_trace+0x290/0x290 [ 284.529173] ? proc_fail_nth_write+0x7d/0x180 [ 284.533664] ? proc_cwd_link+0x1b0/0x1b0 [ 284.537718] ? __cleanup_sighand+0x50/0x50 [ 284.541957] ? lock_downgrade+0x740/0x740 [ 284.546102] _do_fork+0x19e/0xce0 [ 284.549540] ? fork_idle+0x280/0x280 [ 284.553246] ? fput+0xd4/0x150 [ 284.556526] ? SyS_write+0x15e/0x230 [ 284.560238] SyS_clone+0x37/0x50 [ 284.563585] ? sys_vfork+0x30/0x30 [ 284.567109] do_syscall_64+0x1e8/0x640 [ 284.570982] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.575817] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.581004] RIP: 0033:0x45a639 [ 284.584175] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.591901] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 284.599163] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 284.599170] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.613713] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 04:42:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x3}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000180)={0x2, 0x7, 0x20, 0x46, 0x81, 0x0, 0xb5f8}, 0xc) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$PPPIOCGMRU(r0, 0x80047453, &(0x7f0000000140)) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)=0x0) ioctl$KVM_X86_SET_MCE(0xffffffffffffffff, 0x4040ae9e, &(0x7f0000000100)={0x880000000000000, 0x3000, 0x7ff, 0x8, 0x1}) setgid(r1) 04:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1000100, &(0x7f0000000000)="c07a8429d5b790a54ac428bf3bdb886380defa9e6617394b6378bbc85d7e9bc5b3491d3ce878bc5bc6d17c1fce35dfb4824afb59df25132f9ae7e41a07d2ab75bed0ddef711e512172216c297419a672b502bdfb495d86817c7f7ade504f9fa7f594e50a6c672ea029b8237aaa4bf9f70a47943398c63b92fe618b8d5938eeef5a5300f2b27d62af4f0834ef23b9783a", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="75e4f2579a93d890ceb1bb6da839ff1bf6c2e15f428b1acb264f7e") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.620993] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 284.628326] CPU: 0 PID: 8964 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 284.636142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.645526] Call Trace: [ 284.648139] dump_stack+0x142/0x197 [ 284.651801] should_fail.cold+0x10f/0x159 [ 284.655988] should_failslab+0xdb/0x130 [ 284.660074] kmem_cache_alloc+0x2d7/0x780 [ 284.664245] ? trace_hardirqs_on_caller+0x400/0x590 [ 284.669286] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 04:42:56 executing program 3 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.674430] dup_fd+0x85/0xa40 [ 284.677637] ? refcount_inc_not_zero+0x88/0xe0 [ 284.682235] ? refcount_inc+0x1f/0x40 [ 284.686061] copy_process.part.0+0x1b5a/0x6a00 [ 284.690679] ? save_trace+0x290/0x290 [ 284.694283] FAULT_INJECTION: forcing a failure. [ 284.694283] name failslab, interval 1, probability 0, space 0, times 0 [ 284.694494] ? proc_fail_nth_write+0x7d/0x180 [ 284.710186] ? proc_cwd_link+0x1b0/0x1b0 [ 284.714269] ? __cleanup_sighand+0x50/0x50 [ 284.718509] ? lock_downgrade+0x740/0x740 [ 284.722666] _do_fork+0x19e/0xce0 [ 284.726113] ? fork_idle+0x280/0x280 [ 284.729822] ? fput+0xd4/0x150 [ 284.733028] ? SyS_write+0x15e/0x230 [ 284.736749] SyS_clone+0x37/0x50 [ 284.740117] ? sys_vfork+0x30/0x30 [ 284.743665] do_syscall_64+0x1e8/0x640 [ 284.747558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.752406] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.757587] RIP: 0033:0x45a639 [ 284.760770] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.768494] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 284.775770] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 284.783029] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.790287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 284.797556] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 284.804840] CPU: 1 PID: 8989 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 [ 284.812646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.821997] Call Trace: [ 284.822019] dump_stack+0x142/0x197 [ 284.822040] should_fail.cold+0x10f/0x159 [ 284.822055] should_failslab+0xdb/0x130 [ 284.822065] kmem_cache_alloc_node_trace+0x280/0x770 [ 284.822075] ? kasan_unpoison_shadow+0x35/0x50 [ 284.822088] __kmalloc_node+0x3d/0x80 [ 284.822100] kvmalloc_node+0x4e/0xe0 [ 284.822114] alloc_fdtable+0x13b/0x280 [ 284.828306] dup_fd+0x693/0xa40 [ 284.828328] copy_process.part.0+0x1b5a/0x6a00 [ 284.828348] ? save_trace+0x290/0x290 [ 284.828357] ? proc_fail_nth_write+0x7d/0x180 04:42:56 executing program 0 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:56 executing program 4: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x4, 0x0, 0x40, 0x0, 0x0, 0x0, 0x41c22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7245c8d4, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x6, r0, 0x0) lookup_dcookie(0x21, &(0x7f0000000000)=""/103, 0x67) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.828367] ? proc_cwd_link+0x1b0/0x1b0 [ 284.869128] ? __cleanup_sighand+0x50/0x50 [ 284.869142] ? lock_downgrade+0x740/0x740 [ 284.886041] _do_fork+0x19e/0xce0 [ 284.886055] ? fork_idle+0x280/0x280 [ 284.893251] ? fput+0xd4/0x150 [ 284.896454] ? SyS_write+0x15e/0x230 [ 284.900178] SyS_clone+0x37/0x50 [ 284.903548] ? sys_vfork+0x30/0x30 [ 284.907107] do_syscall_64+0x1e8/0x640 [ 284.911014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 284.915911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 284.918676] FAULT_INJECTION: forcing a failure. [ 284.918676] name failslab, interval 1, probability 0, space 0, times 0 [ 284.921115] RIP: 0033:0x45a639 [ 284.921121] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 284.921134] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 284.921140] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 284.921146] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 284.921153] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 04:42:56 executing program 5 (fault-call:1 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 284.921159] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:57 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x1, 0x400101) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x101400, 0x0) listen(r6, 0xff) write$FUSE_GETXATTR(r5, &(0x7f00000001c0)={0x18, 0x19eee5cc2cf7c75e, 0x5}, 0x18) recvfrom$rxrpc(r4, &(0x7f00000000c0)=""/120, 0x78, 0x100, &(0x7f0000000140)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e22, @remote}}, 0x24) r7 = openat$cgroup_ro(r2, &(0x7f0000000000)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$TCSETS2(r7, 0x402c542b, &(0x7f0000000080)={0xbfe, 0x3f, 0x43, 0x0, 0x1, "85871ddb4a108692fb777897ef2b7a4ad019c9", 0x9, 0x5}) clone(0x1000, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000040)={'caif0\x00', {0x2, 0x4e24, @loopback}}) r1 = socket(0x1e, 0x805, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r4 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x1, 0x2) pread64(r4, &(0x7f0000000240)=""/22, 0x16, 0x6d1) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$USBDEVFS_RELEASE_PORT(r3, 0x80045519, &(0x7f00000000c0)=0x54) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r5}, 0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000080)={r5, 0x8}, 0x8) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="0500000000000000ffffff3ddcee06009c05a197c2037f00000000060000fbffffffff010000000000000001000000000000000400000000000000546bdd9f38aa69"]) [ 285.025071] FAULT_INJECTION: forcing a failure. [ 285.025071] name failslab, interval 1, probability 0, space 0, times 0 [ 285.076969] CPU: 1 PID: 9005 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 285.084828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.094202] Call Trace: [ 285.096804] dump_stack+0x142/0x197 [ 285.096836] should_fail.cold+0x10f/0x159 [ 285.105051] should_failslab+0xdb/0x130 [ 285.105068] kmem_cache_alloc_trace+0x2e9/0x790 [ 285.113722] ? lock_downgrade+0x740/0x740 [ 285.117900] alloc_fdtable+0x7f/0x280 [ 285.121731] dup_fd+0x693/0xa40 [ 285.125047] copy_process.part.0+0x1b5a/0x6a00 [ 285.129662] ? save_trace+0x290/0x290 [ 285.133478] ? proc_fail_nth_write+0x7d/0x180 [ 285.137992] ? proc_cwd_link+0x1b0/0x1b0 [ 285.142088] ? __cleanup_sighand+0x50/0x50 [ 285.146335] ? lock_downgrade+0x740/0x740 [ 285.150513] _do_fork+0x19e/0xce0 [ 285.154010] ? fork_idle+0x280/0x280 [ 285.157748] ? fput+0xd4/0x150 [ 285.160952] ? SyS_write+0x15e/0x230 [ 285.160975] SyS_clone+0x37/0x50 [ 285.160984] ? sys_vfork+0x30/0x30 [ 285.161003] do_syscall_64+0x1e8/0x640 [ 285.161013] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.161037] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.161048] RIP: 0033:0x45a639 [ 285.168232] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.196550] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 285.203837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 285.211126] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.218524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:42:57 executing program 2: ioctl$VHOST_VSOCK_SET_RUNNING(0xffffffffffffffff, 0x4004af61, &(0x7f0000000000)=0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x5, 0x4, 0xb7cd, 0x1, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x918a, 0x801d, 0xfff4, 0x1000, r2}, &(0x7f0000000100)=0x10) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x3) 04:42:57 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000001c0)='\x1d\xc8fQ\xd9\x00\x00\x00\x00\xa8\xc2dEI\x11\x99\xf0\xfe\xaf\x12h3\xd8\xad\x95\x03\xae\x89\xd1Nb\x97!\xe3\x95\xedO\x87\xef\xfd\b\xb3\xd1\x8cL\xd8\xa5/l+\xbd\a9 W\x1b#>\x01\x15\x82Us}\x03V\xb7\xa4\x85\xf8J\xcb\x86;\v\xf4K\x8br\xef5\xe4\x9b\xc7\xadJ.j\xba\xe2\xa2\x18\x84\xadp\x19\x11\xca\x16\t\xcd\xa9I\x8c\xff\x01Nvq\xe5\n\x87\xe1m\xc4\xacd\x8cGc&\x1f\xc9M\x9f\xd7\xdb\xca\xe7\xf5\xc2%\x9dd\a_7\xc7\xde\xf0_\x8b\x89w\xba|\xb7\xc0\xb4\xcc}\x01`SH\xa4\xef\xd8\xee\'\xfc\x13\xd3:\xfc&\xed\xde3\xf3b\x80s\xa6\xfa9\xb6\xf1\x8do\xaf\a\xbdf\x9f\xd7\xe2\x84\xe8\xb2\xccN@}2\xd9\xf1|\xbd\x93', 0xe65bddd) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x40) write$P9_RSETATTR(r1, &(0x7f0000000080)={0x7, 0x1b, 0x1}, 0x7) 04:42:57 executing program 2: openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket(0x1e, 0x805, 0x0) close(r2) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r4}, 0x8) modify_ldt$write2(0x11, &(0x7f00000000c0)={0x0, 0x0, 0x400, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1}, 0x10) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r4, 0x4) [ 285.225810] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 285.233112] CPU: 0 PID: 8998 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 285.240931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.250305] Call Trace: [ 285.252926] dump_stack+0x142/0x197 [ 285.256595] should_fail.cold+0x10f/0x159 [ 285.260769] should_failslab+0xdb/0x130 [ 285.264762] kmem_cache_alloc_trace+0x2e9/0x790 [ 285.269466] ? lock_downgrade+0x740/0x740 [ 285.273636] alloc_fdtable+0x7f/0x280 04:42:57 executing program 3 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 5 (fault-call:1 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 285.277459] dup_fd+0x693/0xa40 [ 285.280780] copy_process.part.0+0x1b5a/0x6a00 [ 285.285408] ? save_trace+0x290/0x290 [ 285.285423] ? proc_fail_nth_write+0x7d/0x180 [ 285.293690] ? proc_cwd_link+0x1b0/0x1b0 [ 285.293724] ? __cleanup_sighand+0x50/0x50 [ 285.302002] ? lock_downgrade+0x740/0x740 [ 285.306179] _do_fork+0x19e/0xce0 [ 285.309654] ? fork_idle+0x280/0x280 [ 285.313382] ? fput+0xd4/0x150 [ 285.316588] ? SyS_write+0x15e/0x230 [ 285.320322] SyS_clone+0x37/0x50 [ 285.323694] ? sys_vfork+0x30/0x30 [ 285.327252] do_syscall_64+0x1e8/0x640 [ 285.331147] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.331175] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.331186] RIP: 0033:0x45a639 [ 285.331194] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 [ 285.337910] FAULT_INJECTION: forcing a failure. [ 285.337910] name failslab, interval 1, probability 0, space 0, times 0 [ 285.341200] ORIG_RAX: 0000000000000038 [ 285.341210] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 04:42:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x441, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) [ 285.341218] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 285.341225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.341232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 285.341239] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 285.432800] FAULT_INJECTION: forcing a failure. [ 285.432800] name failslab, interval 1, probability 0, space 0, times 0 [ 285.468068] CPU: 1 PID: 9043 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 285.476626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.485994] Call Trace: [ 285.488605] dump_stack+0x142/0x197 [ 285.492267] should_fail.cold+0x10f/0x159 [ 285.496450] should_failslab+0xdb/0x130 [ 285.500450] kmem_cache_alloc_trace+0x2e9/0x790 [ 285.505136] ? lock_downgrade+0x740/0x740 [ 285.509313] alloc_fdtable+0x7f/0x280 [ 285.513143] dup_fd+0x693/0xa40 [ 285.516457] copy_process.part.0+0x1b5a/0x6a00 [ 285.521053] ? save_trace+0x290/0x290 [ 285.524868] ? proc_fail_nth_write+0x7d/0x180 [ 285.529371] ? proc_cwd_link+0x1b0/0x1b0 [ 285.533463] ? __cleanup_sighand+0x50/0x50 [ 285.535548] FAULT_INJECTION: forcing a failure. [ 285.535548] name failslab, interval 1, probability 0, space 0, times 0 [ 285.538595] ? lock_downgrade+0x740/0x740 [ 285.538625] _do_fork+0x19e/0xce0 [ 285.538645] ? fork_idle+0x280/0x280 [ 285.538665] ? fput+0xd4/0x150 [ 285.564306] ? SyS_write+0x15e/0x230 [ 285.568803] SyS_clone+0x37/0x50 [ 285.572164] ? sys_vfork+0x30/0x30 [ 285.575710] do_syscall_64+0x1e8/0x640 [ 285.579597] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.584450] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.589638] RIP: 0033:0x45a639 [ 285.592819] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.600522] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 285.608302] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 285.615560] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.622822] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:42:57 executing program 0 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_config_ext, 0x0, 0x401, 0x1000000, 0x0, 0xf52e}, 0x0, 0x0, 0xffffffffffffffff, 0x6) r1 = fcntl$dupfd(r0, 0x406, r0) waitid$P_PIDFD(0x3, r1, &(0x7f0000000000), 0x40000000, &(0x7f0000000080)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xc) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) connect$unix(r2, &(0x7f0000000580)=@abs={0x1, 0x0, 0x4e21}, 0x6e) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000180)=0x4, &(0x7f00000002c0)=0x4) r3 = open(&(0x7f0000000300)='.\x00', 0x8100, 0x0) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x0) symlinkat(&(0x7f0000000600)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r2, &(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_GET_MP_STATE(r4, 0x8004ae98, &(0x7f0000000740)) ioctl$VHOST_VSOCK_SET_RUNNING(r2, 0x4004af61, &(0x7f0000000700)=0x1) r5 = dup2(r1, r3) write$P9_RFLUSH(r5, &(0x7f0000000000)={0x7, 0x6d, 0x1}, 0x7) recvmsg$can_raw(r5, &(0x7f0000000280)={&(0x7f0000000080)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000000240)=[{&(0x7f0000000100)=""/119, 0x77}, {&(0x7f0000000180)}, {&(0x7f00000001c0)=""/113, 0x71}, {&(0x7f0000000480)=""/236, 0xec}], 0x4, &(0x7f0000000340)=""/191, 0xbf}, 0x8000) r6 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r6, 0x6741576111f67cdd) mkdirat(r6, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = dup3(r6, 0xffffffffffffffff, 0x80000) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000780)) [ 285.630086] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 285.637381] CPU: 0 PID: 9049 Comm: syz-executor.0 Not tainted 4.14.156-syzkaller #0 [ 285.645221] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.654598] Call Trace: [ 285.657213] dump_stack+0x142/0x197 [ 285.660875] should_fail.cold+0x10f/0x159 [ 285.665069] should_failslab+0xdb/0x130 [ 285.669067] kmem_cache_alloc_node_trace+0x280/0x770 [ 285.674188] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 285.679672] __kmalloc_node+0x3d/0x80 04:42:57 executing program 5 (fault-call:1 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 285.683494] kvmalloc_node+0x4e/0xe0 [ 285.687222] alloc_fdtable+0xcf/0x280 [ 285.691037] dup_fd+0x693/0xa40 [ 285.694356] copy_process.part.0+0x1b5a/0x6a00 [ 285.698970] ? save_trace+0x290/0x290 [ 285.702787] ? proc_fail_nth_write+0x7d/0x180 [ 285.707299] ? proc_cwd_link+0x1b0/0x1b0 [ 285.708008] FAULT_INJECTION: forcing a failure. [ 285.708008] name failslab, interval 1, probability 0, space 0, times 0 [ 285.711390] ? __cleanup_sighand+0x50/0x50 [ 285.711408] ? lock_downgrade+0x740/0x740 [ 285.711431] _do_fork+0x19e/0xce0 [ 285.711457] ? fork_idle+0x280/0x280 [ 285.738147] ? fput+0xd4/0x150 [ 285.741338] ? SyS_write+0x15e/0x230 [ 285.745051] SyS_clone+0x37/0x50 [ 285.748407] ? sys_vfork+0x30/0x30 [ 285.751947] do_syscall_64+0x1e8/0x640 [ 285.755831] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.760713] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.765934] RIP: 0033:0x45a639 [ 285.769128] RSP: 002b:00007f4ceeb25c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.776844] RAX: ffffffffffffffda RBX: 00007f4ceeb25c90 RCX: 000000000045a639 [ 285.784116] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 285.791376] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.798647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4ceeb266d4 [ 285.805913] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 285.813222] CPU: 1 PID: 9059 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 285.821029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.821036] Call Trace: [ 285.821054] dump_stack+0x142/0x197 [ 285.821080] should_fail.cold+0x10f/0x159 [ 285.840793] should_failslab+0xdb/0x130 [ 285.844782] kmem_cache_alloc_node_trace+0x280/0x770 [ 285.849890] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 285.855367] __kmalloc_node+0x3d/0x80 [ 285.859172] kvmalloc_node+0x4e/0xe0 [ 285.859193] alloc_fdtable+0xcf/0x280 [ 285.859210] dup_fd+0x693/0xa40 [ 285.869991] copy_process.part.0+0x1b5a/0x6a00 [ 285.874604] ? save_trace+0x290/0x290 [ 285.878424] ? proc_fail_nth_write+0x7d/0x180 [ 285.882939] ? proc_cwd_link+0x1b0/0x1b0 [ 285.887014] ? __cleanup_sighand+0x50/0x50 [ 285.891256] ? lock_downgrade+0x740/0x740 [ 285.895430] _do_fork+0x19e/0xce0 [ 285.898909] ? fork_idle+0x280/0x280 [ 285.902736] ? fput+0xd4/0x150 [ 285.905929] ? SyS_write+0x15e/0x230 [ 285.909649] SyS_clone+0x37/0x50 [ 285.913007] ? sys_vfork+0x30/0x30 [ 285.916549] do_syscall_64+0x1e8/0x640 [ 285.920446] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 285.925309] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 285.930493] RIP: 0033:0x45a639 [ 285.933672] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 285.941380] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 285.948655] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 285.955961] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 285.963238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 285.970524] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 285.977829] CPU: 0 PID: 9028 Comm: syz-executor.3 Not tainted 4.14.156-syzkaller #0 04:42:57 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x2}, 0x0, 0x3, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer2\x00', 0x9df20fd1df134b07, 0x0) getsockname$netrom(r1, &(0x7f0000000340)={{0x3, @bcast}, [@remote, @netrom, @netrom, @bcast, @default, @null, @remote, @rose]}, &(0x7f00000003c0)=0x48) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)={r0}) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000200)={'nat\x00', 0x0, 0x4, 0x47, [], 0x7, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000180)=""/71}, &(0x7f0000000280)=0x78) clone(0x0, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_PRIORITY(0xffffffffffffffff, 0x80045643, 0x3) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:57 executing program 5 (fault-call:1 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) [ 285.985649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.995022] Call Trace: [ 285.997642] dump_stack+0x142/0x197 [ 286.001328] should_fail.cold+0x10f/0x159 [ 286.005507] should_failslab+0xdb/0x130 [ 286.009499] kmem_cache_alloc+0x2d7/0x780 [ 286.013664] ? do_raw_spin_unlock+0x16b/0x260 [ 286.018181] ? _raw_spin_unlock+0x2d/0x50 [ 286.022358] copy_process.part.0+0x3987/0x6a00 [ 286.026977] ? save_trace+0x290/0x290 [ 286.030803] ? proc_fail_nth_write+0x7d/0x180 [ 286.035337] ? proc_cwd_link+0x1b0/0x1b0 [ 286.039443] ? __cleanup_sighand+0x50/0x50 [ 286.043701] ? lock_downgrade+0x740/0x740 [ 286.046904] FAULT_INJECTION: forcing a failure. [ 286.046904] name failslab, interval 1, probability 0, space 0, times 0 [ 286.047900] _do_fork+0x19e/0xce0 [ 286.047923] ? fork_idle+0x280/0x280 [ 286.047945] ? fput+0xd4/0x150 [ 286.047963] ? SyS_write+0x15e/0x230 [ 286.073236] SyS_clone+0x37/0x50 [ 286.076620] ? sys_vfork+0x30/0x30 [ 286.080179] do_syscall_64+0x1e8/0x640 [ 286.084076] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.088947] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.094150] RIP: 0033:0x45a639 [ 286.097375] RSP: 002b:00007fda5d351c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 286.105084] RAX: ffffffffffffffda RBX: 00007fda5d351c90 RCX: 000000000045a639 [ 286.112449] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 286.119749] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.127037] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fda5d3526d4 [ 286.134319] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 286.141624] CPU: 1 PID: 9070 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 286.149447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.158798] Call Trace: [ 286.158818] dump_stack+0x142/0x197 [ 286.158840] should_fail.cold+0x10f/0x159 [ 286.158859] should_failslab+0xdb/0x130 [ 286.158872] kmem_cache_alloc_node_trace+0x280/0x770 [ 286.158889] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 286.183718] __kmalloc_node+0x3d/0x80 [ 286.187516] kvmalloc_node+0x4e/0xe0 [ 286.191223] alloc_fdtable+0xcf/0x280 [ 286.195020] dup_fd+0x693/0xa40 [ 286.198486] copy_process.part.0+0x1b5a/0x6a00 [ 286.203114] ? save_trace+0x290/0x290 [ 286.206916] ? proc_fail_nth_write+0x7d/0x180 [ 286.211407] ? proc_cwd_link+0x1b0/0x1b0 [ 286.215480] ? __cleanup_sighand+0x50/0x50 [ 286.219712] ? lock_downgrade+0x740/0x740 [ 286.223859] _do_fork+0x19e/0xce0 [ 286.227322] ? fork_idle+0x280/0x280 [ 286.231037] ? fput+0xd4/0x150 [ 286.234226] ? SyS_write+0x15e/0x230 [ 286.237937] SyS_clone+0x37/0x50 [ 286.241290] ? sys_vfork+0x30/0x30 [ 286.244875] do_syscall_64+0x1e8/0x640 [ 286.248780] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 286.253659] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.258873] RIP: 0033:0x45a639 [ 286.262058] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 286.269768] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 286.277032] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 286.284291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.291550] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 286.298810] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f0000000080)={{0x7, 0x37, 0x6b, 0x4, 0x20, 0xfe}, 0x4, 0x1, 0x3}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x2100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f0000000040)={0x8001006, 0x1ff, 0x2}) syz_open_dev$usbmon(&(0x7f0000000000)='\x7fdev/usbmon\x05\x00', 0x1000000000000, 0x0) 04:42:58 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="856274a814faa783086a7af8cedf3e0629a35fbe7f8154c909aafd8270148be04e8960b57120b8e8d5b73364e1ee6a9da536f09f21dccbc9ef74885a3758ea1d7768432bddc6e93d6766bab77c7a18d80f7c1a5604c0f1", 0x57, 0xfffffffffffffffd) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000001740)='/selinux/checkreqprot\x00', 0x208001, 0x0) ioctl$USBDEVFS_IOCTL(r2, 0xc0105512, &(0x7f0000001780)=@usbdevfs_disconnect={0x1}) keyctl$describe(0x6, r1, &(0x7f0000000100)=""/71, 0x47) preadv(r0, &(0x7f0000001680)=[{&(0x7f0000000180)=""/18, 0x12}, {&(0x7f00000001c0)=""/58, 0x3a}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/82, 0x52}, {&(0x7f0000001280)=""/134, 0x86}, {&(0x7f0000001340)=""/250, 0xfa}, {&(0x7f0000001440)=""/211, 0xd3}, {&(0x7f0000001540)=""/180, 0xb4}, {&(0x7f0000001600)=""/66, 0x42}], 0x9, 0x6) r3 = syz_open_dev$sndpcmp(&(0x7f00000017c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000001800), &(0x7f0000001840)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 4: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000000)) 04:42:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x40000, 0x0) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='systemtrusted\x00', &(0x7f0000000140)='em06]}\x00', &(0x7f0000000180)='wlan1!user\x00'], &(0x7f00000003c0)=[&(0x7f0000000200)='ppp0\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='em1\x00', &(0x7f00000002c0)='$\x00', &(0x7f0000000300)='systemtrusted%ppp0nodev\x00', &(0x7f0000000340)='.\x00', &(0x7f0000000380)='@securitymime_type]vboxnet1.em1\'\x00'], 0x800) 04:42:58 executing program 5 (fault-call:1 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 4: r0 = getpid() perf_event_open(&(0x7f000001d000)={0xb8d7c32a0676219b, 0x70, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe}, r0, 0x0, 0xffffffffffffffff, 0x8) r1 = open$dir(&(0x7f0000001180)='./file0\x00', 0x100, 0x8) pwritev(r1, &(0x7f00000022c0), 0x0, 0x3) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0x2, 0x0) write$FUSE_IOCTL(r2, &(0x7f0000000040)={0x20, 0xb5598c5e40aa00a6, 0x3, {0x0, 0x8, 0xd2, 0x401}}, 0x20) 04:42:58 executing program 0: prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) ioctl$DRM_IOCTL_RM_CTX(r0, 0xc0086421, &(0x7f0000000040)={0x0, 0x2}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x10, r2, 0x99abc000) 04:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x3, &(0x7f0000000040)={0x7, &(0x7f0000000000)=[{0x2, 0xf1, 0x3, 0x7}, {0x2, 0x4, 0x3, 0xfffff001}, {0x58e4, 0x0, 0xfd, 0x38000000}, {0x7fff, 0x20, 0x20, 0x2}, {0x0, 0x4, 0x5, 0x1}, {0x81, 0x3, 0x5, 0xb2}, {0x6, 0x9, 0x1, 0x3}]}) [ 286.494724] FAULT_INJECTION: forcing a failure. [ 286.494724] name failslab, interval 1, probability 0, space 0, times 0 04:42:58 executing program 4: syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x2, 0xffffffffffffff67, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xf, 0xffffffffffffffff, 0x8) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x100000001, 0x20000) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_HYPERV_EVENTFD(r1, 0x4018aebd, &(0x7f0000000040)={0x1, r2}) clone(0x3000000a0159001, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 1: r0 = getgid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_GET_SECCOMP(0x15) dup2(r1, r1) fstat(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000140)=0x0, &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r8 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r9, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x1, r4}, {}, {0x2, 0x1, r5}, {0x2, 0x0, r6}], {0x4, 0x1}, [{}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x0, r7}, {0x8, 0x1}, {0x8, 0x4, r9}, {0x8, 0x0, r10}]}, 0x7c, 0x2) r11 = socket$inet6_tcp(0xa, 0x1, 0x0) r12 = dup2(r11, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) fchownat(r12, &(0x7f0000000040)='./file1\x00', r3, 0xee01, 0x1000) setresgid(r0, r2, r7) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x768d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 286.587421] CPU: 0 PID: 9095 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 286.595295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.604679] Call Trace: [ 286.607297] dump_stack+0x142/0x197 [ 286.610966] should_fail.cold+0x10f/0x159 [ 286.615161] should_failslab+0xdb/0x130 [ 286.619189] kmem_cache_alloc+0x2d7/0x780 [ 286.623478] ? dup_fd+0x533/0xa40 [ 286.627034] copy_fs_struct+0x43/0x2d0 [ 286.630952] copy_process.part.0+0x3924/0x6a00 04:42:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) syncfs(r2) r3 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r3, 0x80084504, &(0x7f0000000180)=""/206) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000080)=""/211) [ 286.635575] ? save_trace+0x290/0x290 [ 286.639401] ? proc_fail_nth_write+0x7d/0x180 [ 286.643908] ? proc_cwd_link+0x1b0/0x1b0 [ 286.643941] ? __cleanup_sighand+0x50/0x50 [ 286.652222] ? lock_downgrade+0x740/0x740 [ 286.652251] _do_fork+0x19e/0xce0 [ 286.652270] ? fork_idle+0x280/0x280 [ 286.663864] ? fput+0xd4/0x150 [ 286.667077] ? SyS_write+0x15e/0x230 [ 286.670814] SyS_clone+0x37/0x50 [ 286.674196] ? sys_vfork+0x30/0x30 [ 286.677761] do_syscall_64+0x1e8/0x640 [ 286.681656] ? trace_hardirqs_off_thunk+0x1a/0x1c 04:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000000)=""/140, &(0x7f00000000c0)=0x8c) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r1, 0x810c5701, &(0x7f0000000100)) [ 286.681683] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 286.681694] RIP: 0033:0x45a639 [ 286.681702] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 286.702640] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 286.709935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 286.717235] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 286.724530] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:42:58 executing program 3: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000000}, 0x80, 0x1, 0x0, 0x7}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SCSI_IOCTL_START_UNIT(r1, 0x5) clone(0x3000000e91e8101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0x7, &(0x7f0000000000)={0x8, 0x5, 0x5, 0x6}, 0x10) socket(0x5864c9e6a7389c0d, 0x2, 0x1) [ 286.731826] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 286.739566] audit: type=1400 audit(1574656978.550:47): avc: denied { map } for pid=9115 comm="syz-executor.0" path="/root/syzkaller-testdir756604797/syzkaller.5MLSCC/65" dev="sda1" ino=16696 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=dir permissive=1 04:42:58 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x248281, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x100, 0x8) 04:42:58 executing program 5 (fault-call:1 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x900, 0x0, 0x1, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) read$usbmon(r0, &(0x7f0000000040)=""/167, 0xa7) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 286.953629] FAULT_INJECTION: forcing a failure. [ 286.953629] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 286.965497] CPU: 1 PID: 9163 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 286.973316] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.982699] Call Trace: [ 286.985315] dump_stack+0x142/0x197 [ 286.988993] should_fail.cold+0x10f/0x159 [ 286.993182] __alloc_pages_nodemask+0x1d6/0x7a0 [ 286.997874] ? fs_reclaim_acquire+0x20/0x20 [ 287.002229] ? __alloc_pages_slowpath+0x2930/0x2930 [ 287.007328] cache_grow_begin+0x80/0x400 [ 287.011940] kmem_cache_alloc+0x6a6/0x780 [ 287.016114] ? dup_fd+0x533/0xa40 [ 287.019628] copy_fs_struct+0x43/0x2d0 [ 287.023536] copy_process.part.0+0x3924/0x6a00 [ 287.028170] ? save_trace+0x290/0x290 [ 287.028186] ? proc_fail_nth_write+0x7d/0x180 [ 287.028199] ? proc_cwd_link+0x1b0/0x1b0 [ 287.028237] ? __cleanup_sighand+0x50/0x50 [ 287.028251] ? lock_downgrade+0x740/0x740 [ 287.028277] _do_fork+0x19e/0xce0 04:42:58 executing program 1: r0 = open(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) timerfd_gettime(r4, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000200)=ANY=[@ANYBLOB="000009030180c2020003ffffffffffffaaaaaaaaaaaa0180c2feffffff05f837a0f7aaaaaaaaaabbaaaaaaaaaaaaac9141bab2f9ffffffffffff231ce1891d4fe14af617d36829c6e7e327b37fd0"]) fchmod(r0, 0x6741576111f67cdd) socket$inet6_dccp(0xa, 0x6, 0x0) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_ro(r8, &(0x7f00000006c0)='pids.current\x00', 0x0, 0x0) getsockname$llc(r9, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0x4) syz_open_dev$usbmon(&(0x7f0000000000)='-dev/usbmon#\x00', 0x0, 0x204000) creat(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x5b) 04:42:58 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$kcm(0x29, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @remote}}, 0xdff, 0x6, 0x7fffffff, 0x5, 0xfffffffa}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000140)={r3, 0x40}, &(0x7f0000000180)=0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$cont(0x18, r4, 0xfffffffffffffff9, 0x0) 04:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:59 executing program 3: write$capi20(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x1, 0x88, 0x82, 0x0, 0x9217}, 0x10) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 287.028299] ? fork_idle+0x280/0x280 [ 287.028320] ? fput+0xd4/0x150 [ 287.028336] ? SyS_write+0x15e/0x230 [ 287.028358] SyS_clone+0x37/0x50 [ 287.028367] ? sys_vfork+0x30/0x30 [ 287.028388] do_syscall_64+0x1e8/0x640 [ 287.028399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.028432] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.028444] RIP: 0033:0x45a639 [ 287.028456] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 [ 287.087335] ORIG_RAX: 0000000000000038 [ 287.096741] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 04:42:59 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x2, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x5, 0x0}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000080)={r1, 0x200000}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6(0xa, 0x1, 0xf6) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x17, &(0x7f0000000100)={r4, 0x0, 0x73, "988ec1d6ebcc5f38540138a9673779f2d2ab5fb4ee191028cb850eb39fd959a85273b2d6e76ada67316ad899724ec5abf0a76052190922b66880644439a544273fd712e6318ee2f8797df4f5814440c3725d6669fa40a4aafe585a9a6bc38fc0a52f0351390e24454b77925e3d109b30cf36b5"}, 0x7b) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c, 0x0) 04:42:59 executing program 1: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r1, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x109) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000200)={0x1, 0x40}, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={@null=' \x00', 0xc, 'vxcan1\x00'}) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xda, 0x0, 0x7, 0x0, 0x0, 0x0, 0x20048, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x1, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, &(0x7f00000001c0)=0x7) 04:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x0, 0x2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) 04:42:59 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(0xffffffffffffffff, r1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000080)={'icmp\x00'}, &(0x7f00000000c0)=0x1e) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 287.096750] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 287.096758] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.096767] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 287.096775] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 287.203660] Unknown ioctl 1074816055 [ 287.239299] Unknown ioctl 1074816055 04:42:59 executing program 5 (fault-call:1 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = accept4$ax25(r1, &(0x7f0000000000)={{0x3, @netrom}, [@default, @default, @netrom, @netrom, @null, @null, @bcast, @null]}, &(0x7f0000000080)=0x48, 0x80000) ioctl$SIOCAX25OPTRT(r2, 0x89e7, &(0x7f00000000c0)={@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2, 0x56}) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = accept(r4, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @remote}}, &(0x7f0000000200)=0x80) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000300)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2001011}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x7c, r3, 0x828, 0x70bd28, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r5}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xf6c}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1f}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$vimc2(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/video2\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x80000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1}, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001780)='/dev/dlm_plock\x00', 0x84200, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) read(r2, &(0x7f0000000680)=""/4096, 0x2ad) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r3, r3) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000001740)=0x20) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000001b00000005000000200500008803000088030000880300000000000000000000880400008804000088040000880400008804000005000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'/80], @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000013801000000000000000000000000000000000000000000000000280069636d700000000000000000000000000000000000000000000000000000124308000000000040007365740000000000000000000000000000000000000000000000000000000900000008000000feffffff000400000800000007000000001000008003000038004d415351554552414445000000000000000000000000000000000000000001000000703653cc00000000e00000024e2200640000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d80010010000000000000000000000000000000000000000000000004000736574000000000000000000000000000000000000000000000000000000214a00000700000009000000080000003f00000000000400010001000701000038004e45544d415000000000000000000000000000000000000000000000000001000000000000007f0000010000cf2b4e200100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000014001000000000000000000000000000000000000000000000000280069636d7000000000000000000000000000000000000000000000000000001aa4090100000000400073657400000000000000000000000000000000000000000000000000000007000000018000000000000000010000550c0000050000000007000001f7000040005443504f50545354524950000000000000000000000000000000000000000300000007000000000000000100000059070000020000001f000000b4000000ac1414bbac1e0001ffffff00ffffff006772653000000000000000000000000069703665727370616e300000000000000000000000000000000000007f0000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000059a302100000000000000000000000000000c80000010000000000000000000000000000000000000000000000003000616800000000000000000000000000000000000000000000000000000000ff010000615d0000010000000000000038005245444952454354000000000000000000000000000000000000000000000100000008000000e0000002ac1414aa0900006700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x580) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000001680)) 04:42:59 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace(0x4208, r3) r4 = getpgrp(r3) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) kcmp$KCMP_EPOLL_TFD(r2, r4, 0x7, r1, &(0x7f0000000080)={r5, r0, 0x4}) 04:42:59 executing program 2: r0 = getpid() r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x323}, 0x0, 0xfffffffffffffffb, 0x0, 0x9, 0x7fffffff, 0x0, 0x2}, r0, 0x3, 0xffffffffffffffff, 0x2) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = dup3(r1, r2, 0x80000) r4 = open(&(0x7f0000000580)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0x80) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r4, 0x10e, 0x4, &(0x7f00000000c0)=0x3ff, 0x4) setsockopt$inet6_udp_int(r3, 0x11, 0x39, &(0x7f0000000000)=0x4, 0x4) keyctl$get_keyring_id(0x0, 0x0, 0x7f) syz_open_dev$sndmidi(&(0x7f00000002c0)='/dev/snd/midiC#D#\x00', 0x7, 0x400800) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000140)='y\x00', 0x2, 0x1) r7 = accept4$llc(r6, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f00000001c0)=0x10, 0x80000) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) name_to_handle_at(r9, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000340)={0x8d, 0x3, "42c40b63aa9554044be9b5705d0cfeb147cd88ceeb15d053ed8a53fc27dfb34ed84e70febb4808818ccefe48264b29e7baeadaffffd9f805a61f4b4abcc154ae9f2dde93ce54438b9faeed0d92aebe9ca25721d5e230c70c9882edf59ef7deb5173d986206cc219e37e25d22e5812705e4dedb25e4bf0181279ef44bb94a4d4b058148d6fd"}, &(0x7f0000000280), 0x400) fcntl$getown(r7, 0x9) getdents64(r2, &(0x7f0000000040)=""/89, 0x59) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r5, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) setresuid(r3, r5, r6) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$UFFDIO_WAKE(0xffffffffffffffff, 0x8010aa02, &(0x7f0000000140)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r7, 0x6741576111f67cdd) mkdirat(r7, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r7, 0x89e2, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$IMCTRLREQ(r8, 0x80044945, &(0x7f0000000200)={0x4000, 0xf0000000, 0x7, 0x10000}) open_by_handle_at(r0, &(0x7f0000000480)={0x1008, 0x6, "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"}, 0x2100) connect$netlink(r0, &(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x1000}, 0xc) [ 287.358662] FAULT_INJECTION: forcing a failure. [ 287.358662] name failslab, interval 1, probability 0, space 0, times 0 04:42:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000000)={{0x5, 0x4, 0xffffff7f, 0x7, '\x00', 0xffffff01}, 0x0, [0x1, 0x1, 0x7c0b, 0x4, 0x5, 0x80000000, 0x4, 0x5, 0x6, 0x8, 0x2, 0x4, 0xf4a, 0x1, 0x1a9, 0x401, 0xc2c, 0x2, 0xa5f, 0x6, 0x8, 0x7fff, 0x3, 0x9aae, 0x1f, 0x20, 0x3, 0x10001, 0x1d91, 0xa1, 0x25f, 0x0, 0x37, 0x2, 0x59cf7716, 0x5, 0xffffffffffffffe1, 0x8, 0x6f, 0xf800000000000000, 0x9, 0x4, 0x55d899df, 0x8, 0x6, 0x6, 0x6de19c79, 0x5a, 0x81, 0xd1, 0x40b, 0xff, 0x200, 0x7fffffff, 0x2, 0x4, 0x1f, 0x8001, 0x91de, 0x7ff, 0x1, 0x100000001, 0x4, 0x10000, 0x2bc3, 0x0, 0x6b3fa193, 0x0, 0x1f, 0x80000000, 0xfe, 0x7, 0x3f, 0x0, 0x8, 0x7, 0x9, 0x0, 0x5, 0x2, 0x1, 0x21, 0x1, 0xdf, 0x78da59ff, 0x0, 0x81, 0x7fffffff, 0x5, 0x8001, 0x77, 0x200000000000, 0x9, 0x8, 0x7b3, 0x7fffffff, 0x7, 0x7af, 0x8, 0x4, 0x1800000000000000, 0x1, 0x0, 0x2, 0x0, 0xaa8c, 0x4, 0x40, 0x8, 0x3, 0x5, 0x4, 0x9, 0x8001, 0x2, 0x40, 0x8, 0x1, 0xba4, 0x3, 0x7, 0x7, 0x9, 0x599, 0x8000, 0x5, 0x70f, 0xcac], {0x77359400}}) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000180)=[@in6={0xa, 0x6e55, 0x9, @ipv4={[], [], @loopback}, 0x4}, @in6={0xa, 0x4e22, 0x7fffffff, @rand_addr="7206d8274ea885a073e3acd775944b0c", 0x80}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e20, @loopback}], 0x78) ioctl$KVM_X86_SETUP_MCE(r0, 0x4008ae9c, &(0x7f0000000140)={0x9, 0x0, 0x8}) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4800, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000040)="b49447c29704a83c22a30b6663cefecbd1ae0190d4d3a4fcbcb08cb8aaf76b5bf14aff387e5ac1dcf76e658dee53aa9bf92f934a05c343f3019d655506cf2c8bfcd1334f1f22b449a389d3669e037fc93c4b7742b75c1929dfeb92feff00c6986d0d8f3b47f4110938d68fbffd43c880d224272a08034a4ca75a8da2ee092fd92b1181abefe2c9a1e7a3afadadfff750181e1c69276958450ac4a38f38d2175c125632234075c5090e46bca92e41697e82194eba6b1e86e27b9bc6132c4769ddac6807d323442f9adc746d413b1d201e2e1537dbc1239bb9100d5ec38db2f5b2e980ba1d4c5911615eb0", 0x3d7) [ 287.494505] CPU: 0 PID: 9228 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 287.502640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.512156] Call Trace: [ 287.514785] dump_stack+0x142/0x197 [ 287.518459] should_fail.cold+0x10f/0x159 [ 287.522646] should_failslab+0xdb/0x130 [ 287.526654] kmem_cache_alloc+0x2d7/0x780 [ 287.530821] ? do_raw_spin_unlock+0x16b/0x260 [ 287.535417] ? _raw_spin_unlock+0x2d/0x50 [ 287.539611] copy_process.part.0+0x3987/0x6a00 [ 287.544246] ? save_trace+0x290/0x290 [ 287.548080] ? proc_fail_nth_write+0x7d/0x180 [ 287.552606] ? proc_cwd_link+0x1b0/0x1b0 [ 287.556722] ? __cleanup_sighand+0x50/0x50 [ 287.561158] ? lock_downgrade+0x740/0x740 [ 287.565333] _do_fork+0x19e/0xce0 [ 287.568816] ? fork_idle+0x280/0x280 [ 287.572554] ? fput+0xd4/0x150 [ 287.575780] ? SyS_write+0x15e/0x230 [ 287.579520] SyS_clone+0x37/0x50 [ 287.582900] ? sys_vfork+0x30/0x30 [ 287.586473] do_syscall_64+0x1e8/0x640 04:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x40, 0x105000) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e20, 0x10001, @remote, 0x10001}}, 0xff, 0x1000, 0x80000000, 0x7, 0x7fff}, &(0x7f0000000180)=0x98) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x90, &(0x7f00000001c0)=[@in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x7, @empty, 0x8}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e24, 0x55, @dev={0xfe, 0x80, [], 0x22}, 0x7fff}, @in6={0xa, 0x4e21, 0x7ff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xb3e}, @in6={0xa, 0x4e20, 0x2d, @empty, 0x3}]}, &(0x7f00000002c0)=0x10) connect$rxrpc(0xffffffffffffffff, &(0x7f0000000400)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e23, 0x1e9b, @ipv4={[], [], @multicast2}, 0xa1}}, 0x24) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000300)={r1, 0x401, 0x200, 0x2, 0xe12, 0x9, 0x9, 0x8, {r4, @in={{0x2, 0x4e20, @multicast1}}, 0xb5, 0x7, 0x0, 0x9, 0x2}}, &(0x7f00000003c0)=0xb0) 04:42:59 executing program 4: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r0) r1 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', r0) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) socket$pptp(0x18, 0x1, 0x2) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x3f) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r4, 0x40045564, 0x5) keyctl$instantiate(0xc, r1, 0x0, 0x0, r2) ioctl$MON_IOCQ_RING_SIZE(0xffffffffffffffff, 0x9205) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000600)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r5, 0x84, 0x16, &(0x7f0000000640)={0x2, [0x0, 0xfff9]}, &(0x7f0000000680)=0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x1) r1 = syz_open_procfs(0x0, 0x0) preadv(r1, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r2}, 0xc) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000800}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)=@mpls_delroute={0x134, 0x19, 0x200, 0x70bd29, 0x25dfdbff, {0x1c, 0x4, 0x54777ab8e6d8c553, 0xa3, 0xff, 0x4, 0x88d3ec9b83d494b7, 0x7, 0x100}, [@RTA_OIF={0x8, 0x4, r2}, @RTA_NEWDST={0x84, 0x13, [{0xffff9, 0x0, 0x1}, {0x7}, {0xffff7}, {0x380}, {0x7f, 0x0, 0x1}, {0x400}, {0x2, 0x0, 0x1}, {0x2}, {0x4}, {0x5}, {0x3ff, 0x0, 0x1}, {0x3ff}, {0xffffa, 0x0, 0x1}, {0x81}, {0x4d39}, {0x75}, {0x8001, 0x0, 0x1}, {0xffeff}, {0x3, 0x0, 0x1}, {0x100}, {0xb2c}, {0x9}, {0x40000}, {0x4, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x3f}, {0x100, 0x0, 0x1}, {0x9}, {0xff}, {0x1000, 0x0, 0x1}, {0xfff, 0x0, 0x1}, {0x1ff, 0x0, 0x1}]}, @RTA_NEWDST={0x84, 0x13, [{0x23b6, 0x0, 0x1}, {0x7}, {0x100, 0x0, 0x1}, {0x5bd9, 0x0, 0x1}, {0x80}, {0x4}, {0x8000, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x47}, {0x40, 0x0, 0x1}, {0x9, 0x0, 0x1}, {0x4}, {}, {0x3ff}, {0x101, 0x0, 0x1}, {0xffffa}, {0x9, 0x0, 0x1}, {0x4}, {}, {0x981}, {0x0, 0x0, 0x1}, {0x2}, {0x100}, {0x9}, {0x200, 0x0, 0x1}, {0xfff2a}, {0x1, 0x0, 0x1}, {0x6, 0x0, 0x1}, {0xb8}, {0x800, 0x0, 0x1}, {0x40, 0x0, 0x1}, {0x2}]}, @RTA_TTL_PROPAGATE={0x8}]}, 0x134}, 0x1, 0x0, 0x0, 0x4}, 0x10) 04:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x1}, 0x0, 0xb36, 0x7fbd}, 0x0, 0x4, 0xffffffffffffffff, 0x3) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x101001, 0x0) read$char_usb(r1, &(0x7f0000000480)=""/194, 0xc2) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000340)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={0xffffffffffffffff, &(0x7f00000001c0)="71cd583968044d73a84ed6e8fc0e845596c6052aef9031d980a4d969871c953be53b543b864f1e05f14bf5470591f8c13fe44faa9249d58f4623303e499b8073b9b8c036ff38c78fc29364979f2df85c5c6e8ef5d18265c4b76ec809e9a17caca69cef5209a72ee20309427483e2b5ce59546bfa1f7925ac94ca3333be7133696ebfb5574b576bbc29716713530442ee378ee614416b8627ceefaca6779d91185b2c2730ddbab4"}, 0x20) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000000c0)={r2, @in6={{0xa, 0x4e21, 0x1, @rand_addr="69e8175013a2b7a9126b1b881f3717b4", 0x8}}}, &(0x7f0000000180)=0x84) [ 287.590418] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.595305] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.600509] RIP: 0033:0x45a639 [ 287.603711] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 287.611447] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 287.618738] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 287.626036] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.633329] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 287.640619] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:42:59 executing program 5 (fault-call:1 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r0, 0x200, 0x70bd2c, 0x27dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0xffffffffffffffbe, 0x8, 0x7}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bridge\x00'}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4084}, 0x4) r1 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x6127, 0x50080) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') r3 = socket$nl_crypto(0x10, 0x3, 0x15) accept4(r3, 0x0, &(0x7f0000000340), 0x80000) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000380), &(0x7f00000003c0)=0x4) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, r2, 0x1, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0xb47}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x8000) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:42:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x2, 0x40400) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000040)=0x915) 04:42:59 executing program 2: mount(&(0x7f0000000040)=@filename='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x1001004, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0x37) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r1, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000580)=ANY=[@ANYBLOB="0400000000000000000000000000000000080000009b000000fcffffff0000000000000000000000000000000000000000050000000100000000000000000000003bffffff06000000680000000000000000000000000000000000000000000000640200000400000000000000000000000400000081000000000000000000000010000000000000000000000000000000ff010000040000000000000000000000310000000b9c0000000000000000000000000000000000000000000000000000482371f5e44bfc0f6ab86471bd4c640154493210f8257bdf33d400000000000000"]) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x7, &(0x7f0000000300), 0x4) splice(r3, &(0x7f00000002c0)=0x5, r4, &(0x7f0000000300)=0x2, 0x5, 0xe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[@ANYBLOB="448a84011be2ff0008000000000000004e555c400d7b08e5cf2996bb12f77af3"], 0x1}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0xff], 0x1f004, 0x38c810}) ioctl$KVM_RUN(r5, 0xae80, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000040)=ANY=[], 0x6db6e559) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r6, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) accept4$vsock_stream(r0, &(0x7f0000000080)={0x28, 0x0, 0xfffffffe, @hyper}, 0x10, 0xc00) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x928c, 0x6d3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x800900, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000040)={0x3d, 0x2}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 287.736815] FAULT_INJECTION: forcing a failure. [ 287.736815] name failslab, interval 1, probability 0, space 0, times 0 [ 287.749004] audit: type=1400 audit(1574656979.710:48): avc: denied { create } for pid=9272 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 287.798900] CPU: 1 PID: 9279 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 287.806763] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 287.816139] Call Trace: [ 287.818749] dump_stack+0x142/0x197 [ 287.822408] should_fail.cold+0x10f/0x159 [ 287.826593] should_failslab+0xdb/0x130 [ 287.830593] kmem_cache_alloc+0x2d7/0x780 [ 287.834905] ? selinux_capable+0x36/0x40 [ 287.838998] create_new_namespaces+0x34/0x720 [ 287.843589] ? ns_capable_common+0x12c/0x160 [ 287.845667] audit: type=1400 audit(1574656979.750:49): avc: denied { accept } for pid=9272 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 [ 287.848019] copy_namespaces+0x284/0x310 [ 287.848038] copy_process.part.0+0x2603/0x6a00 [ 287.848065] ? proc_fail_nth_write+0x7d/0x180 [ 287.885667] ? proc_cwd_link+0x1b0/0x1b0 [ 287.889780] ? __cleanup_sighand+0x50/0x50 [ 287.894036] ? lock_downgrade+0x740/0x740 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @rand_addr=0x1000}, 0x10) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x206040, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800006}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x8, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x81}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x4002000) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 287.898225] _do_fork+0x19e/0xce0 [ 287.901708] ? fork_idle+0x280/0x280 [ 287.905450] ? fput+0xd4/0x150 [ 287.908685] ? SyS_write+0x15e/0x230 [ 287.912521] SyS_clone+0x37/0x50 [ 287.915901] ? sys_vfork+0x30/0x30 [ 287.919462] do_syscall_64+0x1e8/0x640 [ 287.923367] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 287.928248] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 287.933546] RIP: 0033:0x45a639 [ 287.936770] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:42:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x28000, 0x10) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x3, 0x70, 0x5, 0x5, 0x0, 0x2a, 0x0, 0x7ff, 0x14052, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x400, 0xffffffff}, 0x2000, 0x6, 0x0, 0x0, 0x11e76fb9, 0x7, 0xce0}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 287.944502] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 287.951794] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 287.959083] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 287.966369] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 287.973661] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:00 executing program 5 (fault-call:1 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6617938e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x244c00, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) perf_event_open(&(0x7f00000005c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x4182) r2 = memfd_create(&(0x7f0000000240)='.^\x00', 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r1, 0x0, 0x24000058) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)={r3, 0xfffe, 0x7, [0x9, 0xffff, 0x21, 0x2, 0x0, 0x0, 0x5]}, 0x16) write$eventfd(r0, &(0x7f0000000080)=0x7, 0x8) 04:43:00 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ethernet={0x0, @local}, &(0x7f0000000080)=0x80, 0x800) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000100)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000008}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x9c, r1, 0x511, 0x70bd26, 0x25dfdbfc, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}, {0x8}}]}, 0x9c}, 0x1, 0x0, 0x0, 0x1840}, 0x40000) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 288.154806] FAULT_INJECTION: forcing a failure. [ 288.154806] name failslab, interval 1, probability 0, space 0, times 0 [ 288.173074] CPU: 1 PID: 9338 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 288.180919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.190297] Call Trace: [ 288.192889] dump_stack+0x142/0x197 [ 288.196515] should_fail.cold+0x10f/0x159 [ 288.200663] should_failslab+0xdb/0x130 [ 288.204628] kmem_cache_alloc+0x2d7/0x780 [ 288.208774] ? perf_trace_lock_acquire+0x34a/0x4f0 [ 288.213713] alloc_vfsmnt+0x28/0x7d0 [ 288.217510] clone_mnt+0x70/0xee0 [ 288.220960] copy_tree+0xd0/0x8a0 [ 288.224427] copy_mnt_ns+0x11c/0x8c0 [ 288.228133] ? kmem_cache_alloc+0x611/0x780 [ 288.232450] ? selinux_capable+0x36/0x40 [ 288.236508] create_new_namespaces+0xc9/0x720 [ 288.241015] ? ns_capable_common+0x12c/0x160 [ 288.245454] copy_namespaces+0x284/0x310 [ 288.249535] copy_process.part.0+0x2603/0x6a00 [ 288.254129] ? proc_fail_nth_write+0x7d/0x180 [ 288.258618] ? proc_cwd_link+0x1b0/0x1b0 [ 288.262690] ? __cleanup_sighand+0x50/0x50 [ 288.266933] ? lock_downgrade+0x740/0x740 [ 288.271078] _do_fork+0x19e/0xce0 [ 288.274531] ? fork_idle+0x280/0x280 [ 288.278250] ? fput+0xd4/0x150 [ 288.281436] ? SyS_write+0x15e/0x230 [ 288.285144] SyS_clone+0x37/0x50 [ 288.288495] ? sys_vfork+0x30/0x30 [ 288.292028] do_syscall_64+0x1e8/0x640 [ 288.295904] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.300745] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.305929] RIP: 0033:0x45a639 [ 288.309106] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 288.316804] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 288.324062] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 288.331322] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.338580] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 288.345839] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x20, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffff0001}]}]}, 0x20}}, 0x0) 04:43:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f00000000c0)={0xa0, 0x19, 0x1, {0x44, {0x98, 0x2, 0x6}, 0x118, r1, r2, 0x9, 0x8b, 0x41b, 0x8000, 0x6, 0x0, 0x8, 0xfff, 0x5, 0x5, 0x101, 0x7, 0xffffffff00000001, 0x200, 0x9}}, 0xa0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 5 (fault-call:1 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 0: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x5, 0x60}, r0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f0000000100)={&(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0], 0x5, 0x5, 0x2, 0x4}) 04:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)) r1 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r1) keyctl$unlink(0x9, r1, 0xfffffffffffffffa) ioctl$SIOCRSGCAUSE(r0, 0x89e0, 0xfffffffffffffffd) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2000000, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_GET_FPU(r3, 0x81a0ae8c, &(0x7f00000000c0)) 04:43:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x600, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000100)={'broute\x00', 0x0, 0x3, 0x6d, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=""/109}, &(0x7f0000000180)=0x78) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_ASSIGN_PCI_DEVICE(r2, 0x8040ae69, &(0x7f0000000200)={0x8, 0x2, 0x1, 0x6, 0x101}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(0xffffffffffffffff, 0x2288, &(0x7f00000001c0)) 04:43:00 executing program 3: keyctl$invalidate(0x15, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 288.624507] FAULT_INJECTION: forcing a failure. [ 288.624507] name failslab, interval 1, probability 0, space 0, times 0 [ 288.651229] CPU: 1 PID: 9358 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 288.659082] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.668458] Call Trace: [ 288.671078] dump_stack+0x142/0x197 [ 288.674742] should_fail.cold+0x10f/0x159 [ 288.678920] should_failslab+0xdb/0x130 [ 288.682910] kmem_cache_alloc+0x2d7/0x780 [ 288.687074] ? perf_trace_lock_acquire+0x34a/0x4f0 [ 288.692032] alloc_vfsmnt+0x28/0x7d0 [ 288.695763] clone_mnt+0x70/0xee0 [ 288.699236] copy_tree+0xd0/0x8a0 [ 288.699267] copy_mnt_ns+0x11c/0x8c0 [ 288.706423] ? kmem_cache_alloc+0x611/0x780 [ 288.710770] ? selinux_capable+0x36/0x40 [ 288.714850] create_new_namespaces+0xc9/0x720 [ 288.719358] ? ns_capable_common+0x12c/0x160 [ 288.723787] copy_namespaces+0x284/0x310 [ 288.727858] copy_process.part.0+0x2603/0x6a00 [ 288.732461] ? proc_fail_nth_write+0x7d/0x180 [ 288.737049] ? proc_cwd_link+0x1b0/0x1b0 [ 288.741111] ? __cleanup_sighand+0x50/0x50 [ 288.745465] ? lock_downgrade+0x740/0x740 [ 288.749645] _do_fork+0x19e/0xce0 [ 288.753124] ? fork_idle+0x280/0x280 [ 288.756845] ? fput+0xd4/0x150 [ 288.760182] ? SyS_write+0x15e/0x230 [ 288.763909] SyS_clone+0x37/0x50 [ 288.767267] ? sys_vfork+0x30/0x30 [ 288.770816] do_syscall_64+0x1e8/0x640 [ 288.774755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 288.779663] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 288.784944] RIP: 0033:0x45a639 [ 288.788121] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 288.795837] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 288.803099] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 288.810368] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 288.817638] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) connect$netrom(r0, &(0x7f0000000040)={{0x3, @bcast, 0x1}, [@default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000080)=0x1, 0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000480)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x0, @local, 0x1f}, @in={0x2, 0x4e24, @multicast2}], 0x3c) 04:43:00 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20ncci\x00', 0x4000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$FUSE_DIRENT(r1, &(0x7f0000000000)={0x120, 0xfffffffffffffffe, 0x5, [{0x5, 0x401, 0x2a, 0xfff, 'vboxnet1self\'vmnet1/em1systemcpusetmd5sum]'}, {0x3, 0x1, 0x1c, 0x1, 'posix_acl_accessvboxnet1-}lo'}, {0x1, 0x2, 0x0, 0x1}, {0x4, 0x1, 0x4, 0xffff8000, '[^/{'}, {0x0, 0x9, 0x21, 0x7ff, 'wlan0selinuxloproceth0procvmnet0\xc9'}, {0x4, 0x10000, 0x0, 0x4}]}, 0x120) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000140)={{0x297cb87d7d051918, 0x0, @identifier="bf6787a353da2fb12ee2da7c59064b41"}, 0x2d, [], "4c199cacbf79adb61a23f70276cc04c868e387e310193a8f77655e6d4490104e2fce6691b7640c7e0cf91ba8f7"}) [ 288.824895] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:00 executing program 5 (fault-call:1 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x2, 0xa40) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000040)={0x1, 0x8, [0x42d, 0x1]}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=ANY=[@ANYBLOB="02071604020000000e0101000001002025f10f022f5c6b796fdec5eba45d92d5f0b248000b17a103004a076462284d8bf691568bc7fd070165bd1bd624f7030000000060cddccd3758426c871390b0a68fbd3dfc6679b089f6d4abe572ce762d3c9eaf4ded5fef07d8ad4946cf00"/125], 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmmsg(r0, &(0x7f0000000180), 0x400006a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) dup(0xffffffffffffffff) sendmsg$nl_crypto(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000000000000000, 0x0, 0x0, 0x100000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x40, 0x0, 0x0, 0xfffffffffffffc01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0x401}, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x10000) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 04:43:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x501400, 0x0) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)=""/232, &(0x7f0000000140)=0xe8) [ 288.952340] FAULT_INJECTION: forcing a failure. [ 288.952340] name failslab, interval 1, probability 0, space 0, times 0 [ 289.017145] CPU: 0 PID: 9398 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 289.025038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.034414] Call Trace: [ 289.037033] dump_stack+0x142/0x197 [ 289.040705] should_fail.cold+0x10f/0x159 [ 289.044889] should_failslab+0xdb/0x130 [ 289.048893] kmem_cache_alloc+0x2d7/0x780 [ 289.053070] ? lock_downgrade+0x740/0x740 [ 289.057244] alloc_vfsmnt+0x28/0x7d0 [ 289.060985] clone_mnt+0x70/0xee0 [ 289.064456] ? is_subdir+0x222/0x389 [ 289.068201] copy_tree+0x33b/0x8a0 [ 289.071788] copy_mnt_ns+0x11c/0x8c0 [ 289.075526] ? kmem_cache_alloc+0x611/0x780 [ 289.079867] ? selinux_capable+0x36/0x40 [ 289.083957] create_new_namespaces+0xc9/0x720 [ 289.088474] ? ns_capable_common+0x12c/0x160 [ 289.092908] copy_namespaces+0x284/0x310 [ 289.096992] copy_process.part.0+0x2603/0x6a00 [ 289.101614] ? proc_fail_nth_write+0x7d/0x180 [ 289.106135] ? proc_cwd_link+0x1b0/0x1b0 [ 289.110330] ? __cleanup_sighand+0x50/0x50 [ 289.114591] ? lock_downgrade+0x740/0x740 [ 289.118782] _do_fork+0x19e/0xce0 [ 289.122276] ? fork_idle+0x280/0x280 [ 289.126020] ? fput+0xd4/0x150 [ 289.129246] ? SyS_write+0x15e/0x230 [ 289.133001] SyS_clone+0x37/0x50 [ 289.136392] ? sys_vfork+0x30/0x30 [ 289.139966] do_syscall_64+0x1e8/0x640 [ 289.143877] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.148765] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.153976] RIP: 0033:0x45a639 [ 289.157203] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:43:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20012, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x200) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x12d) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000080)={0x8, {{0x2, 0x4e24, @rand_addr=0x3f}}, {{0x2, 0x4e24, @empty}}}, 0x108) 04:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x9, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x6d) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_ENUMAUDIO(r0, 0xc0345641, &(0x7f0000000040)={0xc0e1, "782ebeb043c9c15478cf5a57d8363607c6252e9e96638e2c9142628ea854d102", 0x0, 0x1}) [ 289.164909] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 289.172170] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 289.179448] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.186714] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 289.193978] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 5 (fault-call:1 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x3, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1, 0xfffffffffffffffe}, 0x280f2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs={0x0, 0x0, 0x4e20}, 0x80) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000001080)='/dev/input/mouse#\x00', 0x9, 0x20000) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) open_by_handle_at(r1, &(0x7f00000010c0)={0x45, 0x3, "e5cde095b73827c9286b9315206ce9128014137b838d2e5017c565cf61a0752216a12d578d45a1d6e00618f709ed9912ad7ddcff73f2ca969e1e9324c8"}, 0x20000) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000001140)=0xb000000, &(0x7f0000001180)=0x4) r3 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x10000, 0x48) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000080)=""/4096) [ 289.363726] FAULT_INJECTION: forcing a failure. [ 289.363726] name failslab, interval 1, probability 0, space 0, times 0 [ 289.387493] CPU: 0 PID: 9471 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 289.395360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.404730] Call Trace: [ 289.407327] dump_stack+0x142/0x197 [ 289.410958] should_fail.cold+0x10f/0x159 [ 289.415111] should_failslab+0xdb/0x130 [ 289.419080] kmem_cache_alloc+0x2d7/0x780 [ 289.423218] ? find_held_lock+0x35/0x130 [ 289.427271] ? copy_tree+0x4a2/0x8a0 [ 289.430998] alloc_vfsmnt+0x28/0x7d0 [ 289.434707] clone_mnt+0x70/0xee0 [ 289.438148] ? lock_downgrade+0x740/0x740 [ 289.442287] ? do_raw_spin_unlock+0x16b/0x260 [ 289.446774] copy_tree+0x33b/0x8a0 [ 289.450313] copy_mnt_ns+0x11c/0x8c0 [ 289.454023] ? kmem_cache_alloc+0x611/0x780 [ 289.458337] ? selinux_capable+0x36/0x40 [ 289.462393] create_new_namespaces+0xc9/0x720 [ 289.466879] ? ns_capable_common+0x12c/0x160 [ 289.471541] copy_namespaces+0x284/0x310 [ 289.475596] copy_process.part.0+0x2603/0x6a00 [ 289.480181] ? proc_fail_nth_write+0x7d/0x180 [ 289.484671] ? proc_cwd_link+0x1b0/0x1b0 [ 289.488757] ? __cleanup_sighand+0x50/0x50 [ 289.492982] ? lock_downgrade+0x740/0x740 [ 289.497126] _do_fork+0x19e/0xce0 [ 289.500585] ? fork_idle+0x280/0x280 [ 289.504291] ? fput+0xd4/0x150 [ 289.507481] ? SyS_write+0x15e/0x230 [ 289.511202] SyS_clone+0x37/0x50 [ 289.514556] ? sys_vfork+0x30/0x30 [ 289.518096] do_syscall_64+0x1e8/0x640 [ 289.521978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.526831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.532016] RIP: 0033:0x45a639 [ 289.535542] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 289.543248] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 289.550507] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 04:43:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21200, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) fgetxattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000100)=""/217, 0xd9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 289.557767] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 289.565026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 289.572298] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:01 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ftruncate(r1, 0x3f) 04:43:01 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000040)={0x4, 0x70, 0x0, 0x3, 0x8, 0x9, 0x0, 0x3a, 0x48002, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x1000, 0x100000001, 0xd2c, 0x5, 0x3ff, 0x6d3e}) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$netlink(r2, 0x10e, 0x4, &(0x7f0000000480)=""/4096, &(0x7f0000000140)=0x1000) fsetxattr$security_capability(r1, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000100)=@v1={0x1000000, [{0x8000}]}, 0xc, 0x3) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x2000, 0x0) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f00000000c0)=0x1, 0x4) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_config_ext, 0xcd2}, r1, 0xe, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:01 executing program 5 (fault-call:1 fault-nth:18): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:01 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x8, 0x0, 0x0, 0x4, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x9) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0xfff, 0x49e2ae55282682d3) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(0xffffffffffffffff, 0xc0045516, &(0x7f0000000040)=0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) ptrace$pokeuser(0x6, r3, 0x1, 0xfffffffffffff99e) 04:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_destroy(r0) [ 289.781626] FAULT_INJECTION: forcing a failure. [ 289.781626] name failslab, interval 1, probability 0, space 0, times 0 [ 289.824721] CPU: 0 PID: 9504 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 289.832681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.842062] Call Trace: [ 289.844685] dump_stack+0x142/0x197 [ 289.848357] should_fail.cold+0x10f/0x159 [ 289.852554] should_failslab+0xdb/0x130 [ 289.856563] __kmalloc_track_caller+0x2ec/0x790 [ 289.861271] ? kstrdup_const+0x48/0x60 [ 289.865199] kstrdup+0x3a/0x70 [ 289.868424] kstrdup_const+0x48/0x60 [ 289.872199] alloc_vfsmnt+0xe5/0x7d0 [ 289.875965] clone_mnt+0x70/0xee0 [ 289.879435] ? lock_downgrade+0x740/0x740 [ 289.883608] ? do_raw_spin_unlock+0x16b/0x260 [ 289.888136] copy_tree+0x33b/0x8a0 [ 289.891719] copy_mnt_ns+0x11c/0x8c0 [ 289.895457] ? kmem_cache_alloc+0x611/0x780 [ 289.899814] ? selinux_capable+0x36/0x40 [ 289.903908] create_new_namespaces+0xc9/0x720 [ 289.908429] ? ns_capable_common+0x12c/0x160 [ 289.912868] copy_namespaces+0x284/0x310 [ 289.916955] copy_process.part.0+0x2603/0x6a00 [ 289.921577] ? proc_fail_nth_write+0x7d/0x180 [ 289.926274] ? proc_cwd_link+0x1b0/0x1b0 [ 289.930388] ? __cleanup_sighand+0x50/0x50 [ 289.934658] ? lock_downgrade+0x740/0x740 [ 289.938847] _do_fork+0x19e/0xce0 [ 289.942331] ? fork_idle+0x280/0x280 [ 289.946075] ? fput+0xd4/0x150 [ 289.949293] ? SyS_write+0x15e/0x230 [ 289.953144] SyS_clone+0x37/0x50 [ 289.956527] ? sys_vfork+0x30/0x30 [ 289.960093] do_syscall_64+0x1e8/0x640 [ 289.964014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 289.968896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 289.974226] RIP: 0033:0x45a639 [ 289.977432] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 289.985172] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 289.992464] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 290.004911] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.012206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:43:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x1, 0x2) write$rfkill(r0, &(0x7f0000000140)={0x6083, 0x8}, 0xffffffffffffffed) [ 290.019530] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:02 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x5, 0x408000) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0xfffd}, 0xffffffffffffffff, 0x0, r0, 0x0) clone(0xa314ef4298563f05, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f0000000000)=@req={0x5709e001, 0xfffffffc, 0xa9d, 0x80}, 0x10) 04:43:02 executing program 5 (fault-call:1 fault-nth:19): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f00000001c0)) chdir(&(0x7f0000000100)='./file0\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={0x77359400}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xfffffffffffffffe, 0x2000005) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xcb7f931de45b7c23}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x2, 0x100000050, 0x0, 0x8, 0x1f, 0x0, 0x0, 0xecb7, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8000, 0x0, @perf_config_ext={0x200000000}, 0x20002200b, 0xfffffffffffffffe, 0x1, 0x0, 0x3, 0x0, 0xfffe}, 0x0, 0x2000000209, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000640)='/dev/loop#\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) keyctl$search(0xa, 0x0, &(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket(0x11, 0x80002, 0xcf) close(r4) r5 = socket(0x11, 0x2, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 04:43:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PPPIOCSMRU1(r1, 0x40047452, &(0x7f0000000040)=0x21) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x801) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000080)=0x7, 0x2) [ 290.175748] FAULT_INJECTION: forcing a failure. [ 290.175748] name failslab, interval 1, probability 0, space 0, times 0 [ 290.215578] CPU: 1 PID: 9539 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 04:43:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 290.223564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.232944] Call Trace: [ 290.235559] dump_stack+0x142/0x197 [ 290.239225] should_fail.cold+0x10f/0x159 [ 290.243412] should_failslab+0xdb/0x130 [ 290.247404] kmem_cache_alloc+0x2d7/0x780 [ 290.247423] ? find_held_lock+0x35/0x130 [ 290.255610] ? copy_tree+0x4a2/0x8a0 [ 290.259349] alloc_vfsmnt+0x28/0x7d0 [ 290.263088] clone_mnt+0x70/0xee0 [ 290.266564] ? lock_downgrade+0x740/0x740 [ 290.270737] ? do_raw_spin_unlock+0x16b/0x260 04:43:02 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000140)=ANY=[@ANYBLOB="19d66c1976303981d6e6ab8f289c8c0d8a82023095602131e382c617a1d16a2bf014a307b3a0b9b71f12f9faa5b626d6afd933ab00f7494b4c905fb78800000000"]) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = fcntl$getown(r1, 0x9) getpgid(r2) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x68802, 0x0) [ 290.275254] copy_tree+0x33b/0x8a0 [ 290.278829] copy_mnt_ns+0x11c/0x8c0 [ 290.282553] ? kmem_cache_alloc+0x611/0x780 [ 290.286899] ? selinux_capable+0x36/0x40 [ 290.290989] create_new_namespaces+0xc9/0x720 [ 290.295497] ? ns_capable_common+0x12c/0x160 [ 290.299946] copy_namespaces+0x284/0x310 [ 290.304028] copy_process.part.0+0x2603/0x6a00 [ 290.308820] ? proc_fail_nth_write+0x7d/0x180 [ 290.313789] ? proc_cwd_link+0x1b0/0x1b0 [ 290.317897] ? __cleanup_sighand+0x50/0x50 [ 290.322159] ? lock_downgrade+0x740/0x740 04:43:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x80000) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0x6, 0x9, 0x10000, 0x3, 0x1, 0x9}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 290.326338] _do_fork+0x19e/0xce0 [ 290.329818] ? fork_idle+0x280/0x280 [ 290.333549] ? fput+0xd4/0x150 [ 290.336759] ? SyS_write+0x15e/0x230 [ 290.340494] SyS_clone+0x37/0x50 [ 290.343875] ? sys_vfork+0x30/0x30 [ 290.347455] do_syscall_64+0x1e8/0x640 [ 290.351352] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.356574] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.361773] RIP: 0033:0x45a639 [ 290.364968] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:43:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = gettid() write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x6, {{0x0, 0x6, 0x0, r1}}}, 0x28) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r4, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x9, 0x3, 0x20, 0xffffffc1}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x18004094}, 0x4000000) 04:43:02 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x8, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000e80)=""/205, 0xcd}, 0xe0f5}], 0x1, 0x0, 0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x800, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r5, @ANYBLOB="0a000000000000001c0012000c00010062726964676500000c0002"], 0x3}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r6 = syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0x9, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xa, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100002}, [@map={0x18, 0x4, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @alu={0x4, 0x1, 0x9, 0x0, 0x1, 0x2, 0xfffffffffffffff0}, @call={0x85, 0x0, 0x0, 0x3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}, @generic={0x5, 0x7, 0xc, 0x401}]}, &(0x7f0000000340)='syzkaller\x00', 0x7, 0x19000, &(0x7f0000002900)=""/102400, 0x40f00, 0x2, [], r5, 0x11, r6, 0x8, &(0x7f0000000540)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0xe, 0x3, 0x4}, 0x10}, 0x70) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f0000000340), 0x41395527) vmsplice(r7, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) rmdir(0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0xa4e}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socket(0x840000000002, 0x3, 0x200000000000ff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) pipe(&(0x7f0000000040)) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000400)={0x1f, 0x3, {0x5, 0x3, 0x0, 0x40, 0x4a}, 0x2, 0x8}, 0xe) r9 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000179c694e2e0bcab5900a61b456f5361858fe6da486efc63096ec1640ef281853fce293d74a8c1f04d4051082e123860e048accd1ed840b6e46631bd9bc51a8147000000000080001fb3692cf1de38ed43127fe42862f02500bd0b55a5186f35bfb5e1939dc996699895b946a3ae52f9609a348435efd81f23f0624b604c030000000000000014d901cff52683d0e5a6626d32131deffb99fe09c9d65b9f731a3f747b05b294f18361fd7be0c60300000000000000f117bf277dd013eb00000000000000000000b95b6d7d86eca30edafaa8", @ANYRESHEX=r9, @ANYBLOB="2c726f6f746d6f64653d30303030300101", @ANYRESDEC=0x0, @ANYBLOB="64de0273e2849a9ecd19bee7c455da22f16a2f8acfcc4b44372a12f1070be6559b07606bd6bfc68c7c009c5dc2f6ed859885bfaec981a220aee71a9ac356b0dec04224c0e37707f4fcded71fcc22cee9f511cd09b1366e77818e5966", @ANYRESDEC=0x0]) fcntl$F_GET_FILE_RW_HINT(r9, 0x40d, &(0x7f0000000100)) 04:43:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$inet6(r0, &(0x7f0000000040)="f6b4c3239327cbcf61648aa63373f2a524cdf94b537f733b1b2a3c6bd1a99596c98ee4fdd3a690fc91a46a79a6fba4d73aeb3a7839ef50dba0ea3b506208697eaf0d1483475e39cb799adcf5a50ca8201e467c12f5f82ec01b00eb6ccbbcdc31e76274b901f6e9edb30ce70235cb9fcef0ed133cd20b29b04815ca8d14fb38b934596862d45d270be993135a8b451dc355d059fac86147004c498207e93a487fb1ceddaaa49e9a0b763f", 0xaa, 0xfdf9e22a89bf5e20, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x247cd09f02afac5f, &(0x7f0000000480)=""/246, 0xf6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000180)={0x4, 0x4, 0x9, 'queue0\x00', 0x26f7}) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0x7, 0xfff5, 0x3, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r2, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="80ffffff78000000768aa7c0a9de61789078cbb05d94d9526caf6deaad8b8629690a56a953d4d769774aa642ae96185921ee21d05a37b6781bad19b0d651e7bb9339f3220cb81645fff1daf6e32b59b8715ed23079add00e9b0cc1d31dd1e57cbe66011e2a5de01fea847c149d02be4663ba4560e94a72673d8b968bf16aff10"]) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000000)={0x3}) [ 290.372701] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 290.379986] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 290.387391] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.394683] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 290.401978] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:02 executing program 5 (fault-call:1 fault-nth:20): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 2: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82000) ioctl$KVM_SET_FPU(r0, 0x41a0ae8d, &(0x7f0000000040)={[], 0x46, 0x6, 0x1f, 0x0, 0x8000, 0x2000, 0x2000, [], 0xe0}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000000)) [ 290.647569] FAULT_INJECTION: forcing a failure. [ 290.647569] name failslab, interval 1, probability 0, space 0, times 0 [ 290.678556] CPU: 1 PID: 9579 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 290.686428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.695804] Call Trace: [ 290.698428] dump_stack+0x142/0x197 [ 290.702096] should_fail.cold+0x10f/0x159 [ 290.706284] should_failslab+0xdb/0x130 [ 290.710293] __kmalloc_track_caller+0x2ec/0x790 [ 290.714997] ? kstrdup_const+0x48/0x60 [ 290.718913] kstrdup+0x3a/0x70 [ 290.722156] kstrdup_const+0x48/0x60 [ 290.725896] alloc_vfsmnt+0xe5/0x7d0 [ 290.729641] clone_mnt+0x70/0xee0 [ 290.733112] ? lock_downgrade+0x740/0x740 [ 290.737277] ? do_raw_spin_unlock+0x16b/0x260 [ 290.741798] copy_tree+0x33b/0x8a0 [ 290.745374] copy_mnt_ns+0x11c/0x8c0 [ 290.749114] ? kmem_cache_alloc+0x611/0x780 [ 290.753464] ? selinux_capable+0x36/0x40 [ 290.757561] create_new_namespaces+0xc9/0x720 [ 290.762077] ? ns_capable_common+0x12c/0x160 [ 290.766510] copy_namespaces+0x284/0x310 [ 290.770595] copy_process.part.0+0x2603/0x6a00 [ 290.775217] ? proc_fail_nth_write+0x7d/0x180 [ 290.779735] ? proc_cwd_link+0x1b0/0x1b0 [ 290.783832] ? __cleanup_sighand+0x50/0x50 [ 290.788090] ? lock_downgrade+0x740/0x740 [ 290.792269] _do_fork+0x19e/0xce0 [ 290.795750] ? fork_idle+0x280/0x280 [ 290.799485] ? fput+0xd4/0x150 [ 290.802693] ? SyS_write+0x15e/0x230 [ 290.806426] SyS_clone+0x37/0x50 [ 290.809807] ? sys_vfork+0x30/0x30 [ 290.813365] do_syscall_64+0x1e8/0x640 [ 290.817262] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 290.822137] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 290.827426] RIP: 0033:0x45a639 [ 290.830625] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 290.838368] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 290.845654] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 290.852951] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 290.860237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 290.867525] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_int(r1, &(0x7f0000000040)=0x2, 0x12) 04:43:02 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2002, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$KDENABIO(r0, 0x4b36) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 2: prctl$PR_CAPBSET_READ(0x17, 0xe) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:02 executing program 5 (fault-call:1 fault-nth:21): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 3: openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000040)=0xffffff81, &(0x7f0000000080)=0x4) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x9, 0x2) init_module(&(0x7f0000000140)='/proc/capi/capi20\x00', 0x12, &(0x7f0000000180)='cgroup}ppp1vmnet0eth1\x00') getsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f00000001c0)=0x9, &(0x7f0000000200)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/checkreqprot\x00', 0x200040, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000580)={0x73, &(0x7f0000000500)="1bb9ff9dde585da42cb7db7fc751ebf326695713644f720acc60ccd6829b85ed262993627766df77b7003f1432aa1102e18ca76eeeed1517592408fd43e4114e8092ff971dc4c7818eb3c16795c920c6d4b89aea1cde1cdd881261e967f2a998b236aee52be2ea7dfe09e0594423b255b91849"}) ioctl$VIDIOC_G_PARM(r0, 0xc0cc5615, &(0x7f0000000340)={0x4, @capture={0x52280d6dfbf96a4b, 0x1, {0x1f, 0x4}}}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f0000000440)={0xb8e, 0xb4b0bc4acca5ff9b, 'client1\x00', 0xffffffff80000007, "e6109be809369fc9", "33afc390060434c587651ffac77e4980a7745b509df093be754dc3de4d0b2a38", 0x3, 0x1}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffff45d, 0x4, &(0x7f0000000240)=[{&(0x7f0000000080)="cf04de1e62e6f77d", 0x8, 0xffff}, {&(0x7f00000000c0)="96a085f73286a06ee2454714f20630cc535fcb06f0e8", 0x16, 0x33}, {&(0x7f0000000100)="92db90afae310dac87e083cc29a834b58606e24b51156470de202e872f0054592d621dbc6e98e663f2201fdf8b0e554ba21795a6b2a146d9016cbe842b166825a56753316239366ee069b10a57eb7941daeb98bccb11aac6976f65f4bdd16d54f7d021013156d7a23715523f816c50e5fe5fd1d3b9e70785269c67e75478b0663896713ac6e5da34192575ddd3", 0x8d, 0x10}, {&(0x7f00000001c0)="fc755221b5cdb1d56a8e7eb7722d9a491ccf5994e76e69e86b081466ae107ff960ff631a2e82cab2fcd959b74310db0e71ee28029498582f30a2288c5a932b2feaead8fee24c56cd22c3c45050aba9cd536efcc7dbd8d50931f12d251f93ac8565dd8420a3924cc2f6ecbcc467", 0x6d, 0x8}], 0x352abba0122b2e63, &(0x7f00000002c0)='eth1\x00') ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_MASTER(r6, 0x641e) 04:43:03 executing program 1: ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, &(0x7f0000000040)={0x100, 0x3ccd, 0x3ff, @link_local, 'ip6gre0\x00'}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000000)={0xfffffff8, 0x8, 0x2}) setsockopt(r0, 0x0, 0x3, &(0x7f0000000080)="1e414911604448f6f5a4dcc5e35c31bdf029a4587fa3a470d4b3457d498904b73bd6d7560aae291925783ae3af01ea06f663322970c4eec4b869306c6a9a978b9c3ec3d135d265de1f78698bb8304d576a3618cd7f7f469b3e288060f67435702f26dae7964b9a422c4959470613aa24b491055de258f82a03d57cb0e0087498c69e98d2eeaea09d706d8e7fbc39528cf8566b30b437f0210c029bd38005604c31a6195fb10bfdfeae1ca24c17109760d1311d6e982786124b6a49afb36f49bf19d91f4c7bdd0a9ed7f30d91c2f7", 0xce) syz_mount_image$minix(&(0x7f0000000180)='minix\x00', &(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x5, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000240)="4ca25d9928e4ed8dace49edc75548dc7a0cca3140e06b83eead48077e8066583e59d6dd09a00ab1e32f42c0cf70e8a53cb2c81d77f9a0007ed88df8c013c5f5aa0dd", 0x42, 0x100}], 0x10000, 0x0) [ 291.039930] FAULT_INJECTION: forcing a failure. [ 291.039930] name failslab, interval 1, probability 0, space 0, times 0 [ 291.123557] CPU: 0 PID: 9608 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 291.131409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.140796] Call Trace: [ 291.143410] dump_stack+0x142/0x197 [ 291.147078] should_fail.cold+0x10f/0x159 [ 291.151251] should_failslab+0xdb/0x130 [ 291.155241] __kmalloc_track_caller+0x2ec/0x790 [ 291.159942] ? kstrdup_const+0x48/0x60 [ 291.163858] kstrdup+0x3a/0x70 [ 291.167068] kstrdup_const+0x48/0x60 [ 291.170799] alloc_vfsmnt+0xe5/0x7d0 [ 291.174532] clone_mnt+0x70/0xee0 [ 291.178014] ? lock_downgrade+0x740/0x740 [ 291.182185] ? do_raw_spin_unlock+0x16b/0x260 [ 291.186707] copy_tree+0x33b/0x8a0 [ 291.193062] copy_mnt_ns+0x11c/0x8c0 [ 291.196798] ? kmem_cache_alloc+0x611/0x780 [ 291.201148] ? selinux_capable+0x36/0x40 [ 291.205251] create_new_namespaces+0xc9/0x720 [ 291.209768] ? ns_capable_common+0x12c/0x160 [ 291.209790] copy_namespaces+0x284/0x310 [ 291.218256] copy_process.part.0+0x2603/0x6a00 [ 291.222871] ? proc_fail_nth_write+0x7d/0x180 [ 291.222884] ? proc_cwd_link+0x1b0/0x1b0 [ 291.222918] ? __cleanup_sighand+0x50/0x50 [ 291.235703] ? lock_downgrade+0x740/0x740 [ 291.239885] _do_fork+0x19e/0xce0 [ 291.243359] ? fork_idle+0x280/0x280 [ 291.247108] ? fput+0xd4/0x150 [ 291.250317] ? SyS_write+0x15e/0x230 [ 291.254052] SyS_clone+0x37/0x50 [ 291.257434] ? sys_vfork+0x30/0x30 [ 291.260994] do_syscall_64+0x1e8/0x640 [ 291.264892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.269843] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 291.275050] RIP: 0033:0x45a639 [ 291.278251] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 291.286065] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 291.293345] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 291.293353] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.293360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 291.293368] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x4748513b3bd9814f) [ 291.349226] MINIX-fs: unable to read superblock 04:43:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x105400, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f00000000c0)) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000080)=0x2, 0x4) 04:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffda7, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x0, 0x0, 0xffffffff, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 5 (fault-call:1 fault-nth:22): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 3: ioctl$TCSETXF(0xffffffffffffffff, 0x5434, &(0x7f0000000000)={0x9, 0x101, [0x4, 0x1, 0x8376, 0x8, 0xffff], 0x1}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x800, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000040)=0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0xffff, 0x18, 0x1, 0x8, 0x10000, r3}) [ 291.645111] FAULT_INJECTION: forcing a failure. [ 291.645111] name failslab, interval 1, probability 0, space 0, times 0 [ 291.696467] CPU: 1 PID: 9663 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 291.704326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.713702] Call Trace: [ 291.716316] dump_stack+0x142/0x197 [ 291.719986] should_fail.cold+0x10f/0x159 [ 291.724178] should_failslab+0xdb/0x130 [ 291.728176] __kmalloc_track_caller+0x2ec/0x790 [ 291.732868] ? kstrdup_const+0x48/0x60 [ 291.736805] kstrdup+0x3a/0x70 [ 291.740023] kstrdup_const+0x48/0x60 [ 291.743752] alloc_vfsmnt+0xe5/0x7d0 [ 291.747482] clone_mnt+0x70/0xee0 [ 291.750946] ? lock_downgrade+0x740/0x740 [ 291.755111] ? do_raw_spin_unlock+0x16b/0x260 [ 291.759620] copy_tree+0x33b/0x8a0 [ 291.763187] copy_mnt_ns+0x11c/0x8c0 [ 291.766910] ? kmem_cache_alloc+0x611/0x780 [ 291.771250] ? selinux_capable+0x36/0x40 [ 291.775332] create_new_namespaces+0xc9/0x720 [ 291.779847] ? ns_capable_common+0x12c/0x160 [ 291.784280] copy_namespaces+0x284/0x310 [ 291.788500] copy_process.part.0+0x2603/0x6a00 [ 291.793119] ? proc_fail_nth_write+0x7d/0x180 [ 291.797630] ? proc_cwd_link+0x1b0/0x1b0 [ 291.801723] ? __cleanup_sighand+0x50/0x50 [ 291.805972] ? lock_downgrade+0x740/0x740 [ 291.810145] _do_fork+0x19e/0xce0 [ 291.813619] ? fork_idle+0x280/0x280 [ 291.817348] ? fput+0xd4/0x150 [ 291.820561] ? SyS_write+0x15e/0x230 [ 291.824293] SyS_clone+0x37/0x50 [ 291.827672] ? sys_vfork+0x30/0x30 [ 291.831227] do_syscall_64+0x1e8/0x640 [ 291.835132] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 291.839998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:43:03 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000000c0)=0x3, 0x8) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000100)={0x0, 0x5}) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80800, 0x0) ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000040)) [ 291.845212] RIP: 0033:0x45a639 [ 291.848405] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 291.856130] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 291.863407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 291.870689] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 291.877983] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 291.887966] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 291.910613] QAT: Invalid ioctl 04:43:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x802, 0x0) setsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000000)=0x6, 0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000040)=""/255) 04:43:03 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x240000, 0x0) pipe(&(0x7f0000000880)) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000600)={0x0, 0x1, 0x98, 0x7f, @scatter={0x6, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/205, 0xcd}, {&(0x7f0000000140)=""/14, 0xe}, {&(0x7f0000000180)=""/60, 0x3c}, {&(0x7f00000001c0)=""/122, 0x7a}, {&(0x7f0000000240)=""/71, 0x47}, {&(0x7f00000002c0)=""/237, 0xed}]}, &(0x7f0000000440)="6d0d5e2343e81f74e478d803efb244cc6c162373859fee390ae261d045fcda2e730e7d81aab69bb1c4114f1991af99b1b5e4c9ea21c26b40eaf7618e647105e3c1099c6f65cf726ec51334900c24b73607cc068dd2d1f9b01df6828c86917b30b2ae9f0764f3d230b683bce5a07928ceccf28ed254a75aafc79367bc2356563401bb8bf9f258a22b2053f2a6951e46654437ff65c45ebbef", &(0x7f0000000500)=""/192, 0x3f, 0x21, 0x1, &(0x7f00000005c0)}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000840)={r0, &(0x7f0000000680)="efc3874eab0a25caa552f843c5dbe1a0c8c6cf8581de5f92c463d0c78ddc3c7afa2f57efe9e00549eff44cb34abe073c0854b1c5b3ccf569757a17b0dd18f3ed3fa047ad84eec069f5f3f5c8ad5c7ce03577a8b3cefb00e8c001b9a6f43d0262d86dc1fad37ffe180bcb14bb476a432150a22431398197cd05e6a59518afb8eae25ff96a01552282290b42f5e513007579391a67bb4a4f3f227d3d395173fc3a50f4da6e12144db7fe07b6cc349fd719a1f32adddd0d08930252c7ac5924016d3c485361108c5aa7d2f5599bf3d671", &(0x7f0000000780)=""/149, 0xe}, 0x20) 04:43:03 executing program 5 (fault-call:1 fault-nth:23): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:04 executing program 0: openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x0, 0x1, 0x6ca, 0xea06}) [ 292.036550] FAULT_INJECTION: forcing a failure. [ 292.036550] name failslab, interval 1, probability 0, space 0, times 0 04:43:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f00000002c0)={0x1, 0x2, {0x0, 0x2, 0x0, 0x85b8c0f381e9569f, 0x4}}) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@typedef={0x3, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x5f, 0x61, 0x51, 0x5f]}}, &(0x7f0000000200)=""/99, 0x2b, 0x63}, 0x20) r1 = socket(0x1e, 0x805, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r3}, 0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000080)={r3, @in={{0x2, 0x4e23, @multicast1}}}, 0xf) 04:43:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6026fa78881db2ee}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r2, 0xc0106426, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000000c0)={r3, 0x3}) [ 292.080491] CPU: 1 PID: 9695 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 292.088357] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.097731] Call Trace: [ 292.100364] dump_stack+0x142/0x197 [ 292.104025] should_fail.cold+0x10f/0x159 [ 292.108204] should_failslab+0xdb/0x130 [ 292.112202] __kmalloc_track_caller+0x2ec/0x790 [ 292.116910] ? kstrdup_const+0x48/0x60 [ 292.121357] kstrdup+0x3a/0x70 [ 292.124587] kstrdup_const+0x48/0x60 [ 292.128334] alloc_vfsmnt+0xe5/0x7d0 [ 292.132082] clone_mnt+0x70/0xee0 [ 292.135560] ? lock_downgrade+0x740/0x740 [ 292.139738] ? do_raw_spin_unlock+0x16b/0x260 [ 292.144261] copy_tree+0x33b/0x8a0 [ 292.147840] copy_mnt_ns+0x11c/0x8c0 [ 292.151572] ? kmem_cache_alloc+0x611/0x780 [ 292.155928] ? selinux_capable+0x36/0x40 [ 292.160026] create_new_namespaces+0xc9/0x720 [ 292.164549] ? ns_capable_common+0x12c/0x160 [ 292.168989] copy_namespaces+0x284/0x310 [ 292.173087] copy_process.part.0+0x2603/0x6a00 [ 292.177751] ? proc_fail_nth_write+0x7d/0x180 [ 292.182272] ? proc_cwd_link+0x1b0/0x1b0 [ 292.186385] ? __cleanup_sighand+0x50/0x50 [ 292.190641] ? lock_downgrade+0x740/0x740 [ 292.194831] _do_fork+0x19e/0xce0 [ 292.198320] ? fork_idle+0x280/0x280 [ 292.202056] ? fput+0xd4/0x150 [ 292.205263] ? SyS_write+0x15e/0x230 [ 292.209007] SyS_clone+0x37/0x50 [ 292.212392] ? sys_vfork+0x30/0x30 [ 292.215958] do_syscall_64+0x1e8/0x640 [ 292.219862] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.224739] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.230166] RIP: 0033:0x45a639 [ 292.233368] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.241095] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 292.248380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 292.255785] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.263074] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 292.270363] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:04 executing program 5 (fault-call:1 fault-nth:24): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:04 executing program 2: r0 = syz_open_dev$midi(&(0x7f00000011c0)='/dev/midi#\x00', 0x5, 0x8040) faccessat(r0, &(0x7f0000001200)='./file0\x00', 0x80, 0x400) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000001040)={'filter\x00', 0x0, 0x3, 0x1000, [], 0x3, &(0x7f0000000000)=[{}, {}, {}], &(0x7f0000000040)=""/4096}, &(0x7f00000010c0)=0x78) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000001180)=0x962) r2 = syz_open_dev$admmidi(&(0x7f0000001100)='/dev/admmidi#\x00', 0x10000, 0x2002) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000001140)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7f, 0x121000) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x0, 0x9}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 292.431834] FAULT_INJECTION: forcing a failure. [ 292.431834] name failslab, interval 1, probability 0, space 0, times 0 [ 292.481844] CPU: 1 PID: 9717 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 292.489703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.499089] Call Trace: [ 292.501707] dump_stack+0x142/0x197 [ 292.505371] should_fail.cold+0x10f/0x159 [ 292.509556] should_failslab+0xdb/0x130 [ 292.513560] __kmalloc_track_caller+0x2ec/0x790 [ 292.518263] ? kstrdup_const+0x48/0x60 [ 292.522183] kstrdup+0x3a/0x70 [ 292.525395] kstrdup_const+0x48/0x60 04:43:04 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200102, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r0, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 292.529134] alloc_vfsmnt+0xe5/0x7d0 [ 292.532903] clone_mnt+0x70/0xee0 [ 292.536377] ? lock_downgrade+0x740/0x740 [ 292.540547] ? do_raw_spin_unlock+0x16b/0x260 [ 292.545063] copy_tree+0x33b/0x8a0 [ 292.548631] copy_mnt_ns+0x11c/0x8c0 [ 292.552369] ? kmem_cache_alloc+0x611/0x780 [ 292.556709] ? selinux_capable+0x36/0x40 [ 292.560803] create_new_namespaces+0xc9/0x720 [ 292.565310] ? ns_capable_common+0x12c/0x160 [ 292.569757] copy_namespaces+0x284/0x310 [ 292.573839] copy_process.part.0+0x2603/0x6a00 [ 292.578479] ? proc_fail_nth_write+0x7d/0x180 [ 292.583005] ? proc_cwd_link+0x1b0/0x1b0 [ 292.587107] ? __cleanup_sighand+0x50/0x50 [ 292.591371] ? lock_downgrade+0x740/0x740 [ 292.595557] _do_fork+0x19e/0xce0 [ 292.599045] ? fork_idle+0x280/0x280 [ 292.602789] ? fput+0xd4/0x150 [ 292.606000] ? SyS_write+0x15e/0x230 [ 292.609742] SyS_clone+0x37/0x50 [ 292.613124] ? sys_vfork+0x30/0x30 [ 292.616685] do_syscall_64+0x1e8/0x640 [ 292.620596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.625469] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.630689] RIP: 0033:0x45a639 [ 292.633889] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.641621] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 292.648911] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 292.656212] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 292.663505] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 292.670796] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:04 executing program 5 (fault-call:1 fault-nth:25): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x0) [ 292.819686] FAULT_INJECTION: forcing a failure. [ 292.819686] name failslab, interval 1, probability 0, space 0, times 0 [ 292.839894] CPU: 0 PID: 9739 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 292.847745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.857260] Call Trace: [ 292.859883] dump_stack+0x142/0x197 [ 292.863560] should_fail.cold+0x10f/0x159 [ 292.867745] should_failslab+0xdb/0x130 [ 292.871746] kmem_cache_alloc+0x2d7/0x780 [ 292.875917] ? find_held_lock+0x35/0x130 [ 292.880003] ? copy_tree+0x4a2/0x8a0 [ 292.883834] alloc_vfsmnt+0x28/0x7d0 [ 292.887573] clone_mnt+0x70/0xee0 [ 292.891046] ? lock_downgrade+0x740/0x740 [ 292.895223] ? do_raw_spin_unlock+0x16b/0x260 [ 292.899749] copy_tree+0x33b/0x8a0 [ 292.903326] copy_mnt_ns+0x11c/0x8c0 [ 292.907060] ? kmem_cache_alloc+0x611/0x780 [ 292.911406] ? selinux_capable+0x36/0x40 [ 292.915602] create_new_namespaces+0xc9/0x720 [ 292.920131] ? ns_capable_common+0x12c/0x160 [ 292.924567] copy_namespaces+0x284/0x310 [ 292.928653] copy_process.part.0+0x2603/0x6a00 [ 292.933267] ? proc_fail_nth_write+0x7d/0x180 [ 292.937785] ? proc_cwd_link+0x1b0/0x1b0 [ 292.941892] ? __cleanup_sighand+0x50/0x50 [ 292.946153] ? lock_downgrade+0x740/0x740 [ 292.950341] _do_fork+0x19e/0xce0 [ 292.953822] ? fork_idle+0x280/0x280 [ 292.957589] ? fput+0xd4/0x150 [ 292.960804] ? SyS_write+0x15e/0x230 [ 292.964550] SyS_clone+0x37/0x50 [ 292.967942] ? sys_vfork+0x30/0x30 [ 292.971518] do_syscall_64+0x1e8/0x640 [ 292.975444] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.980329] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 292.985548] RIP: 0033:0x45a639 [ 292.988750] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 292.996500] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 293.003821] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 293.011116] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:43:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/C\xf7;$o#\x00', 0x3, 0x541000) syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x2000, 0x1) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000000040)=0x6, 0x4) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0x1, 0x4) bind$rose(r1, &(0x7f00000000c0)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x5, 0x345679bd33a68645) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000280)={0xfeff, 0x5, 0x1d, 0x2, 0xfffffffe, 0x5, 0xffffff25, 0xb9, 0x0}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000480)={r4, 0xf4, "63b9c577b6fd6c285445d69cd24272dcca5ad9adaff91026d8747daed9ec4b7da9d001314cbb7592a4b46e6a20f36222301174d90309efb35a2b244a445816c320f34633edc5b9abaa42082c7a18060b74f2b797372c7cfc71b3938d163d016b1f4b1fc0c30e486b6b0a75ac1eac12f1933c1b1f66d8a9946c1e2d5b6bb2f04eabef108bfd633401c1354cfcb7a2bb9339ee3dd6262ea10388a67856616cfd4ed5ef49207d253bcdf99e8310b264ce26cd0af6ea325b21723ff4faea0c4da0cd8af84e4024fa4a83fbc28fd26b498134c978c8b05384e1a8439c42b699168130a8dd14b09de8c96cf96ec3aa780b25b995d0fed4"}, &(0x7f0000000340)=0xfc) r5 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$selinux_user(r5, &(0x7f0000000140)=ANY=[@ANYBLOB='jystem_u:objexec_t:s0 user_u\x00'/40], 0x28) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x401, 0x600, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x6, 0xffffffffffffffff, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x42400, 0x0) r2 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000680)={{{@in6=@mcast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f0000000780)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@empty, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) r7 = syz_open_procfs(0x0, 0x0) r8 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x3, 0x88001) write$vnet(r8, &(0x7f0000000980)={0x1, {&(0x7f0000000640)=""/16, 0x10, &(0x7f0000000900)=""/119, 0x3}}, 0x68) preadv(r7, 0x0, 0x0, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000a00)='/selinux/policy\x00', 0x0, 0x0) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r9, r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = dup2(r10, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000e80)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@empty}}, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000300)={@initdev={0xac, 0x1e, 0x1, 0x0}, @local, r12}, 0xc) sendmsg$inet(r4, &(0x7f0000000a80)={&(0x7f0000000100)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f0000000380)=[{&(0x7f0000000140)="92661c593d2b5f606f23ff5a4786b56e1d887b9890b07443314572fbf7392baa76899e", 0x23}, {&(0x7f0000000180)="298c3e7e57ab35f9859b35b4800c0ddcfc9c7aa7cd28961569a8a537f1d6c859836a8c492ec9462bdd624f5412705540bcf9b338f817c268c671029220b9eef4e0eab0ca19f503d0e8c348079c3a31a83193703bf187f2edda02853c9739847c10b0a5a21acacfb1e8b71ba7", 0x6c}, {&(0x7f0000000200)="b85a118b7c56b487c2506f8d113cb9a319aaa2db85bfd86e1fb8a391e1e8c48c26b2468f9aba46d9819e0d72310b1477929bd7eea952ccc55f4dca63f3bd5b2d6802e82e29249e55095f2eabbeea951f0a81dda92cd0777a10df0bf316b3863462e9ce5cafeb5ccbaa125328c5f08a7b226b80d8668e4e7355025fb670fb3e7344abb5c81674e589991de81993ab3cea8a1b121d973ecd2aa288f8a12ff396a2b54e81493b95f3bc", 0xa8}, {&(0x7f00000002c0)}], 0x4, &(0x7f0000000ac0)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414bb7f000001000000003400000000000000000000000700000001071f49ac14140a7f0000017f0000017f00000100000008ac14141fac1e000100000000000000001400000000000000000000000200000001010000000000005400000000000000000000000700000088040515832b02ac1e0101ac1e0001ac1e0001000007ffe0000001ac141428ac1414bbac1414aa000000007f0000010011209a72725ad360d76535078286c3b000000000000000001400000000000000000000000200000006000000000000001c000000000000000000000008000000", @ANYRES32=r5, @ANYBLOB="ac1e0101ac1414aa000000001c000000000000000000000008000000", @ANYRES32=r6, @ANYBLOB="00000000e0000002000000001c000000000000fe9a9ceb92000000005325461480111870aac028c98abea567cfec629a78d301f8b5", @ANYRES32=r12, @ANYBLOB="ac1e0101ac1414bb00000000110000000000000000000000010000000800000000000000110000000000000000000000010000003800000000000000"], 0x170}, 0x40) fchmod(r3, 0x6741576111f67cdd) r13 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r13, 0x89f0, &(0x7f0000000340)={'bridge0\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="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"]}) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = dup2(r14, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$UI_SET_EVBIT(r15, 0x40045564, 0x10) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000080)={0x1, r3, 0x1}) ioctl$EXT4_IOC_SETFLAGS(r16, 0x40086602, &(0x7f00000000c0)=0x40000) [ 293.018406] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 293.025696] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 0: r0 = mq_open(&(0x7f0000000000)='\x00', 0x0, 0x108, &(0x7f0000000040)={0x5, 0x7ff, 0x5, 0x5, 0x3f, 0x1, 0x4, 0x2}) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000080)={0x5, 0x40, 0xa, 0x9, 0x1, [{0x2, 0x3f4, 0x3ff, 0x0, 0x0, 0x4}]}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x9, 0x18000) dup2(0xffffffffffffffff, r0) r1 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x0, 0x2, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x81, 0x2}, {0x9, 0x240}, {0x6, 0x5}]}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:05 executing program 5 (fault-call:1 fault-nth:26): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x3}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xe, 0xffffffffffffffff, 0x9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = accept4$tipc(r0, &(0x7f0000001740), &(0x7f0000001780)=0x10, 0x800) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f0000001840)={r2, 0xffffffffffffffff, 0x2b21, 0x56, &(0x7f00000017c0)="12ae3340cd8732b812009715800fcbfea7f21b92484ba46fbdf1ec2a67a8d21bec292a038a17f10f2ac172909a7de4e8e45d0f32731a51275fad260130762f1e249b618740e0143b6ba67f663a38d3ef13ffc3ee408e", 0x8e, 0x0, 0x1, 0xbee, 0x2, 0x3, 0x7, 'syz1\x00'}) write$binfmt_elf64(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x1, 0x81, 0x6, 0x9, 0x2, 0x6, 0x7f, 0x369, 0x40, 0x26a, 0x1ff, 0x9cb, 0x38, 0x1, 0x32a0, 0x81}, [{0x6, 0x7fff, 0x0, 0x3, 0x5, 0x800, 0x6f, 0x101}, {0x4, 0x73, 0x0, 0x8, 0x2, 0x39df, 0x7, 0x5}], "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", [[], [], [], [], [], []]}, 0x16b0) 04:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1, 0x100) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045505, &(0x7f0000000040)=0x7ff) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0xef, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000040)={0x81, 0x15, 0xfff7, 0x8, "00a9698f9dc125c01a9aaa2619f4708a9800"}) [ 293.271693] FAULT_INJECTION: forcing a failure. [ 293.271693] name failslab, interval 1, probability 0, space 0, times 0 [ 293.332957] CPU: 1 PID: 9773 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 293.340829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.350196] Call Trace: [ 293.350221] dump_stack+0x142/0x197 [ 293.350247] should_fail.cold+0x10f/0x159 [ 293.350272] should_failslab+0xdb/0x130 [ 293.350287] __kmalloc_track_caller+0x2ec/0x790 [ 293.350309] ? kstrdup_const+0x48/0x60 [ 293.350329] kstrdup+0x3a/0x70 [ 293.360709] kstrdup_const+0x48/0x60 04:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x2a82545a}, 0x2, 0x800, 0x0, 0x6, 0x0, 0x4}, 0x0, 0x6, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r2, 0x0) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x80, 0x4, &(0x7f0000000340)=[{&(0x7f00000000c0)="b9bc473d923d8367b895f11836033188ca962854df91e1db349178566623bca767007744", 0x24, 0x2}, {&(0x7f0000000100)="198d4cf3a1fe9db39e706b8925af5846ef3ab83a58324f772d596e5e18c2df5da871305fec7792951b17ae39c4bd661f3c2b9b7da1fad8277335211cdcf3196027882c3572a39b5bf23bc83453cabaa2e487fb1399fc3aa4e0a04e1c22cf735f723c34e28924259d89e17e0e6c06b8151013e4ea01aeff50fdb1c32ab08f12636b2eb2dba68568e3d81dcc244e878f2844090418f99ffc498bf3e404f652390794551f187b2abef9dc971e3f488e4ce856862b908a7e72663c2bd8463aa02bbbf91103b8e66ba75e5c70b40e74ea0b54e74525f19a003224e328056eee5bbcf51584d7e25d91c4da28930e1d0eb18d8bd77a3d303f8e004b", 0xf8, 0x5}, {&(0x7f0000000200)="312beb4d2f2528fbf953b8d7b336e4b98c1b81abaafb93fe2d556ff25f7516ed4ff6c27ddd3717ae56dff5c8755dce1d26ad0aedb27e76d880b8526b2f05806646f0376a72cbb78ca62b7db52df8ea09257bf90e8d5a1e222d3662fc1f52cd112e3b03b448033a12fd8e0ee5ce4c00b8d0f6", 0x72, 0x1ff}, {&(0x7f0000000280)="f80c6938482682f8ff4e4a2b4d0e3c491b92611e4588e4a1138014a4ab365ffef7a469e04f28af9641f79d8054c2aa8febf26420ad5d2545249a3573c435f0b69fced8287ae1b83ca69a3efc30bd20c6ae56420405c704846cfabd44ac889a3df61edc2c0ffd556820d0fb02c13c50976306d74cef0282e45c995ec909571211403e359b178ee5ee6eccd22bed4dbcd852572b609b39f0bbdc7a0cfdea9ab2bf0e5036debf1b4477c7c58556c6dac827", 0xb0, 0x3}], 0x4aca5, &(0x7f0000000480)=ANY=[@ANYBLOB="6e6f61636c2c6e6f7265636f766572792c696e6c696e655f78617474722c696e6c696e655f646174612c64697361626c655f6578745f69e1b4ebaa598fd2165dd4d5182f59ed3164656e746966792c666f776e65723d", @ANYRESDEC=r2, @ANYBLOB=',audit,hash,defcontext=user_u,permit_directio,dont_hash,pcr=00000000000000000064,\x00']) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_ERR(r3, 0x4008af22, &(0x7f0000000000)) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$BLKTRACETEARDOWN(r5, 0x1276, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000007c0)=[{&(0x7f0000000580)="62f23e748cdfecc0d3bcb88248f9f8f8e87edc5637656d6e511dcdc6041c8d8a0957939950c15c7ac6360c7820e1d5957ba4167f17600b58767db91e29eb92a20f86dddfb0f8dda322d3ddeadba924051c7894f228f090746b1a55e851e7dcaae4d8411f6806d216b4f2e7eca231a301cc0c9bb4bb5598a94336a99790d3b77dcda45483c1fb1194c56ddfddb587442754e6c815", 0x94, 0x9}], 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000980), 0xc, &(0x7f0000000d40)={&(0x7f00000009c0)=ANY=[@ANYBLOB="500000001d00010029bd7000fbdbdf2504000000", @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r7, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r7, r8, &(0x7f0000fe7000/0x18000)=nil, 0x0, 0xffffffffffffffbf, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r9 = getpid() tkill(r9, 0x9) socket(0x11, 0x6, 0x5) [ 293.360724] alloc_vfsmnt+0xe5/0x7d0 [ 293.360741] clone_mnt+0x70/0xee0 [ 293.360754] ? lock_downgrade+0x740/0x740 [ 293.360767] ? do_raw_spin_unlock+0x16b/0x260 [ 293.360785] copy_tree+0x33b/0x8a0 [ 293.360813] copy_mnt_ns+0x11c/0x8c0 [ 293.360822] ? kmem_cache_alloc+0x611/0x780 [ 293.360839] ? selinux_capable+0x36/0x40 [ 293.360862] create_new_namespaces+0xc9/0x720 [ 293.360876] ? ns_capable_common+0x12c/0x160 [ 293.360895] copy_namespaces+0x284/0x310 [ 293.425514] copy_process.part.0+0x2603/0x6a00 04:43:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x51, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) dup(r0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)="2ba96ccbb510be2bb62d7a2bc9e0979dfb07b67f8867271b63ff6830d7c8c91b457c0489eba698fd6c28c296b965a252670423488f13b7a1cae9b3328ed5e1182ffb145b401ed6dafcd2794a9528ebb1c8284a", 0x53, 0xfffffffffffffffa) r2 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r4, r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r5, r5) splice(r4, &(0x7f0000000340)=0x7, r5, &(0x7f00000005c0)=0x100000000, 0xca48, 0x0) dup2(r3, r3) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@mcast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6}}, &(0x7f0000000240)=0xe8) r7 = getegid() lchown(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r6, r7) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r9, 0x402c5342, &(0x7f0000000280)={0x400, 0x3, 0x8, {0x77359400}, 0x7, 0xfff}) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r2) keyctl$link(0x8, r1, r2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9c1, 0x0) 04:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_ONE_REG(0xffffffffffffffff, 0x4010aeac, &(0x7f0000000000)={0x8001, 0xc68}) [ 293.430142] ? proc_fail_nth_write+0x7d/0x180 [ 293.434662] ? proc_cwd_link+0x1b0/0x1b0 [ 293.438772] ? __cleanup_sighand+0x50/0x50 [ 293.443042] ? lock_downgrade+0x740/0x740 [ 293.447229] _do_fork+0x19e/0xce0 [ 293.450720] ? fork_idle+0x280/0x280 [ 293.454453] ? fput+0xd4/0x150 [ 293.457674] ? SyS_write+0x15e/0x230 [ 293.461415] SyS_clone+0x37/0x50 [ 293.464797] ? sys_vfork+0x30/0x30 [ 293.468883] do_syscall_64+0x1e8/0x640 [ 293.472786] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.477656] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 293.482892] RIP: 0033:0x45a639 [ 293.486097] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 293.493825] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 293.501125] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 293.508426] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 293.515721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 293.523015] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:05 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext, 0x4500, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, r0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000040)='/selinux/status\x00') clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 5 (fault-call:1 fault-nth:27): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) getpgid(r2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040)}, 0x930, 0x40, 0xb08, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f0000000000)=0x4000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)={0x1a, 0x20, 0xf, 0x1d, 0x0, 0x401, 0x3, 0xb6, 0x1}) 04:43:05 executing program 1: r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x0f@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r3) r4 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r3) keyctl$instantiate(0xc, r2, &(0x7f00000000c0)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', '', 0x20, 0x101}, 0x2b, r4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000000040), 0x8) r5 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r8, r8) r9 = fcntl$dupfd(r8, 0x406, r5) r10 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x200000, 0x0) ioctl$ION_IOC_HEAP_QUERY(r10, 0xc0184908, &(0x7f0000000280)={0x34, 0x0, &(0x7f0000000240)}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x10400200) ioctl$FITRIM(r7, 0xc0185879, &(0x7f0000000080)={0x1, 0x9, 0x8}) 04:43:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40, 0x2000000}}, 0x0, 0xf, 0xffffffffffffffff, 0xb) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x12, r0, 0x15cd2000) pipe2(&(0x7f0000000000), 0x180800) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000000000100100ffff"], 0x20}}, 0x0) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800204}, 0xc, &(0x7f00000001c0)={&(0x7f0000000080)={0x11c, r4, 0x42, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x5c, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcf8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xde3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdd}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xed72}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xaff2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x11c}}, 0x20000808) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 293.696738] FAULT_INJECTION: forcing a failure. [ 293.696738] name failslab, interval 1, probability 0, space 0, times 0 [ 293.740484] CPU: 0 PID: 9811 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 293.748348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.757738] Call Trace: [ 293.760368] dump_stack+0x142/0x197 [ 293.764042] should_fail.cold+0x10f/0x159 [ 293.768259] should_failslab+0xdb/0x130 [ 293.772269] kmem_cache_alloc+0x2d7/0x780 [ 293.776445] ? find_held_lock+0x35/0x130 [ 293.780535] ? copy_tree+0x4a2/0x8a0 [ 293.784292] alloc_vfsmnt+0x28/0x7d0 [ 293.788030] clone_mnt+0x70/0xee0 [ 293.791531] ? lock_downgrade+0x740/0x740 [ 293.795710] ? do_raw_spin_unlock+0x16b/0x260 [ 293.800249] copy_tree+0x33b/0x8a0 [ 293.803828] copy_mnt_ns+0x11c/0x8c0 [ 293.807562] ? kmem_cache_alloc+0x611/0x780 [ 293.811913] ? selinux_capable+0x36/0x40 [ 293.816008] create_new_namespaces+0xc9/0x720 [ 293.820529] ? ns_capable_common+0x12c/0x160 [ 293.824970] copy_namespaces+0x284/0x310 [ 293.829066] copy_process.part.0+0x2603/0x6a00 [ 293.833688] ? proc_fail_nth_write+0x7d/0x180 [ 293.838202] ? proc_cwd_link+0x1b0/0x1b0 [ 293.842304] ? __cleanup_sighand+0x50/0x50 [ 293.846571] ? lock_downgrade+0x740/0x740 [ 293.850748] _do_fork+0x19e/0xce0 [ 293.854231] ? fork_idle+0x280/0x280 [ 293.857974] ? fput+0xd4/0x150 [ 293.861190] ? SyS_write+0x15e/0x230 [ 293.864932] SyS_clone+0x37/0x50 [ 293.868399] ? sys_vfork+0x30/0x30 [ 293.871965] do_syscall_64+0x1e8/0x640 [ 293.875878] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 293.880757] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 293.885967] RIP: 0033:0x45a639 04:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) fsync(r0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 293.889167] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 293.896915] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 293.904237] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 293.911527] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 293.918820] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 293.926115] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/sockstat6\x00') ioctl$USBDEVFS_FREE_STREAMS(r0, 0x8008551d, &(0x7f0000000040)={0x6780, 0x9, [{0xb, 0x1}, {0xb, 0x1}, {0x2, 0x1}, {0xc}, {}, {0xc}, {0xb, 0x1}, {0xd}, {0x5, 0x1}]}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 5 (fault-call:1 fault-nth:28): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 1: r0 = accept$netrom(0xffffffffffffffff, &(0x7f0000000040)={{0x3, @netrom}, [@null, @bcast, @bcast, @rose, @bcast, @remote, @remote, @rose]}, &(0x7f00000000c0)=0x48) ioctl$sock_netrom_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bpq0='bpq0\x00', 0x4, 'syz1\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x41, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 294.097777] FAULT_INJECTION: forcing a failure. [ 294.097777] name failslab, interval 1, probability 0, space 0, times 0 [ 294.150149] CPU: 0 PID: 9847 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 294.158013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.167396] Call Trace: [ 294.170018] dump_stack+0x142/0x197 [ 294.173693] should_fail.cold+0x10f/0x159 [ 294.177884] should_failslab+0xdb/0x130 [ 294.177901] __kmalloc_track_caller+0x2ec/0x790 [ 294.177931] ? kstrdup_const+0x48/0x60 [ 294.186616] kstrdup+0x3a/0x70 [ 294.193700] kstrdup_const+0x48/0x60 [ 294.197481] alloc_vfsmnt+0xe5/0x7d0 [ 294.201236] clone_mnt+0x70/0xee0 [ 294.204714] ? lock_downgrade+0x740/0x740 [ 294.208885] ? do_raw_spin_unlock+0x16b/0x260 [ 294.213415] copy_tree+0x33b/0x8a0 [ 294.216993] copy_mnt_ns+0x11c/0x8c0 [ 294.220721] ? kmem_cache_alloc+0x611/0x780 [ 294.225066] ? selinux_capable+0x36/0x40 [ 294.229155] create_new_namespaces+0xc9/0x720 [ 294.233679] ? ns_capable_common+0x12c/0x160 [ 294.238120] copy_namespaces+0x284/0x310 [ 294.242213] copy_process.part.0+0x2603/0x6a00 [ 294.246831] ? proc_fail_nth_write+0x7d/0x180 [ 294.251351] ? proc_cwd_link+0x1b0/0x1b0 [ 294.255452] ? __cleanup_sighand+0x50/0x50 [ 294.259708] ? lock_downgrade+0x740/0x740 [ 294.263894] _do_fork+0x19e/0xce0 [ 294.267377] ? fork_idle+0x280/0x280 [ 294.271118] ? fput+0xd4/0x150 [ 294.274330] ? SyS_write+0x15e/0x230 [ 294.278067] SyS_clone+0x37/0x50 [ 294.281445] ? sys_vfork+0x30/0x30 [ 294.285011] do_syscall_64+0x1e8/0x640 [ 294.288909] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.293786] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:43:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 2: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000080)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000003c0)=0xe8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e24, @multicast1}, 0x10) connect$can_bcm(r0, &(0x7f0000000400)={0x1d, r2}, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 294.298989] RIP: 0033:0x45a639 [ 294.302188] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 294.309957] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 294.317429] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 294.324717] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.332005] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 294.339295] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xe8) r1 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x101a00) close(r1) 04:43:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x2442, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) 04:43:06 executing program 5 (fault-call:1 fault-nth:29): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 3: syz_extract_tcp_res$synack(&(0x7f0000000000), 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 294.495206] FAULT_INJECTION: forcing a failure. [ 294.495206] name failslab, interval 1, probability 0, space 0, times 0 [ 294.537484] CPU: 0 PID: 9875 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 294.545345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.545354] Call Trace: [ 294.545376] dump_stack+0x142/0x197 [ 294.545404] should_fail.cold+0x10f/0x159 [ 294.545426] should_failslab+0xdb/0x130 [ 294.545442] __kmalloc_track_caller+0x2ec/0x790 [ 294.545469] ? kstrdup_const+0x48/0x60 [ 294.545489] kstrdup+0x3a/0x70 [ 294.545504] kstrdup_const+0x48/0x60 [ 294.545519] alloc_vfsmnt+0xe5/0x7d0 [ 294.545536] clone_mnt+0x70/0xee0 [ 294.545548] ? lock_downgrade+0x740/0x740 [ 294.545562] ? do_raw_spin_unlock+0x16b/0x260 [ 294.545580] copy_tree+0x33b/0x8a0 [ 294.545609] copy_mnt_ns+0x11c/0x8c0 [ 294.545619] ? kmem_cache_alloc+0x611/0x780 [ 294.545636] ? selinux_capable+0x36/0x40 [ 294.545657] create_new_namespaces+0xc9/0x720 [ 294.574043] ? ns_capable_common+0x12c/0x160 [ 294.574063] copy_namespaces+0x284/0x310 [ 294.574082] copy_process.part.0+0x2603/0x6a00 [ 294.574110] ? proc_fail_nth_write+0x7d/0x180 [ 294.638396] ? proc_cwd_link+0x1b0/0x1b0 [ 294.642502] ? __cleanup_sighand+0x50/0x50 [ 294.646758] ? lock_downgrade+0x740/0x740 [ 294.650969] _do_fork+0x19e/0xce0 [ 294.654448] ? fork_idle+0x280/0x280 [ 294.658179] ? fput+0xd4/0x150 [ 294.661388] ? SyS_write+0x15e/0x230 [ 294.665129] SyS_clone+0x37/0x50 [ 294.668509] ? sys_vfork+0x30/0x30 [ 294.672072] do_syscall_64+0x1e8/0x640 [ 294.675975] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 294.680861] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:43:06 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 294.686076] RIP: 0033:0x45a639 [ 294.689366] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 294.697095] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 294.704386] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 294.711674] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 294.718938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 294.726220] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:06 executing program 5 (fault-call:1 fault-nth:30): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:06 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x4) fgetxattr(r2, &(0x7f0000000040)=@known='trusted.overlay.opaque\x00', &(0x7f0000000080)=""/168, 0xa8) fchmod(r1, 0x6741576111f67cdd) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000000)={0x2c, @multicast2, 0x4e21, 0x3, 'wlc\x00', 0x4, 0xfffff001, 0x1}, 0x2c) syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x100) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 04:43:06 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a86, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x4, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000040)={0x3, 0x8}) socket$inet_udp(0x2, 0x2, 0x0) 04:43:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000000)=0xfffffffd, 0xfffffffffffffe59) [ 294.892694] FAULT_INJECTION: forcing a failure. [ 294.892694] name failslab, interval 1, probability 0, space 0, times 0 [ 294.945385] CPU: 1 PID: 9897 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 294.953239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.962610] Call Trace: [ 294.965229] dump_stack+0x142/0x197 [ 294.968890] should_fail.cold+0x10f/0x159 [ 294.973078] should_failslab+0xdb/0x130 [ 294.977085] __kmalloc_track_caller+0x2ec/0x790 [ 294.981795] ? kstrdup_const+0x48/0x60 [ 294.985716] kstrdup+0x3a/0x70 [ 294.988930] kstrdup_const+0x48/0x60 [ 294.992668] alloc_vfsmnt+0xe5/0x7d0 [ 294.996404] clone_mnt+0x70/0xee0 [ 294.999871] ? lock_downgrade+0x740/0x740 [ 295.004071] ? do_raw_spin_unlock+0x16b/0x260 [ 295.008592] copy_tree+0x33b/0x8a0 [ 295.012162] copy_mnt_ns+0x11c/0x8c0 [ 295.015893] ? kmem_cache_alloc+0x611/0x780 [ 295.020238] ? selinux_capable+0x36/0x40 [ 295.024328] create_new_namespaces+0xc9/0x720 [ 295.028843] ? ns_capable_common+0x12c/0x160 [ 295.033275] copy_namespaces+0x284/0x310 [ 295.037352] copy_process.part.0+0x2603/0x6a00 [ 295.041962] ? proc_fail_nth_write+0x7d/0x180 [ 295.046472] ? proc_cwd_link+0x1b0/0x1b0 [ 295.050563] ? __cleanup_sighand+0x50/0x50 [ 295.054810] ? lock_downgrade+0x740/0x740 [ 295.058989] _do_fork+0x19e/0xce0 [ 295.062470] ? fork_idle+0x280/0x280 [ 295.066207] ? fput+0xd4/0x150 [ 295.069413] ? SyS_write+0x15e/0x230 [ 295.073149] SyS_clone+0x37/0x50 [ 295.076522] ? sys_vfork+0x30/0x30 [ 295.080078] do_syscall_64+0x1e8/0x640 [ 295.084001] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.088907] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x4, 0x3, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xe133, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = accept(r0, &(0x7f0000000080)=@alg, &(0x7f0000000100)=0x80) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000140)=0x19, 0x4) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x2, 0x628805) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept4(r3, &(0x7f0000000200)=@caif=@dbg, &(0x7f0000000280)=0x80, 0x800) getsockopt$inet_tcp_int(r0, 0x6, 0xffb34c654546d1e9, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x4, 0x1000) [ 295.094113] RIP: 0033:0x45a639 [ 295.097319] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 295.105050] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 295.112339] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 295.119673] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.126960] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 295.134252] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x6c252425, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000000)) 04:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 2: r0 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x6, @perf_bp={&(0x7f0000000080), 0x17}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800}, r0, 0x0, 0xffffffffffffffff, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 5 (fault-call:1 fault-nth:31): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) fsetxattr$smack_xattr_label(r1, &(0x7f0000000040)='security.SMACK64MMAP\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="2b264fcab3e739a2060022001a3cdebae15ce12183cd3bf9f70ce40f9efd86a04ff870c863171c1c669099e8e654a0e4f1d2bb955cf77575f31afbf8a84a8366d9d7c1c11bf0b4df1b13dcb41d0fc2aea1478674b878de586bad58626fe455ca42fa99b5df1a578a20777de688e8efec12f5c41ed4088c2031f88a91856013bd563397bfb5939e4766e2ec69b22ef771bdfc78ca0bb8e0181ea3b0060b554989de0f1efcf8cb249c7015acadf9efd0eaac1908e5b730be4d2dcf892b3caf14e10e7dd4e07da5e49d8bdf06f37bef6b09ef009a0810b2f17d7b"], 0x3, 0x3) stat(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0x71, 0x7fffffff}, {0x6, 0x9}], r2}, 0x18, 0x7) [ 295.355638] FAULT_INJECTION: forcing a failure. [ 295.355638] name failslab, interval 1, probability 0, space 0, times 0 [ 295.381759] CPU: 0 PID: 9928 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 295.389621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.399131] Call Trace: [ 295.401833] dump_stack+0x142/0x197 [ 295.405511] should_fail.cold+0x10f/0x159 [ 295.409690] should_failslab+0xdb/0x130 [ 295.413696] kmem_cache_alloc+0x2d7/0x780 [ 295.417865] ? find_held_lock+0x35/0x130 [ 295.421944] ? copy_tree+0x4a2/0x8a0 [ 295.425686] alloc_vfsmnt+0x28/0x7d0 [ 295.429420] clone_mnt+0x70/0xee0 [ 295.432891] ? lock_downgrade+0x740/0x740 [ 295.437057] ? do_raw_spin_unlock+0x16b/0x260 [ 295.441571] copy_tree+0x33b/0x8a0 [ 295.445138] copy_mnt_ns+0x11c/0x8c0 [ 295.448861] ? kmem_cache_alloc+0x611/0x780 [ 295.453203] ? selinux_capable+0x36/0x40 [ 295.457291] create_new_namespaces+0xc9/0x720 [ 295.461806] ? ns_capable_common+0x12c/0x160 [ 295.466285] copy_namespaces+0x284/0x310 [ 295.470368] copy_process.part.0+0x2603/0x6a00 [ 295.474986] ? proc_fail_nth_write+0x7d/0x180 [ 295.479507] ? proc_cwd_link+0x1b0/0x1b0 [ 295.483625] ? __cleanup_sighand+0x50/0x50 [ 295.487882] ? lock_downgrade+0x740/0x740 [ 295.492081] _do_fork+0x19e/0xce0 [ 295.495558] ? fork_idle+0x280/0x280 [ 295.499297] ? fput+0xd4/0x150 [ 295.502503] ? SyS_write+0x15e/0x230 [ 295.506237] SyS_clone+0x37/0x50 [ 295.509608] ? sys_vfork+0x30/0x30 [ 295.513203] do_syscall_64+0x1e8/0x640 [ 295.517109] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 295.521986] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 295.527189] RIP: 0033:0x45a639 [ 295.530386] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 295.538159] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 295.545454] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 04:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000000)='cifs.spnego\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='mime_type.system%trustedkeyring{em0/cpusetselinuxppp0\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f00000000c0)='.request_key_auth\x00', &(0x7f0000000100)=@secondary='builtin_and_secondary_trusted\x00') r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000140)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x7, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @bcast]}) 04:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000280)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff7000/0x4000)=nil, &(0x7f0000000480)="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", 0x1000, r3}, 0x68) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, [], [{0x10000, 0x0, 0x1344a5a1, 0x100000000}, {0x1, 0x6, 0x1ff, 0xfff, 0x4, 0x3}], [[], [], []]}) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r6, 0x0, 0x2d, &(0x7f0000000340)={0x81, {{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r7 = openat$cgroup_ro(r4, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$sock_bt_hci(r7, 0x400448e3, &(0x7f0000000040)="a9cd9a0dda6ebc50e6d0bd9fd5568bfc2cc3019bf6a7b7a9bd13e6f8339a13e96d2e50422f306733278bf91150ed0609eb94d35e01e57502960e2e8a4c4466df9c92559b59a732efec3a2fe20fec51ce072352b42e7334ec285d0eb293b2cbc9d38fcc219e1822bb880287a7c018723fbc69d025914d2d26d8dcc17317e6eefbdf5b4125b3787297466d53e65bc2a47b8ce355b8327e65c875df289636662ed46c1351ecbfe68f8894f73ffc219420e6cb4ee54f99c88a9a") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 295.553443] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 295.560739] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 295.568028] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:07 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x2, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {0x0}, {}, {}, {}]}) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x7, 0x100) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r4, 0x0) r5 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r7, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r12 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r13, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x1, r8}, {}, {0x2, 0x1, r9}, {0x2, 0x0, r10}], {0x4, 0x1}, [{}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x0, r11}, {0x8, 0x1}, {0x8, 0x4, r13}, {0x8, 0x0, r14}]}, 0x7c, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r16, 0x0) r17 = getgid() lstat(&(0x7f0000002300)='./file0\x00', &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r23 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r24, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x1, r19}, {}, {0x2, 0x1, r20}, {0x2, 0x0, r21}], {0x4, 0x1}, [{}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x0, r22}, {0x8, 0x1}, {0x8, 0x4, r24}, {0x8, 0x0, r25}]}, 0x7c, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r26, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r27, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r32 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r32, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r33, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x1, r28}, {}, {0x2, 0x1, r29}, {0x2, 0x0, r30}], {0x4, 0x1}, [{}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x0, r31}, {0x8, 0x1}, {0x8, 0x4, r33}, {0x8, 0x0, r34}]}, 0x7c, 0x2) write$FUSE_DIRENTPLUS(r2, &(0x7f00000023c0)={0x370, 0x0, 0x4, [{{0x2, 0x0, 0x6, 0x131, 0xffffdf22, 0x8, {0x4, 0xa6, 0x9, 0x0, 0x1, 0x1ff, 0x3, 0x13f, 0x3, 0x100, 0x1, r4, r5, 0x7, 0x3}}, {0x6, 0x4, 0x1d, 0x200, '^bdevtrustedposix_acl_access,'}}, {{0x0, 0x1, 0x1000, 0x7, 0xfff, 0x7, {0x3, 0x8001, 0x66, 0xff, 0x101, 0x6, 0x1, 0x8, 0x1000, 0x1, 0x9, r7, r14, 0x308e, 0x8}}, {0x3, 0x0, 0xb, 0x1ff, '/dev/hwrng\x00'}}, {{0x1, 0x3, 0x4bac, 0xc899, 0x1, 0xf4, {0x3, 0x4, 0x8, 0x8, 0x4, 0x100000000, 0x0, 0x80000001, 0x6, 0x80000000, 0x22, r16, r17, 0x3, 0x8000}}, {0x0, 0x3f, 0x27, 0x73, 'em0posix_acl_accesslovboxnet1[(lo]bdev*'}}, {{0x5, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x9, {0x1, 0x5, 0x1, 0x2, 0x8, 0x3, 0xd71, 0x80, 0x80, 0x7fffffff, 0x6, r18, r25, 0x4, 0x574e}}, {0x0, 0x10000, 0x8, 0x7ff, 'nodev\\-!'}}, {{0x5, 0x2, 0x4, 0x1, 0x5, 0x1, {0x3, 0x10000, 0x50, 0xbc, 0x9, 0x0, 0x1000, 0x8, 0x80, 0x1, 0x960, r27, r31, 0x8e6, 0xad}}, {0x4, 0x800, 0x5, 0xfff, '{self'}}]}, 0x370) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000240)={r1, &(0x7f00000001c0)=""/18}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000140)={r1, 0x3, &(0x7f0000000040)=[0x7, 0x0, 0xe731], &(0x7f0000000080)=[0x7f, 0x1000, 0x7fff, 0xffff], 0x10, 0x3, 0x7, &(0x7f00000000c0)=[0x1, 0x5, 0x80000001], &(0x7f0000000100)=[0x60df, 0x44b2, 0x20, 0x20, 0x7, 0xffffe9b4, 0xffffff7f, 0x80]}) prctl$PR_GET_FP_MODE(0x2e) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_NESTED_STATE(r0, 0xc080aebe, &(0x7f0000000280)={0x0, 0x0, 0x2080}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x20000000, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) connect$l2tp(r1, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x1, 0x3, 0x2, {0xa, 0x4e24, 0x8b, @remote, 0x4}}}, 0x3a) 04:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0xfffffe3b, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@nl=@proc, &(0x7f0000000100)=0x80, 0x80000) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000140)={{0x5, 0x0, 0x7, 0x8, 0x40}, 0x8, 0x8, 0x8}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xde, 0xfe, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x100, 0x70bd29, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x600448d3) 04:43:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xf0c47f5315f85cdc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$NBD_DO_IT(r1, 0xab03) write(r0, &(0x7f0000000000)="17eea6c47922d682752e775a76e67444f522def3ab398b7dace30edd14cdbf1447d1ca2cc8a8deb33c4b4c8a9255c83e1a89e05d6155a04ec64b101756e83cf0da77c508b7ca556df4347dffd5d0b3878bee5ea022db9bada31e1c1769608c8227cbe2e8aa946fe74884dfb2ec9c5caaa6625fee1a472ff23501eaeeef1b45c0bded7d08b969bf41505a2b5a8aaf21905a70eca3237fe042868f5dad59f9c21be125ad09c9247125f1d3dedc5eb2dc9d974c3948309f4af8dee7636e21749ab57f6d9c9f0ef1302be9725700401cf6394895f37f4583253c618f61e6815eb3f8a848905c1b", 0xe5) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:07 executing program 5 (fault-call:1 fault-nth:32): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$sock_proto_private(r0, 0x89ea, &(0x7f0000000000)="993c05bda38b7179360328e2b74c67459a990949cb0b9f79c7ab06e0a4a480afca86c64e113bbf74097ad9dd46226ab24e3d06145ff07b03e8ff6ae494cd38559464bfa2e652de0a61895f85848c7f37f446bc7a49b455") lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x20000000, 0x0, 0x1}, 0x0, 0xd, 0xffffffffffffffff, 0x0) lsetxattr$smack_xattr_label(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='security.SMACK64IPOUT\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="745baf11af65642e6f7665726c61792e6f726967696e0000"], 0x18, 0x1) 04:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x81, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000040)={0x2, 0x1, {0x0, 0x3, 0x81, 0x1, 0x19}}) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x3, 0x7799}, 0xc) clock_getres(0x3e5de4a4dcff4669, 0xfffffffffffffffd) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 296.038373] FAULT_INJECTION: forcing a failure. [ 296.038373] name failslab, interval 1, probability 0, space 0, times 0 [ 296.083839] CPU: 0 PID: 9978 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 296.091694] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.101178] Call Trace: [ 296.103797] dump_stack+0x142/0x197 [ 296.107463] should_fail.cold+0x10f/0x159 [ 296.111646] should_failslab+0xdb/0x130 [ 296.115648] kmem_cache_alloc+0x2d7/0x780 [ 296.119830] alloc_vfsmnt+0x28/0x7d0 [ 296.123564] clone_mnt+0x70/0xee0 [ 296.127051] copy_tree+0x33b/0x8a0 [ 296.130623] copy_mnt_ns+0x11c/0x8c0 [ 296.134350] ? kmem_cache_alloc+0x611/0x780 [ 296.138691] ? selinux_capable+0x36/0x40 [ 296.142788] create_new_namespaces+0xc9/0x720 [ 296.147318] ? ns_capable_common+0x12c/0x160 [ 296.151753] copy_namespaces+0x284/0x310 [ 296.155841] copy_process.part.0+0x2603/0x6a00 [ 296.160477] ? proc_fail_nth_write+0x7d/0x180 [ 296.164993] ? proc_cwd_link+0x1b0/0x1b0 [ 296.169096] ? __cleanup_sighand+0x50/0x50 [ 296.173337] ? lock_downgrade+0x740/0x740 [ 296.173364] _do_fork+0x19e/0xce0 [ 296.173383] ? fork_idle+0x280/0x280 [ 296.173403] ? fput+0xd4/0x150 [ 296.180981] ? SyS_write+0x15e/0x230 [ 296.181003] SyS_clone+0x37/0x50 [ 296.181012] ? sys_vfork+0x30/0x30 [ 296.181030] do_syscall_64+0x1e8/0x640 [ 296.181040] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.207416] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 296.212632] RIP: 0033:0x45a639 [ 296.215862] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 296.223615] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 04:43:08 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setns(r0, 0x8000000) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 296.230906] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 296.238196] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.246529] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 296.253826] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:08 executing program 5 (fault-call:1 fault-nth:33): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 296.377916] FAULT_INJECTION: forcing a failure. [ 296.377916] name failslab, interval 1, probability 0, space 0, times 0 [ 296.409753] CPU: 0 PID: 9997 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 296.417612] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.426990] Call Trace: [ 296.429615] dump_stack+0x142/0x197 [ 296.433284] should_fail.cold+0x10f/0x159 [ 296.437473] should_failslab+0xdb/0x130 [ 296.441476] __kmalloc_track_caller+0x2ec/0x790 [ 296.446184] ? kstrdup_const+0x48/0x60 [ 296.450102] kstrdup+0x3a/0x70 [ 296.453323] kstrdup_const+0x48/0x60 [ 296.457066] alloc_vfsmnt+0xe5/0x7d0 [ 296.460814] clone_mnt+0x70/0xee0 [ 296.464383] ? lock_downgrade+0x740/0x740 [ 296.468572] ? do_raw_spin_unlock+0x16b/0x260 [ 296.473108] copy_tree+0x33b/0x8a0 [ 296.476685] copy_mnt_ns+0x11c/0x8c0 [ 296.480413] ? kmem_cache_alloc+0x611/0x780 [ 296.484760] ? selinux_capable+0x36/0x40 [ 296.488857] create_new_namespaces+0xc9/0x720 [ 296.493377] ? ns_capable_common+0x12c/0x160 [ 296.497823] copy_namespaces+0x284/0x310 [ 296.501919] copy_process.part.0+0x2603/0x6a00 [ 296.506537] ? proc_fail_nth_write+0x7d/0x180 [ 296.511044] ? proc_cwd_link+0x1b0/0x1b0 [ 296.515140] ? __cleanup_sighand+0x50/0x50 [ 296.519400] ? lock_downgrade+0x740/0x740 [ 296.523585] _do_fork+0x19e/0xce0 [ 296.527069] ? fork_idle+0x280/0x280 [ 296.530919] ? fput+0xd4/0x150 [ 296.534137] ? SyS_write+0x15e/0x230 [ 296.537890] SyS_clone+0x37/0x50 [ 296.541268] ? sys_vfork+0x30/0x30 [ 296.544830] do_syscall_64+0x1e8/0x640 [ 296.548738] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 296.553619] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 296.558828] RIP: 0033:0x45a639 [ 296.562040] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 296.569864] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 04:43:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r0, r1, 0x0, 0xe, &(0x7f0000000080)='vboxnet1,ppp1\x00', 0xffffffffffffffff}, 0x30) r3 = perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0x8, 0x7f, 0x4, 0xc0, 0x0, 0x40, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xff, 0x1, @perf_config_ext={0xa2, 0xd31e}, 0x85, 0x553e, 0x600000, 0x6, 0x6, 0xc52b, 0x9}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xa) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x4, 0x85, 0x80, 0x5, 0x0, 0x8, 0x80, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x80, 0x9}, 0x800, 0x2, 0x7, 0x0, 0x100000000, 0x9, 0x20}, r2, 0x9, r3, 0x3) 04:43:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="2321202e2f66696c6530206367726f75702773797374656d20206e6f64657626236574683073656c666574fdffffff400a94994951b920075897bda53a76354e1af68d7f83b6ca5e5001bc1059c2dddc1d7eaf1c04c1f0d286d1631e003edabb23137a147c7e"], 0x66) r0 = open(&(0x7f0000000000)='./file0\x00', 0x123800, 0x95) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000180)={0x5, &(0x7f0000000140)=[{}, {0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(0xffffffffffffffff, 0x4010641c, &(0x7f0000000240)={r1, &(0x7f00000001c0)=""/18}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f00000000c0)={r1, 0xfdc386d966bf2142}) timerfd_create(0x3, 0x40c00) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101240, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x2) r2 = syz_open_dev$usbmon(0x0, 0x45, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000200)=0x1) ioctl$KDDISABIO(r2, 0x4b37) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)) ioctl$sock_SIOCGPGRP(r2, 0x8904, 0x0) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000180)={0x2, 0xde66, 0xfffa, 0x9, 0x3, 0x7}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r2, 0xc0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x6, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000640)={0x3, 0x10, 0x4, 0xfe4}, &(0x7f0000000680), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=0x6}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=r3, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000040)=""/85, 0x55, r3}}, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r2, 0x508, 0x70bd2a, 0x25dfdbfd, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x12, 0x9, 0x0, 0x4}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0xd040) openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0xfe1ba52edf7e5e42, 0x0) r3 = memfd_create(&(0x7f0000000000)='vboxnet0\x00', 0x412013dd765f4ecb) dup2(r3, r0) [ 296.577159] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 296.584449] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 296.591742] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 296.599380] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x4f, 0x0, 0x28, 0x80, 0x0, 0x98, 0x40c00, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x0, @perf_bp={&(0x7f0000000040)}, 0x2, 0x101, 0x9, 0x8, 0x8, 0x9, 0x3ff}, r0, 0x1, r1, 0xd8b847acd4ba3b04) stat(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380), &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) r4 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r5, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) getresuid(&(0x7f0000000540), &(0x7f00000001c0)=0x0, &(0x7f0000000240)) getresuid(&(0x7f00000002c0), &(0x7f0000000380)=0x0, &(0x7f00000003c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @loopback}}, 0x0, @in6}}, &(0x7f0000000280)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) r11 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r12, 0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0)={0x0, 0x0, 0x0}, &(0x7f0000000700)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000740)={{}, {0x1, 0x4}, [{0x2, 0x1, r7}, {}, {0x2, 0x1, r8}, {0x2, 0x0, r9}], {0x4, 0x1}, [{}, {0x8, 0x4}, {0x8, 0x7}, {0x8, 0x0, r10}, {0x8, 0x1}, {0x8, 0x4, r12}, {0x8, 0x0, r13}]}, 0x7c, 0x2) getgroups(0x4, &(0x7f0000000200)=[0xee01, r6, 0xffffffffffffffff, r10]) fchown(r2, r3, r14) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:08 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x2, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 0: unshare(0x1ff1286a9da7565a) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000040)=':\xff/\x00', &(0x7f0000000080)='\x00', &(0x7f00000000c0)='vmnet0\xf3vboxnet0\x00', &(0x7f0000000100)='ppp1userQeth0vmnet0vmnet1\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='+@\x00'], &(0x7f0000000380)=[&(0x7f0000000200)='\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='securitycgroup\x00', &(0x7f00000002c0)=']em1em1#cpuset[\x00', &(0x7f0000000300)='em1proc[em0vmnet1{#$\'\x00', &(0x7f0000000340)='^}md5sumwlan0@posix_acl_access[-!]keyring\x00']) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x20) fchmod(r0, 0x6741576111f67cdd) shutdown(r0, 0x1) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f00000003c0)=0x9, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/66, 0x42}, {&(0x7f0000000080)=""/242, 0xf2}, {&(0x7f0000000180)=""/14, 0xe}], 0x3, 0x9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RAUTH(r2, &(0x7f0000000080)={0x14, 0x67, 0x1, {0xa1, 0x0, 0x1}}, 0x14) bind$rds(r4, &(0x7f0000000000)={0x2, 0x4e21, @loopback}, 0x10) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x181900, 0x0) ioctl$FICLONE(r5, 0x40049409, r3) 04:43:08 executing program 5 (fault-call:1 fault-nth:34): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x400) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000000)=""/89) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x4, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_AUDOUT(r3, 0x80345631, &(0x7f0000000180)) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000540)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000000c0)=0xb4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@sack_info={r4, 0x2, 0x7fff}, &(0x7f0000000140)=0xc) 04:43:08 executing program 0: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x9}, 0x0, 0x0, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400000, 0x80) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, &(0x7f0000000480)={0x7, 0x0, [{0x3000, 0x3e, &(0x7f00000000c0)=""/62}, {0x100000, 0x11, &(0x7f0000000100)=""/17}, {0x6000, 0x49, &(0x7f0000000140)=""/73}, {0x4, 0xc8, &(0x7f00000001c0)=""/200}, {0x6000, 0x50, &(0x7f0000000340)=""/80}, {0xf000, 0x28, &(0x7f00000002c0)=""/40}, {0x1, 0x31, &(0x7f00000003c0)=""/49}]}) 04:43:08 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x200000, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x375, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x781e, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0x8, r0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x98dc56883f73ae44, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x1, 0x4, 0xe1, 0x20, 0x0, 0x9f, 0x1412, 0xefb2459a5899a6c2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6849, 0x4, @perf_config_ext={0x55, 0x4}, 0xa0, 0x0, 0xfffffffe, 0x0, 0x2, 0x18, 0x7}, r1, 0x10, r3, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:08 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000080)) [ 296.832283] FAULT_INJECTION: forcing a failure. [ 296.832283] name failslab, interval 1, probability 0, space 0, times 0 [ 296.898331] CPU: 1 PID: 10039 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 296.906285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.915767] Call Trace: [ 296.918353] dump_stack+0x142/0x197 [ 296.922169] should_fail.cold+0x10f/0x159 [ 296.926324] should_failslab+0xdb/0x130 [ 296.930381] __kmalloc_track_caller+0x2ec/0x790 [ 296.935050] ? kstrdup_const+0x48/0x60 [ 296.938929] kstrdup+0x3a/0x70 [ 296.942117] kstrdup_const+0x48/0x60 [ 296.945824] alloc_vfsmnt+0xe5/0x7d0 [ 296.949537] clone_mnt+0x70/0xee0 [ 296.952986] ? lock_downgrade+0x740/0x740 [ 296.957133] ? do_raw_spin_unlock+0x16b/0x260 [ 296.961619] copy_tree+0x33b/0x8a0 [ 296.965184] copy_mnt_ns+0x11c/0x8c0 [ 296.968914] ? kmem_cache_alloc+0x611/0x780 [ 296.973230] ? selinux_capable+0x36/0x40 [ 296.977329] create_new_namespaces+0xc9/0x720 [ 296.982023] ? ns_capable_common+0x12c/0x160 [ 296.986455] copy_namespaces+0x284/0x310 [ 296.990519] copy_process.part.0+0x2603/0x6a00 [ 296.995340] ? proc_fail_nth_write+0x7d/0x180 [ 296.999841] ? proc_cwd_link+0x1b0/0x1b0 [ 297.003907] ? __cleanup_sighand+0x50/0x50 [ 297.008147] ? lock_downgrade+0x740/0x740 [ 297.012308] _do_fork+0x19e/0xce0 [ 297.015889] ? fork_idle+0x280/0x280 [ 297.019658] ? fput+0xd4/0x150 [ 297.022842] ? SyS_write+0x15e/0x230 [ 297.026547] SyS_clone+0x37/0x50 [ 297.029896] ? sys_vfork+0x30/0x30 [ 297.033490] do_syscall_64+0x1e8/0x640 [ 297.037375] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.042223] entry_SYSCALL_64_after_hwframe+0x42/0xb7 04:43:09 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) gettid() ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x2) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000040)="7532ef59498001a990f123f901961c3870f836d433783d0612b31ea8fcfe5a33fdaf133fc354cba53edaa053ec424079efba30385b4de869eb62fc0b1a688384bd17", 0x42, 0x800, 0x0, 0x0) [ 297.047401] RIP: 0033:0x45a639 [ 297.050587] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 297.058561] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 297.065832] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 297.073100] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.080524] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 297.087800] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) fcntl$setflags(r0, 0x2, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0xa9e47420b9927f78, 0x0) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 04:43:09 executing program 5 (fault-call:1 fault-nth:35): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x9, 0x3, [0x8, 0x6, 0x2]}, &(0x7f0000000080)=0xe) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000000c0)={r2, 0x4, 0x0, 0x4, 0x1}, &(0x7f0000000100)=0x18) r3 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bind$vsock_dgram(r4, &(0x7f0000000140)={0x28, 0x0, 0x0, @reserved}, 0x10) ioctl$int_in(r3, 0x5452, &(0x7f0000000000)=0x7) 04:43:09 executing program 2: perf_event_open(&(0x7f0000000300)={0x2, 0x70, 0xdb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffe, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x1e) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)=0x0) prlimit64(r2, 0x5, &(0x7f00000003c0)={0x8, 0x40}, &(0x7f0000000400)) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x2, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="cbf7de0db604d24476fdd00a10a4441e073cc57baac35073e3d4", 0x1a, 0x6}], 0x50000, &(0x7f0000000240)={[{@noquota='noquota'}, {@wsync='wsync'}, {@swalloc='swalloc'}], [{@euid_gt={'euid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@euid_lt={'euid<', r3}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}&keyringem1[s%(\'ppp0wlan0security@'}}]}) 04:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200000, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) signalfd4(r1, &(0x7f0000000100)={0x9}, 0x8, 0x800) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000080)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 297.284075] FAULT_INJECTION: forcing a failure. [ 297.284075] name failslab, interval 1, probability 0, space 0, times 0 [ 297.346078] CPU: 1 PID: 10088 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 297.354023] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.363396] Call Trace: [ 297.366006] dump_stack+0x142/0x197 [ 297.369667] should_fail.cold+0x10f/0x159 [ 297.373851] should_failslab+0xdb/0x130 [ 297.377850] kmem_cache_alloc+0x2d7/0x780 [ 297.382018] ? find_held_lock+0x35/0x130 [ 297.386095] ? copy_tree+0x4a2/0x8a0 [ 297.389840] alloc_vfsmnt+0x28/0x7d0 [ 297.393577] clone_mnt+0x70/0xee0 [ 297.397053] ? lock_downgrade+0x740/0x740 [ 297.401348] ? do_raw_spin_unlock+0x16b/0x260 [ 297.405873] copy_tree+0x33b/0x8a0 [ 297.409455] copy_mnt_ns+0x11c/0x8c0 [ 297.413184] ? kmem_cache_alloc+0x611/0x780 [ 297.417610] ? selinux_capable+0x36/0x40 [ 297.421703] create_new_namespaces+0xc9/0x720 [ 297.426216] ? ns_capable_common+0x12c/0x160 [ 297.430653] copy_namespaces+0x284/0x310 [ 297.434740] copy_process.part.0+0x2603/0x6a00 [ 297.439354] ? proc_fail_nth_write+0x7d/0x180 [ 297.443865] ? proc_cwd_link+0x1b0/0x1b0 [ 297.447970] ? __cleanup_sighand+0x50/0x50 [ 297.452225] ? lock_downgrade+0x740/0x740 [ 297.456407] _do_fork+0x19e/0xce0 [ 297.459886] ? fork_idle+0x280/0x280 [ 297.463617] ? fput+0xd4/0x150 [ 297.466845] ? SyS_write+0x15e/0x230 [ 297.470580] SyS_clone+0x37/0x50 [ 297.473959] ? sys_vfork+0x30/0x30 [ 297.477518] do_syscall_64+0x1e8/0x640 [ 297.481420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.486288] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 297.491496] RIP: 0033:0x45a639 04:43:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$KVM_ARM_SET_DEVICE_ADDR(r1, 0x4010aeab, &(0x7f0000000000)={0xf09b, 0xd000}) r2 = socket$isdn(0x22, 0x3, 0x0) lseek(r2, 0x257, 0x1) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:09 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 297.495216] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 297.502946] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 297.510233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 297.517517] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.524800] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 297.532085] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x3f, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 5 (fault-call:1 fault-nth:36): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 0: fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000000)=0x7) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x5, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) execve(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)=[&(0x7f0000000080)='/dev/usbmon#\x00', &(0x7f00000000c0)=')selinux\x00', &(0x7f0000000100)='ppp1\x00', &(0x7f0000000140)='/dev/usbmon#\x00', &(0x7f0000000180)='\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='/dev/usbmon#\x00', &(0x7f0000000240)='/dev/usbmon#\x00', &(0x7f0000000280)='/dev/usbmon#\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/usbmon#\x00']) getgroups(0x1, &(0x7f0000000400)=[0xee01]) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000440)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r3, 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000000)=')selinux\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0xb64c221209d3c139, &(0x7f0000000540)={'trans=xen,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@uname={'uname', 0x3d, 'keyring#'}}, {@posixacl='posixacl'}], [{@func={'func', 0x3d, 'FILE_CHECK'}}, {@uid_lt={'uid<', r1}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@fowner_gt={'fowner>', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}]}}) 04:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8000, 0x141240) getsockopt$packet_int(r0, 0x107, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r1, &(0x7f0000005e40)=[{{&(0x7f00000000c0)=@in6={0xa, 0x0, 0x0, @initdev}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000140)=""/143, 0x8f}, {&(0x7f0000000200)=""/67, 0x43}, {&(0x7f0000000280)=""/49, 0x31}, {&(0x7f00000002c0)=""/33, 0x21}, {&(0x7f0000000300)=""/240, 0xf0}, {&(0x7f0000000400)=""/12, 0xc}, {&(0x7f0000000440)=""/177, 0xb1}, {&(0x7f0000000500)=""/136, 0x88}], 0x8}, 0xffffffff}, {{&(0x7f0000000640)=@alg, 0x80, &(0x7f0000002780)=[{&(0x7f00000006c0)=""/112, 0x70}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)=""/8, 0x8}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x4, &(0x7f00000027c0)=""/125, 0x7d}, 0x981}, {{0x0, 0x0, &(0x7f0000003b40)=[{&(0x7f0000002840)=""/53, 0x35}, {&(0x7f0000002880)=""/4096, 0x1000}, {&(0x7f0000003880)=""/222, 0xde}, {&(0x7f0000003980)=""/49, 0x31}, {&(0x7f00000039c0)=""/52, 0x34}, {&(0x7f0000003a00)=""/45, 0x2d}, {&(0x7f0000003a40)=""/211, 0xd3}], 0x7, &(0x7f0000003bc0)=""/93, 0x5d}, 0x1}, {{&(0x7f0000003c40)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000005dc0)=[{&(0x7f0000003cc0)=""/9, 0x9}, {&(0x7f0000003d00)=""/4096, 0x1000}, {&(0x7f0000004d00)=""/75, 0x4b}, {&(0x7f0000004d80)=""/53, 0x35}, {&(0x7f0000004dc0)=""/4096, 0x1000}], 0x5}, 0xc1}], 0x4, 0x10000, &(0x7f0000005f40)={0x0, 0x1c9c380}) [ 297.711927] FAULT_INJECTION: forcing a failure. [ 297.711927] name failslab, interval 1, probability 0, space 0, times 0 [ 297.758769] CPU: 0 PID: 10132 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 297.766695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.776049] Call Trace: [ 297.776072] dump_stack+0x142/0x197 [ 297.776100] should_fail.cold+0x10f/0x159 [ 297.776123] should_failslab+0xdb/0x130 [ 297.790470] __kmalloc_track_caller+0x2ec/0x790 [ 297.795170] ? kstrdup_const+0x48/0x60 [ 297.799084] kstrdup+0x3a/0x70 [ 297.802313] kstrdup_const+0x48/0x60 04:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x0f@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r2, 0x0, 0xc4}, &(0x7f0000000040)={'enc=', 'pkcs1', ' hash=', {'sha3-256-generic\x00'}}, &(0x7f00000000c0), &(0x7f0000000100)=""/196) [ 297.806217] alloc_vfsmnt+0xe5/0x7d0 [ 297.809955] clone_mnt+0x70/0xee0 [ 297.813412] ? lock_downgrade+0x740/0x740 [ 297.813429] ? do_raw_spin_unlock+0x16b/0x260 [ 297.813447] copy_tree+0x33b/0x8a0 [ 297.822080] copy_mnt_ns+0x11c/0x8c0 [ 297.822091] ? kmem_cache_alloc+0x611/0x780 [ 297.822108] ? selinux_capable+0x36/0x40 [ 297.822130] create_new_namespaces+0xc9/0x720 [ 297.842226] ? ns_capable_common+0x12c/0x160 [ 297.846663] copy_namespaces+0x284/0x310 [ 297.850753] copy_process.part.0+0x2603/0x6a00 04:43:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r1, 0x0) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000013c0)=0x0) syz_mount_image$iso9660(&(0x7f0000000040)='iso9660\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x4, &(0x7f0000001340)=[{&(0x7f00000000c0)="4c3a491472a872e9c3eb80c0265e77c6fdf0d382416d52d6670a01156c15eb3b50e1cb0be6dfe70fbe753bf5d67d3a44f8b3154475b6bfbe66ff7847e39611e569d922aba6dc24519c30fa1b4b7f280fefbad9a8628000e5b498c86250c42ab98505114488c1a15e8530af5b1c552781e43393a33199c9016d73c08976ad02b9da1e052efeda3e84b051638654134d7858799bb86abbe3802b5902689c1f36772867aae1b138891cd98e2e9f765ad4ea971b04f6c41b46d7e98242ee383c567a92cfbfd218835b2c2a43dde59769add8b2036ab706b2dcdd2441bdd90a7b49f2802a8b20de3eee37913c2676131d1fdc127fcbf9d89a020615f66b4ad0", 0xfd, 0x8}, {&(0x7f00000001c0)="4d58c2823445cba87dc5dd9be4e3458a33879d2a66a1ce306626266f64cc5bd7180c20a96deef58e116175010acef33066e62549386975b7be72b963e4c465aaa7ed8d395138267bd1fdd9974d9b0ba266e1c4790a06e802d6e378b5d35993a4a6c4fc835ee842f6d7f4f1c1f628544e7f9651b70abfd8e60c91225f91395041916d9383e46972e38c01db134c89a6ef5de2230d85f840506f35c8cce2", 0x9d, 0xff}, {&(0x7f0000000280)="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", 0x1000, 0x591769e9}, {&(0x7f0000001280)="ef8234053d44f61dae4945ae843045a25df8d4713cfe21744320f5da28387419ef4bf507d73e37d1250865be46e6a82759dcc1251d5c94c793dc683e6a87300c86548e877b8f5fc18490ba37f923028f5e530b0b90d5472758b53331ba83e60a099dd22ab535e7a363d808e55ad78d675347a335e19150fd8b5480f9640a04d3232dc7f6897a", 0x86, 0x1}], 0x2010, &(0x7f0000001400)={[{@hide='hide'}, {@cruft='cruft'}, {@map_off='map=off'}, {@map_off='map=off'}, {@map_normal='map=normal'}, {@norock='norock'}, {@session={'session', 0x3d, 0x15}}, {@nojoliet='nojoliet'}], [{@euid_lt={'euid<', r1}}, {@measure='measure'}, {@appraise_type='appraise_type=imasig'}, {@uid_eq={'uid', 0x3d, r2}}, {@subj_user={'subj_user', 0x3d, '/dev/usbmon#\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@audit='audit'}]}) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000001500)='cpuacct.usage_user\x00', 0x0, 0x0) ioctl$VIDIOC_S_PRIORITY(r4, 0x40045644, 0x5) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 297.855368] ? proc_fail_nth_write+0x7d/0x180 [ 297.859884] ? proc_cwd_link+0x1b0/0x1b0 [ 297.863972] ? __cleanup_sighand+0x50/0x50 [ 297.868218] ? lock_downgrade+0x740/0x740 [ 297.872388] _do_fork+0x19e/0xce0 [ 297.875863] ? fork_idle+0x280/0x280 [ 297.879599] ? fput+0xd4/0x150 [ 297.882810] ? SyS_write+0x15e/0x230 [ 297.886545] SyS_clone+0x37/0x50 [ 297.890100] ? sys_vfork+0x30/0x30 [ 297.893658] do_syscall_64+0x1e8/0x640 [ 297.897558] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 297.902514] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 297.907720] RIP: 0033:0x45a639 [ 297.910920] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 297.918656] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 297.925947] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 297.933236] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 297.940527] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 297.947815] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:09 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x1, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x8}, 0x0, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffd, 0x8}, 0x0, 0x0, r0, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @rand_addr=0x1}, 0x10) 04:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x52, "9d6138db17b7765f54686a4ad654386ddb5103ac8f54da1ca04d07268f34d9423b64cad9b4f16349c1fd4e9c20d295d44bf35a2a6b4ca844f9285979a37fe21ba9c2f19c3d08ced4b8d154f02989a95aa2db"}, &(0x7f0000000180)=0x5a) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0xffffffc1}, 0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0x8) rt_sigsuspend(&(0x7f0000000200)={0x1}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x2, 0x49, 0x200, 0xff, 0x2, 0x3, 0xff, 0xffff7fff, r4}, 0x20) 04:43:10 executing program 5 (fault-call:1 fault-nth:37): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0060101, 0x0, 0x0, 0x0, 0x0) 04:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_GET_DEBUGREGS(r1, 0x8080aea1, &(0x7f0000000080)) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) connect$bt_sco(r0, &(0x7f0000000040)={0x1f, {0xff, 0x1e, 0x1, 0x40, 0xf4, 0x1}}, 0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x5, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$bt_bnep(0x1f, 0x3, 0x4) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x17040, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil}) getsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000000)=0x6, &(0x7f0000000040)=0x2) [ 298.122909] FAULT_INJECTION: forcing a failure. [ 298.122909] name failslab, interval 1, probability 0, space 0, times 0 04:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setsockopt$inet6_buf(r1, 0x29, 0x22, &(0x7f00000001c0)="bcb1ee9b3e79289a9b44dfbcc14fd35d8f8d6c8389537ef5687a3f1a4c805ccf749598fb13abfa9be334ffa5c1e932807edbe459f11747344d35fa8d132b57dff3b89aaa262d171b3f58f089fec01371d8c85d1448e601a09daba5b888647851f0ddae69559f8bea5725d01f9c3ab2975bbfa30b02a90f3e8002dff07a9b98aa68adb2e72735c3432f9e3ea0c21858ca7aac5053f5bc3fcfc1d5f6f202c46353ae2d97d8cbbcd029e6b5e821b8985c963833f837767e874700be5733b10b74f71ecb6403477c55606ba04d122202710e7d3c9bf988b36ec5086efa743930bd487219660e22639f467dcf95a7280e1b0e87abab2fbe4c7d8cf672e32ad057d8", 0xff) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_DBG_G_REGISTER(r5, 0xc0385650, &(0x7f0000000500)={{0x3, @addr=0x5}, 0x8, 0x4, 0x2}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) r8 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r8, 0x6741576111f67cdd) mkdirat(r8, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$ION_IOC_ALLOC(r8, 0xc0184900, &(0x7f00000004c0)={0x1, 0x2, 0x0, r1}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket(0x1e, 0x805, 0x0) close(r9) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) r11 = creat(&(0x7f0000000380)='./file0\x00', 0x100) getsockopt(r11, 0xf10, 0x20, &(0x7f00000003c0)=""/187, &(0x7f0000000480)=0xbb) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r12}, 0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000002c0)={r12, 0x30000000, 0x18}, &(0x7f0000000300)=0xc) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000340)={r13, 0x7, 0x5, [0x4, 0x2, 0x8, 0x4, 0x7]}, 0x12) ioctl$sock_inet_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f0000000000)={'dummy0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) clone(0x0, &(0x7f0000000040)="62ed69ed13d9896ac36ece689403a39910ab6f0b3391e4ed65a435a09480543141191713425320dcf1e33dd1a87efb9248b07b9c32e0f217d0ec0a6d56f3c288db3a46c021ab2c13aa3380e863941c315b13f9a43ec489e2ec4a63dad684f2fa550312a9dca861667031ed9ed9af0c3ba5f6c07914", &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="a1e0b6d59932d38e047cba3588f05c3ea613d8f777b9eb397972e67c65ed644314d42378d422d175e0b848a0badfd1de07b183800a1292f27492e0b5e411b95dd621f3e718c46482fc35e1e2ba31bdba467f61d2b2a5f4dad2efdc0f33719706613d4dc1aa04aaa055e760d0fea7a5a7464303fc58a4d0a8") [ 298.186119] CPU: 0 PID: 10168 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 298.194073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.203471] Call Trace: [ 298.206080] dump_stack+0x142/0x197 [ 298.209755] should_fail.cold+0x10f/0x159 [ 298.213930] should_failslab+0xdb/0x130 [ 298.217908] kmem_cache_alloc+0x2d7/0x780 [ 298.222075] ? find_held_lock+0x35/0x130 [ 298.226159] ? copy_tree+0x4a2/0x8a0 [ 298.229908] alloc_vfsmnt+0x28/0x7d0 04:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$NBD_DISCONNECT(0xffffffffffffffff, 0xab08) 04:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 298.233650] clone_mnt+0x70/0xee0 [ 298.237130] ? lock_downgrade+0x740/0x740 [ 298.241317] ? do_raw_spin_unlock+0x16b/0x260 [ 298.245849] copy_tree+0x33b/0x8a0 [ 298.249469] copy_mnt_ns+0x11c/0x8c0 [ 298.253221] ? kmem_cache_alloc+0x611/0x780 [ 298.257583] ? selinux_capable+0x36/0x40 [ 298.261686] create_new_namespaces+0xc9/0x720 [ 298.266386] ? ns_capable_common+0x12c/0x160 [ 298.270826] copy_namespaces+0x284/0x310 [ 298.274914] copy_process.part.0+0x2603/0x6a00 [ 298.279526] ? proc_fail_nth_write+0x7d/0x180 04:43:10 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) r1 = accept$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$sock_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000000c0)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 298.284041] ? proc_cwd_link+0x1b0/0x1b0 [ 298.288156] ? __cleanup_sighand+0x50/0x50 [ 298.292419] ? lock_downgrade+0x740/0x740 [ 298.296610] _do_fork+0x19e/0xce0 [ 298.300107] ? fork_idle+0x280/0x280 [ 298.303844] ? fput+0xd4/0x150 [ 298.307062] ? SyS_write+0x15e/0x230 [ 298.310806] SyS_clone+0x37/0x50 [ 298.314183] ? sys_vfork+0x30/0x30 [ 298.317741] do_syscall_64+0x1e8/0x640 [ 298.321647] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.326522] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 298.331899] RIP: 0033:0x45a639 04:43:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = getpid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x8, 0x20, 0x20, 0x3, 0x0, 0x7, 0x42043, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x928c7d2f78292322, @perf_bp={&(0x7f0000000040), 0x8513566c5b408cc4}, 0xc418, 0xe84b, 0x1, 0x0, 0x3a5, 0x3, 0xfa}, r0, 0x10, r3, 0x3) [ 298.335106] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 298.342860] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 298.350147] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 298.357420] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.364687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 298.364694] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socketpair(0x2, 0x800, 0xfc, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4(r1, &(0x7f0000000040)=@pppol2tpv3, &(0x7f00000000c0)=0x80, 0x800) 04:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_dccp_int(r2, 0x21, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) close(r0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$rose(0xffffffffffffffff, &(0x7f0000000000)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x40) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:10 executing program 5 (fault-call:1 fault-nth:38): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) sendto$x25(0xffffffffffffffff, &(0x7f0000000000)="77faa6d950f998f36445314f0eb995a5d73fa932b85d46bf217b4c8db2b419c931041be27038891ab52c7b6ec5bb47b4f76f830b640d0e48dbd44d33e1", 0x3d, 0x2040, 0x0, 0x0) 04:43:10 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x319040, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x300000060920101, 0x0, 0x0, 0x0, 0x0) [ 298.664966] FAULT_INJECTION: forcing a failure. [ 298.664966] name failslab, interval 1, probability 0, space 0, times 0 [ 298.719040] CPU: 1 PID: 10226 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 298.726994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.736459] Call Trace: [ 298.739185] dump_stack+0x142/0x197 [ 298.742853] should_fail.cold+0x10f/0x159 [ 298.747045] should_failslab+0xdb/0x130 [ 298.751045] __kmalloc_track_caller+0x2ec/0x790 [ 298.755751] ? kstrdup_const+0x48/0x60 [ 298.759680] kstrdup+0x3a/0x70 [ 298.762906] kstrdup_const+0x48/0x60 [ 298.766738] alloc_vfsmnt+0xe5/0x7d0 [ 298.770502] clone_mnt+0x70/0xee0 [ 298.773963] ? lock_downgrade+0x740/0x740 [ 298.778272] ? do_raw_spin_unlock+0x16b/0x260 [ 298.782800] copy_tree+0x33b/0x8a0 [ 298.786385] copy_mnt_ns+0x11c/0x8c0 [ 298.790116] ? kmem_cache_alloc+0x611/0x780 [ 298.794474] ? selinux_capable+0x36/0x40 [ 298.798564] create_new_namespaces+0xc9/0x720 [ 298.803081] ? ns_capable_common+0x12c/0x160 [ 298.807664] copy_namespaces+0x284/0x310 [ 298.811770] copy_process.part.0+0x2603/0x6a00 [ 298.816394] ? proc_fail_nth_write+0x7d/0x180 [ 298.821002] ? proc_cwd_link+0x1b0/0x1b0 [ 298.825111] ? __cleanup_sighand+0x50/0x50 [ 298.829375] ? lock_downgrade+0x740/0x740 [ 298.833569] _do_fork+0x19e/0xce0 [ 298.837065] ? fork_idle+0x280/0x280 [ 298.840807] ? fput+0xd4/0x150 [ 298.844020] ? SyS_write+0x15e/0x230 [ 298.847766] SyS_clone+0x37/0x50 [ 298.851144] ? sys_vfork+0x30/0x30 [ 298.854699] do_syscall_64+0x1e8/0x640 [ 298.858596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 298.863467] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 298.868684] RIP: 0033:0x45a639 [ 298.871886] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 298.879614] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 298.886987] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 298.894280] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 298.902789] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 298.910190] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000080)={&(0x7f0000000040)=""/26, 0x1a}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGRS485(r2, 0x542e, &(0x7f0000000000)) 04:43:11 executing program 5 (fault-call:1 fault-nth:39): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 299.081862] FAULT_INJECTION: forcing a failure. [ 299.081862] name failslab, interval 1, probability 0, space 0, times 0 [ 299.106696] CPU: 0 PID: 10248 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 299.114644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.124018] Call Trace: [ 299.126655] dump_stack+0x142/0x197 [ 299.130328] should_fail.cold+0x10f/0x159 [ 299.134512] should_failslab+0xdb/0x130 [ 299.138516] kmem_cache_alloc+0x2d7/0x780 [ 299.142692] ? find_held_lock+0x35/0x130 [ 299.146775] ? copy_tree+0x4a2/0x8a0 [ 299.150515] alloc_vfsmnt+0x28/0x7d0 [ 299.154253] clone_mnt+0x70/0xee0 [ 299.157725] ? lock_downgrade+0x740/0x740 [ 299.161893] ? do_raw_spin_unlock+0x16b/0x260 [ 299.166409] copy_tree+0x33b/0x8a0 [ 299.169989] copy_mnt_ns+0x11c/0x8c0 [ 299.173715] ? kmem_cache_alloc+0x611/0x780 [ 299.178053] ? selinux_capable+0x36/0x40 [ 299.182150] create_new_namespaces+0xc9/0x720 [ 299.186671] ? ns_capable_common+0x12c/0x160 [ 299.191111] copy_namespaces+0x284/0x310 [ 299.195205] copy_process.part.0+0x2603/0x6a00 [ 299.199829] ? proc_fail_nth_write+0x7d/0x180 [ 299.204343] ? proc_cwd_link+0x1b0/0x1b0 [ 299.208625] ? __cleanup_sighand+0x50/0x50 [ 299.212897] ? lock_downgrade+0x740/0x740 [ 299.217088] _do_fork+0x19e/0xce0 [ 299.220582] ? fork_idle+0x280/0x280 [ 299.224320] ? fput+0xd4/0x150 [ 299.227542] ? SyS_write+0x15e/0x230 [ 299.231417] SyS_clone+0x37/0x50 [ 299.234798] ? sys_vfork+0x30/0x30 [ 299.238360] do_syscall_64+0x1e8/0x640 [ 299.242288] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.247171] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 299.252411] RIP: 0033:0x45a639 [ 299.255611] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 299.263342] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 299.270628] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 299.277956] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.285347] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 299.292633] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 299.304096] IPVS: ftp: loaded support on port[0] = 21 04:43:11 executing program 5 (fault-call:1 fault-nth:40): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:11 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x580, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f0000000200)={0x1ff, 0x6, 0x2, {0x6, @raw_data="d114411a0a711565fd9b8668f26600d71df5b0cde53e027a5fb3b955e57a45533728cfe4d897b3346f98899cb15b211c1ebe287519b1795a65f0986f2fce09ae49a01423b095449eb1a3d367ea3a45cc8fdbbb1cd6f7be838f445dc247edfacdb81c9943bb9214c7765f250e558fac44e9f7ef98f00bff07db293034053104a82fe0861240b1078e0f1dcbd051afe42f622c6fd4fc1e9935b070593baa515c84fd831e7b8250c4341aaacd84bf768cd9b839ba478ce282473ec4339d551c65f58126f02d9e7440a2"}}) unshare(0x2040400) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) write$nbd(r1, &(0x7f0000000480)={0x67446698, 0x0, 0x2, 0x1, 0x4, "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"}, 0x1010) getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000080), &(0x7f0000000140)=0x4) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='cpuset.memory_spread_page\x00', 0x2, 0x0) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0xffffff78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x298d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open(&(0x7f0000000300)='.\x00', 0x80, 0x0) fchmod(r3, 0x6741576111f67cdd) ioctl$DRM_IOCTL_SET_UNIQUE(r3, 0x40106410, &(0x7f0000000180)={0x1000, &(0x7f00000014c0)="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"}) read(r2, &(0x7f0000000000)=""/39, 0x27) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0x1) setresuid(0x0, r6, 0x0) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000026c0)='/dev/sequencer\x00', 0x1d8a519dec25f2c, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = dup2(r8, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r10, r10) sendmsg$unix(r0, &(0x7f0000002780)={&(0x7f0000000340)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002680)=[{&(0x7f00000003c0)="4bc69c8d4a370ba29d6efe1a1b62a84ae10a99e60b09bc60b70b8b79925ad36a375ad34b62f0564b5d108a0e34dd89e0868981077e5eeffa8854e21350e9", 0x3e}, {&(0x7f00000024c0)="3d244fa3f7e9668594de8e539a3c631c72e49c8637a2a0703dcc0ab2608f3553675588ec7d8bf4fdf8166f629b0632e912e48e4276c3ba8b5edaa80c09f788355bd1af05ed18355928f21fc713688f62c8a987b5611122825be31b6b4d2351c918b04c168bc546111ff1ada2f58e7df7b2df1015dee2542dc3fb6d03fb830a7360076b90524b44f7ae7a9760b19c58b562320622ebea88c4a9f6b841c6769e65a4bd5ca896f80f0c4a507af73e104afc22e09e4278ac6aeea5ba7b4a65b2b38e66e0f7207857d4c8157668b28b786673ab67cc13ca6d", 0xd6}, {&(0x7f00000025c0)="cfb27b50eb49bf8712ba4d5983bf396c1a4d7b70fae8b0ddb6bb13f1ebc2f80fefceae02fadacf7c76cddca37300e5656bf239029826f108ea8aecab40cd98a9741ef78a7cd8a42a40e91da4d7f19d45a7fe23cf175f5ac73869c90787fc0a62f5b1f6cb8e6c32c02fd93e105c01bd06bd8d6261ee72cd8993fa7eeac6afe88d978aa864c4c3b07fe668b02b7bc39bddc1d4b4da7cf15b786251603a3b5a8bafd194810ae0c9c2c342bbcb31b5", 0xad}], 0x3, &(0x7f0000002700)=[@cred={{0x1c, 0x1, 0x2, {r4, r6, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r7, r9, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r10, 0xffffffffffffffff]}}], 0x58, 0x40}, 0x1) [ 299.438857] FAULT_INJECTION: forcing a failure. [ 299.438857] name failslab, interval 1, probability 0, space 0, times 0 [ 299.474684] CPU: 1 PID: 10255 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 299.482718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.492188] Call Trace: [ 299.494822] dump_stack+0x142/0x197 [ 299.498491] should_fail.cold+0x10f/0x159 [ 299.502680] should_failslab+0xdb/0x130 [ 299.506680] __kmalloc_track_caller+0x2ec/0x790 [ 299.511383] ? kstrdup_const+0x48/0x60 [ 299.515297] kstrdup+0x3a/0x70 [ 299.518514] kstrdup_const+0x48/0x60 [ 299.522246] alloc_vfsmnt+0xe5/0x7d0 [ 299.525980] clone_mnt+0x70/0xee0 [ 299.529451] ? lock_downgrade+0x740/0x740 [ 299.533614] ? do_raw_spin_unlock+0x16b/0x260 [ 299.538134] copy_tree+0x33b/0x8a0 [ 299.541708] copy_mnt_ns+0x11c/0x8c0 [ 299.545440] ? kmem_cache_alloc+0x611/0x780 [ 299.549822] ? selinux_capable+0x36/0x40 [ 299.553905] create_new_namespaces+0xc9/0x720 [ 299.558419] ? ns_capable_common+0x12c/0x160 [ 299.562868] copy_namespaces+0x284/0x310 [ 299.566949] copy_process.part.0+0x2603/0x6a00 [ 299.571567] ? proc_fail_nth_write+0x7d/0x180 [ 299.576250] ? proc_cwd_link+0x1b0/0x1b0 [ 299.580349] ? __cleanup_sighand+0x50/0x50 [ 299.584628] ? lock_downgrade+0x740/0x740 [ 299.588895] _do_fork+0x19e/0xce0 [ 299.592387] ? fork_idle+0x280/0x280 [ 299.596143] ? fput+0xd4/0x150 [ 299.599351] ? SyS_write+0x15e/0x230 [ 299.603187] SyS_clone+0x37/0x50 [ 299.606569] ? sys_vfork+0x30/0x30 [ 299.610212] do_syscall_64+0x1e8/0x640 [ 299.614141] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 299.619019] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 299.624224] RIP: 0033:0x45a639 [ 299.627424] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x4, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r0, 0xc) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 299.635175] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 299.642473] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 299.649764] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 299.657053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 299.664364] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x7, 0x70, 0xda, 0x0, 0x5, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x400, 0x381800) recvfrom$llc(r0, &(0x7f0000000180)=""/236, 0xec, 0x40, 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0xc00, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f0000000040)="61c2b72393588e93238ab465c038aff8", 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r3, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) recvfrom$packet(r1, &(0x7f0000000280)=""/135, 0x87, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000000080)=0x9cb, 0x4) 04:43:11 executing program 5 (fault-call:1 fault-nth:41): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_dev$video4linux(&(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x1, 0x2000) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x80000, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@uname={'uname'}}, {@afid={'afid', 0x3d, 0xba5}}, {@version_9p2000='version=9p2000'}, {@access_client='access=client'}, {@cache_mmap='cache=mmap'}, {@access_client='access=client'}, {@nodevmap='nodevmap'}]}}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r0, &(0x7f0000000240)={0x9, 0x108, 0xfa00, {r2, 0x8, "61c8c7", "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"}}, 0x110) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000003c0)={0x4, &(0x7f0000000380)=[{0x8, 0x6, 0x1, 0x80000001}, {0x401, 0x8, 0x4}, {0x1f, 0x80, 0x67, 0x80}, {0x7fff, 0x3, 0x1f, 0x80}]}) 04:43:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0xffffffc3, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xb2c00, 0x4) fchmodat(r2, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x4010640d, &(0x7f0000000080)={0x5, 0x7}) ioctl$DRM_IOCTL_RM_MAP(r1, 0x4028641b, &(0x7f0000000040)={&(0x7f0000ffc000/0x3000)=nil, 0x92c, 0x3, 0x60, &(0x7f0000ffc000/0x4000)=nil, 0x4}) [ 299.841703] FAULT_INJECTION: forcing a failure. [ 299.841703] name failslab, interval 1, probability 0, space 0, times 0 [ 299.886885] CPU: 1 PID: 10273 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 299.894831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.904215] Call Trace: [ 299.907016] dump_stack+0x142/0x197 [ 299.910792] should_fail.cold+0x10f/0x159 [ 299.914977] should_failslab+0xdb/0x130 [ 299.918977] kmem_cache_alloc+0x2d7/0x780 [ 299.923151] ? find_held_lock+0x35/0x130 [ 299.927242] ? copy_tree+0x4a2/0x8a0 [ 299.931078] alloc_vfsmnt+0x28/0x7d0 [ 299.934831] clone_mnt+0x70/0xee0 [ 299.938302] ? lock_downgrade+0x740/0x740 [ 299.942465] ? do_raw_spin_unlock+0x16b/0x260 [ 299.946981] copy_tree+0x33b/0x8a0 [ 299.950553] copy_mnt_ns+0x11c/0x8c0 [ 299.954281] ? kmem_cache_alloc+0x611/0x780 [ 299.958648] ? selinux_capable+0x36/0x40 [ 299.962735] create_new_namespaces+0xc9/0x720 [ 299.967252] ? ns_capable_common+0x12c/0x160 [ 299.971681] copy_namespaces+0x284/0x310 [ 299.975771] copy_process.part.0+0x2603/0x6a00 [ 299.980384] ? proc_fail_nth_write+0x7d/0x180 [ 299.985153] ? proc_cwd_link+0x1b0/0x1b0 [ 299.989264] ? __cleanup_sighand+0x50/0x50 [ 299.993520] ? lock_downgrade+0x740/0x740 [ 299.997701] _do_fork+0x19e/0xce0 [ 300.001181] ? fork_idle+0x280/0x280 [ 300.004925] ? fput+0xd4/0x150 [ 300.008140] ? SyS_write+0x15e/0x230 [ 300.011904] SyS_clone+0x37/0x50 [ 300.015279] ? sys_vfork+0x30/0x30 [ 300.018835] do_syscall_64+0x1e8/0x640 [ 300.022732] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.027599] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 300.032808] RIP: 0033:0x45a639 [ 300.036355] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 300.044085] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 300.051472] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 300.058762] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.066051] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 300.073339] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:12 executing program 5 (fault-call:1 fault-nth:42): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 300.213577] FAULT_INJECTION: forcing a failure. [ 300.213577] name failslab, interval 1, probability 0, space 0, times 0 [ 300.228278] CPU: 1 PID: 10294 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 300.236211] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.245772] Call Trace: [ 300.248390] dump_stack+0x142/0x197 [ 300.252075] should_fail.cold+0x10f/0x159 [ 300.256261] should_failslab+0xdb/0x130 [ 300.260261] kmem_cache_alloc+0x2d7/0x780 [ 300.264434] ? find_held_lock+0x35/0x130 [ 300.268514] ? copy_tree+0x4a2/0x8a0 [ 300.272249] alloc_vfsmnt+0x28/0x7d0 [ 300.276157] clone_mnt+0x70/0xee0 [ 300.279624] ? lock_downgrade+0x740/0x740 [ 300.283792] ? do_raw_spin_unlock+0x16b/0x260 [ 300.288304] copy_tree+0x33b/0x8a0 [ 300.291876] copy_mnt_ns+0x11c/0x8c0 [ 300.295600] ? kmem_cache_alloc+0x611/0x780 [ 300.299941] ? selinux_capable+0x36/0x40 [ 300.304029] create_new_namespaces+0xc9/0x720 [ 300.308547] ? ns_capable_common+0x12c/0x160 [ 300.312975] copy_namespaces+0x284/0x310 [ 300.317071] copy_process.part.0+0x2603/0x6a00 [ 300.321773] ? proc_fail_nth_write+0x7d/0x180 [ 300.326286] ? proc_cwd_link+0x1b0/0x1b0 [ 300.330385] ? __cleanup_sighand+0x50/0x50 [ 300.334641] ? lock_downgrade+0x740/0x740 [ 300.342376] _do_fork+0x19e/0xce0 [ 300.345850] ? fork_idle+0x280/0x280 [ 300.349587] ? fput+0xd4/0x150 [ 300.352798] ? SyS_write+0x15e/0x230 [ 300.356552] SyS_clone+0x37/0x50 [ 300.359935] ? sys_vfork+0x30/0x30 [ 300.363498] do_syscall_64+0x1e8/0x640 [ 300.367398] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.372275] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 300.377498] RIP: 0033:0x45a639 [ 300.380733] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 300.388462] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 300.395881] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 300.403173] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.410557] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 300.418026] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x0) 04:43:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$isdn(0x22, 0x3, 0x3) sendmsg$sock(r0, &(0x7f00000005c0)={&(0x7f0000000080)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="e0b7272b2fedc506b3f1bcf226b2124079ef7cdc868f7d9728ceffaa08fe8a0d2501ceaeab6f5d174e556743e4f7dad9e5991afc58e1c9bee9de538e7ef8ead20fa718643fbe007786b384d2ae643c8d1fcec92a06f28c00ad40b3f568c5fa35038dd428c8ae1ae7a181cd78394aaa408b46cc0c8f121d55c384a33db3b885c6c7ebca5ec9e7829d28791ca2a6f7", 0x8e}, {&(0x7f00000001c0)="3c3e90efd93953ba11f08f27ae89830acf072969adf7c22978428c90f4f1121a41f39f28dcd311a8cf78b4098a2cfd495ea9576c5f38cba7e75774e57fe763a6fc80d887ae56b745577d704ee1909d384382785669b9523a60012c99e844e830bc485294a28edc4b00ea29211d2c2c214f5c48b88b7745719e9f0e371467181448db19e1420d26870407a7f5646a0509523a115df8197a86a7699138359be06e3242745461f8dfec57dd4cca0f95652958d2178fda844508c23015c7f5fde1ec84522e09c0d63cfb5d130365c5a162476a2fb2fe1f498dfbe43c6f85431f48f99f70ef98e98b08f17b70fe7f18d29635f9ddfff9126edefe9e", 0xf9}, {&(0x7f00000002c0)="3c636f767e195f4fc0904530fd217d7398dbfb7e834bfb7b413aabeceeba87673f4046009adb1540c18132e9044aa27021da390083354ff0f109c0dfc17dcc71833be2d0389ce1d75314993e6f05533f54b3a65d5c69f9a0d9272192d06bf42953fde5c1c23c6a619638140df97ccec70016fdf977de0617cd33a139eec1217b3f63ca2e94c67e7b1498c2fe4d70b6d8775016536bdc1fb8e26d7fa4a7b77dfb5c1a79e3c28662967b335d765553e892ba96669e", 0xb4}, {&(0x7f0000000380)="4c449d120756cc11a85b37350863189e3891f3cfb7cf4e3fa42683dd9813b0821bcec6892db84f39b577061a52c446b5427bb6725bfa8f456d1050454ac84e1c5ff501da5e58be54f659f2b83050f536e0c3d058bd512dbce69f0e73168ee2591e4f3716f9b5d0d0e2b025faca47ad52ee0841", 0x73}, {&(0x7f0000000400)="e4234c627444d3d4c2a4c35ba923b3b67d83ec1a61657fcd8fc5610e47cc4583ff3085f74903ce9a9766c859f13d135b12ab4b5730ade29ced59d2d92de133836093a3b2d608b5c9eba6175958618d4f850dc2b912303eec1607e3eadfdb70b1a3cbaba83dad29d8eb32deb3df3fa955c25636c0daf713d44363cd0f99b2d62217065f8cfa53bc663addcc50cd6ebd7881edd0d6a2c722e7acfd15db21e913f1", 0xa0}], 0x5, &(0x7f0000000540)=[@mark={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x8e9}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0x60}, 0x40000040) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$ASHMEM_SET_NAME(r1, 0x41007701, &(0x7f0000000040)='self\x00') 04:43:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = socket(0x1e, 0x805, 0x0) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r3}, 0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000000)={r3, 0xfffffab3}, &(0x7f0000000040)=0x8) 04:43:12 executing program 5 (fault-call:1 fault-nth:43): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 300.740941] FAULT_INJECTION: forcing a failure. [ 300.740941] name failslab, interval 1, probability 0, space 0, times 0 [ 300.777666] CPU: 1 PID: 10304 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 300.785608] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.794979] Call Trace: [ 300.797588] dump_stack+0x142/0x197 [ 300.801255] should_fail.cold+0x10f/0x159 [ 300.805444] should_failslab+0xdb/0x130 [ 300.809443] __kmalloc_track_caller+0x2ec/0x790 [ 300.814132] ? kstrdup_const+0x48/0x60 [ 300.818037] kstrdup+0x3a/0x70 [ 300.821254] kstrdup_const+0x48/0x60 [ 300.824996] alloc_vfsmnt+0xe5/0x7d0 [ 300.828726] clone_mnt+0x70/0xee0 [ 300.832208] ? lock_downgrade+0x740/0x740 [ 300.836369] ? do_raw_spin_unlock+0x16b/0x260 [ 300.840870] copy_tree+0x33b/0x8a0 [ 300.844424] copy_mnt_ns+0x11c/0x8c0 [ 300.848126] ? kmem_cache_alloc+0x611/0x780 [ 300.852442] ? selinux_capable+0x36/0x40 [ 300.856508] create_new_namespaces+0xc9/0x720 [ 300.860993] ? ns_capable_common+0x12c/0x160 [ 300.865394] copy_namespaces+0x284/0x310 [ 300.869447] copy_process.part.0+0x2603/0x6a00 [ 300.874055] ? proc_fail_nth_write+0x7d/0x180 [ 300.878552] ? proc_cwd_link+0x1b0/0x1b0 [ 300.891299] ? __cleanup_sighand+0x50/0x50 [ 300.895526] ? lock_downgrade+0x740/0x740 [ 300.899673] _do_fork+0x19e/0xce0 [ 300.903131] ? fork_idle+0x280/0x280 [ 300.906850] ? fput+0xd4/0x150 [ 300.910037] ? SyS_write+0x15e/0x230 [ 300.913745] SyS_clone+0x37/0x50 [ 300.917097] ? sys_vfork+0x30/0x30 [ 300.920635] do_syscall_64+0x1e8/0x640 [ 300.924511] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.929356] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 300.934548] RIP: 0033:0x45a639 04:43:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 300.937727] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 300.945515] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 300.952775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 300.960037] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 300.967308] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 300.974875] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:13 executing program 5 (fault-call:1 fault-nth:44): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:13 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101100, 0x0) bind$isdn_base(r0, &(0x7f0000000040)={0x22, 0x1, 0x91, 0xf8, 0x3f}, 0x6) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:13 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x8000, 0x16, 0x1, r1}) fcntl$setlease(r2, 0x400, 0x2) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2000000000, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCSPGRP(r4, 0x8902, &(0x7f0000000100)=r6) 04:43:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @loopback, 0x0}, &(0x7f0000000500)=0xc) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x40000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x38) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x85, 0x0, 0xca}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) connect$packet(0xffffffffffffffff, &(0x7f0000000540)={0x11, 0x16, r0, 0x1, 0x3, 0x6, @local}, 0x14) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x40, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) pipe2(0x0, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x89f0, 0x0) socketpair(0x0, 0x5, 0x0, &(0x7f0000000180)={0x0, 0x0}) close(r6) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) getresgid(0x0, &(0x7f0000000580), 0x0) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000600)='/dev/video0\x00', 0x2, 0x0) [ 301.276609] FAULT_INJECTION: forcing a failure. [ 301.276609] name failslab, interval 1, probability 0, space 0, times 0 [ 301.324423] CPU: 1 PID: 10330 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 301.332402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.341778] Call Trace: [ 301.344395] dump_stack+0x142/0x197 [ 301.348069] should_fail.cold+0x10f/0x159 [ 301.352263] should_failslab+0xdb/0x130 [ 301.356259] kmem_cache_alloc+0x2d7/0x780 [ 301.360433] ? find_held_lock+0x35/0x130 [ 301.364520] ? copy_tree+0x4a2/0x8a0 [ 301.368257] alloc_vfsmnt+0x28/0x7d0 [ 301.372005] clone_mnt+0x70/0xee0 [ 301.375486] ? lock_downgrade+0x740/0x740 [ 301.379672] ? do_raw_spin_unlock+0x16b/0x260 [ 301.384191] copy_tree+0x33b/0x8a0 [ 301.387779] copy_mnt_ns+0x11c/0x8c0 [ 301.391522] ? kmem_cache_alloc+0x611/0x780 [ 301.395871] ? selinux_capable+0x36/0x40 [ 301.399968] create_new_namespaces+0xc9/0x720 [ 301.404485] ? ns_capable_common+0x12c/0x160 [ 301.408938] copy_namespaces+0x284/0x310 [ 301.413017] copy_process.part.0+0x2603/0x6a00 [ 301.417613] ? proc_fail_nth_write+0x7d/0x180 [ 301.422121] ? proc_cwd_link+0x1b0/0x1b0 [ 301.426227] ? __cleanup_sighand+0x50/0x50 [ 301.430491] ? lock_downgrade+0x740/0x740 [ 301.434684] _do_fork+0x19e/0xce0 [ 301.438168] ? fork_idle+0x280/0x280 [ 301.441910] ? fput+0xd4/0x150 [ 301.445115] ? SyS_write+0x15e/0x230 [ 301.448839] SyS_clone+0x37/0x50 [ 301.452203] ? sys_vfork+0x30/0x30 [ 301.455765] do_syscall_64+0x1e8/0x640 [ 301.459679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.464558] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 301.469770] RIP: 0033:0x45a639 [ 301.472973] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 301.480699] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 301.488021] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 301.495342] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.502633] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 301.509926] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xc80, 0x208a01) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000040)=0x4, &(0x7f0000000080)=0x4) 04:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 04:43:13 executing program 5 (fault-call:1 fault-nth:45): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffeffffffff, 0x1) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25ADDUID(r0, 0x89e1, &(0x7f0000000100)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r1}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x2200, 0x0) statx(r3, &(0x7f0000000240)='./file0\x00', 0xf258c3a4e8a047f6, 0x100, &(0x7f0000000280)) r4 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open(&(0x7f0000000140)='./file0\x00', 0x200002, 0x40) getsockopt$bt_l2cap_L2CAP_CONNINFO(r5, 0x6, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x6) ioctl$VT_RELDISP(r4, 0x5605) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 301.773988] FAULT_INJECTION: forcing a failure. [ 301.773988] name failslab, interval 1, probability 0, space 0, times 0 [ 301.807272] CPU: 1 PID: 10361 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 301.815226] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.824607] Call Trace: [ 301.827372] dump_stack+0x142/0x197 [ 301.831049] should_fail.cold+0x10f/0x159 [ 301.835249] should_failslab+0xdb/0x130 [ 301.839253] __kmalloc_track_caller+0x2ec/0x790 [ 301.843955] ? kstrdup_const+0x48/0x60 [ 301.847873] kstrdup+0x3a/0x70 [ 301.851102] kstrdup_const+0x48/0x60 [ 301.854852] alloc_vfsmnt+0xe5/0x7d0 [ 301.858600] clone_mnt+0x70/0xee0 [ 301.862080] ? lock_downgrade+0x740/0x740 [ 301.866259] ? do_raw_spin_unlock+0x16b/0x260 [ 301.870800] copy_tree+0x33b/0x8a0 [ 301.874434] copy_mnt_ns+0x11c/0x8c0 [ 301.878171] ? kmem_cache_alloc+0x611/0x780 [ 301.882524] ? selinux_capable+0x36/0x40 [ 301.886626] create_new_namespaces+0xc9/0x720 [ 301.891153] ? ns_capable_common+0x12c/0x160 [ 301.895612] copy_namespaces+0x284/0x310 [ 301.899709] copy_process.part.0+0x2603/0x6a00 [ 301.904347] ? proc_fail_nth_write+0x7d/0x180 [ 301.908874] ? proc_cwd_link+0x1b0/0x1b0 [ 301.912976] ? __cleanup_sighand+0x50/0x50 [ 301.917250] ? lock_downgrade+0x740/0x740 [ 301.921440] _do_fork+0x19e/0xce0 [ 301.924933] ? fork_idle+0x280/0x280 [ 301.928688] ? fput+0xd4/0x150 [ 301.931909] ? SyS_write+0x15e/0x230 [ 301.935755] SyS_clone+0x37/0x50 [ 301.939795] ? sys_vfork+0x30/0x30 [ 301.943371] do_syscall_64+0x1e8/0x640 [ 301.947289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 301.952166] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 301.957376] RIP: 0033:0x45a639 [ 301.960578] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 04:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x84800, 0x0) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) sendto$isdn(r0, &(0x7f0000000000)={0x9, 0x6d, "b045bd38fff34ea8db3f37b1bdad7ad7274dcfca99d6e317dec13219417b87c31ee1aefccd066ae5746e65804d5da695325e9928cab5855a4a07afd2c910aa219934a83649c38ad20f65dac470f17cdbcee278ab6f3832970f945e414ce98de649e10ce65b6591df09b37268296b7becee6ece9cd157ae7ff21b99cf50eebace178afdee5f633eedf5617c35ae11f0f20960cd5023fcb6"}, 0x9f, 0x489, &(0x7f00000000c0)={0x22, 0x0, 0x2, 0x6d, 0x8}, 0x6) [ 301.968316] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 301.975955] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 301.983256] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 301.990563] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 301.997862] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:14 executing program 5 (fault-call:1 fault-nth:46): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:14 executing program 0: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x300000}, 0xc, &(0x7f0000000140)={&(0x7f0000000480)={0x378, r3, 0x43, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffe01}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7b0}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffff10}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffff801}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x411a8a6f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xada}]}, @TIPC_NLA_LINK={0x80, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5b63}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x741c}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6f40}]}, @TIPC_NLA_MEDIA={0xbc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0xd0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x5, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3b6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x934}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @empty, 0xfbec}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x401}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9eb6}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x10}, 0x2068052) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000000)=""/154) perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) clone(0x800200, 0x0, 0x0, 0x0, 0x0) 04:43:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$RTC_WKALM_RD(r0, 0x80287010, &(0x7f0000000000)) [ 302.169595] FAULT_INJECTION: forcing a failure. [ 302.169595] name failslab, interval 1, probability 0, space 0, times 0 [ 302.193239] CPU: 0 PID: 10380 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 302.201192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.210578] Call Trace: [ 302.213205] dump_stack+0x142/0x197 [ 302.216901] should_fail.cold+0x10f/0x159 [ 302.221211] should_failslab+0xdb/0x130 [ 302.225224] kmem_cache_alloc+0x2d7/0x780 [ 302.229495] ? retire_userns_sysctls+0x90/0x90 [ 302.234203] copy_pid_ns+0x1ae/0xa40 [ 302.238065] ? refcount_inc+0x1f/0x40 [ 302.241913] create_new_namespaces+0x267/0x720 [ 302.246539] copy_namespaces+0x284/0x310 [ 302.250638] copy_process.part.0+0x2603/0x6a00 [ 302.255275] ? proc_fail_nth_write+0x7d/0x180 [ 302.259805] ? proc_cwd_link+0x1b0/0x1b0 [ 302.263920] ? __cleanup_sighand+0x50/0x50 [ 302.268419] ? lock_downgrade+0x740/0x740 [ 302.272607] _do_fork+0x19e/0xce0 [ 302.276094] ? fork_idle+0x280/0x280 [ 302.279840] ? fput+0xd4/0x150 [ 302.283289] ? SyS_write+0x15e/0x230 [ 302.287076] SyS_clone+0x37/0x50 [ 302.290467] ? sys_vfork+0x30/0x30 [ 302.294039] do_syscall_64+0x1e8/0x640 [ 302.297949] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.302831] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 302.308050] RIP: 0033:0x45a639 [ 302.311258] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 302.318996] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 302.326298] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 302.333591] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.340884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 302.348486] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x5, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000200)=0x6, 0x4) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000000)={0x20, {{0xa, 0x4e21, 0x80, @local, 0x8}}, 0x0, 0x2, [{{0xa, 0x4e24, 0x43b9, @mcast2, 0x3}}, {{0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}]}, 0x190) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:14 executing program 5 (fault-call:1 fault-nth:47): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0xa) r0 = socket$pptp(0x18, 0x1, 0x2) fcntl$notify(r0, 0x402, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$UHID_INPUT2(r1, &(0x7f0000000040)={0xc, 0xa3, "478a7d7b37822a1c6dcb384041add0b60a46edbfaf148f44e0dbdbe4f4a093f276b85e0dc59523e940f104599d66336d193fc236ded3d2dc400a5637bbd77c40a60970ae12d0af988f610b09466c4464ec53121b12d2fbbd117307763f08621a15080557d3440134f6bf84edeb0dd327a076b76bf8fe5225c6d8cb38fd7637ebd444024ec20d76970dbc761502e9adc97d71bbcbf3f040e0bd4992c687072638dadeb3"}, 0xa9) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 302.671119] FAULT_INJECTION: forcing a failure. [ 302.671119] name failslab, interval 1, probability 0, space 0, times 0 [ 302.696673] CPU: 0 PID: 10400 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 302.704640] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.714029] Call Trace: [ 302.716744] dump_stack+0x142/0x197 [ 302.720422] should_fail.cold+0x10f/0x159 [ 302.724625] should_failslab+0xdb/0x130 [ 302.728718] kmem_cache_alloc_trace+0x2e9/0x790 [ 302.733501] ? kmem_cache_alloc+0x611/0x780 [ 302.737847] ? retire_userns_sysctls+0x90/0x90 [ 302.742587] copy_pid_ns+0x1f4/0xa40 [ 302.746329] ? refcount_inc+0x1f/0x40 [ 302.750175] create_new_namespaces+0x267/0x720 [ 302.754890] copy_namespaces+0x284/0x310 [ 302.759077] copy_process.part.0+0x2603/0x6a00 [ 302.763707] ? proc_fail_nth_write+0x7d/0x180 [ 302.768235] ? proc_cwd_link+0x1b0/0x1b0 [ 302.772349] ? __cleanup_sighand+0x50/0x50 [ 302.776635] ? lock_downgrade+0x740/0x740 [ 302.781096] _do_fork+0x19e/0xce0 [ 302.784603] ? fork_idle+0x280/0x280 [ 302.788352] ? fput+0xd4/0x150 [ 302.791571] ? SyS_write+0x15e/0x230 [ 302.795322] SyS_clone+0x37/0x50 [ 302.798715] ? sys_vfork+0x30/0x30 [ 302.802550] do_syscall_64+0x1e8/0x640 [ 302.806467] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 302.811368] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 302.816693] RIP: 0033:0x45a639 [ 302.819996] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 302.827821] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 302.835121] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 302.842416] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 302.849839] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 302.857134] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$P9_RREMOVE(r1, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 04:43:16 executing program 5 (fault-call:1 fault-nth:48): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x3, 0x630001) ioctl$TIOCNOTTY(r0, 0x5422) getsockopt$rose(0xffffffffffffffff, 0x104, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) bind$bt_rfcomm(r0, &(0x7f0000000200)={0x1f, {0x1, 0x40, 0x1, 0xab, 0x1, 0x5}, 0x1}, 0xa) r2 = pkey_alloc(0x0, 0x0) accept4$packet(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x14, 0x800) pkey_mprotect(&(0x7f00008a6000/0x3000)=nil, 0x3000, 0x0, r2) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000000, r2) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0xda, 0x3, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8856e9a08ab5a2f, @perf_bp={&(0x7f00000000c0), 0x1}, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000001c0)=[@window={0x3, 0xff, 0x3f}, @timestamp, @window={0x3, 0x81, 0x8}, @sack_perm, @mss={0x2, 0x7ff}, @timestamp, @mss={0x2, 0x4}, @sack_perm, @timestamp], 0x9) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x3f}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000003c0)={r2}, &(0x7f0000000400)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000080)={0x0, 0x9a000000, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="7ddf00000000f76b895113f6e80e6f11f6f55df0372fb9a061c71b498c9e01acf1624d06000000d0b015cd"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0xd4, r4, 0x0, 0x70bd25, 0x25dfdbff, {}, [{{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x1}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0xfffffffffffffe82, 0x1, 'netdevsim\x00'}, {0xa, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0xffffff4d, 0x2, {'netdevsim', 0x0}}}, {0x3, 0x3, 0x2}}}]}, 0xd4}, 0x1, 0x0, 0x0, 0x4045800}, 0x24000041) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000440), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 304.381127] FAULT_INJECTION: forcing a failure. [ 304.381127] name failslab, interval 1, probability 0, space 0, times 0 [ 304.416000] CPU: 1 PID: 10414 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 304.424210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.433598] Call Trace: [ 304.436230] dump_stack+0x142/0x197 [ 304.439916] should_fail.cold+0x10f/0x159 [ 304.444111] should_failslab+0xdb/0x130 [ 304.448117] kmem_cache_alloc+0x2d7/0x780 [ 304.459627] ? retire_userns_sysctls+0x90/0x90 [ 304.464610] copy_pid_ns+0x1ae/0xa40 [ 304.468465] ? refcount_inc+0x1f/0x40 [ 304.472319] create_new_namespaces+0x267/0x720 [ 304.477062] copy_namespaces+0x284/0x310 [ 304.481518] copy_process.part.0+0x2603/0x6a00 [ 304.486154] ? proc_fail_nth_write+0x7d/0x180 [ 304.490688] ? proc_cwd_link+0x1b0/0x1b0 [ 304.494834] ? __cleanup_sighand+0x50/0x50 [ 304.499111] ? lock_downgrade+0x740/0x740 [ 304.503313] _do_fork+0x19e/0xce0 [ 304.506811] ? fork_idle+0x280/0x280 [ 304.510579] ? fput+0xd4/0x150 [ 304.513807] ? SyS_write+0x15e/0x230 [ 304.517562] SyS_clone+0x37/0x50 [ 304.520946] ? sys_vfork+0x30/0x30 [ 304.520968] do_syscall_64+0x1e8/0x640 [ 304.520978] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 304.521002] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 304.521012] RIP: 0033:0x45a639 [ 304.521020] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 304.521034] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 304.521042] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 304.521049] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 304.521058] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x6, 0x81) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 1: r0 = getpid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f00000000c0)) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x2, 0x422, 0xde, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x3, @perf_bp={&(0x7f0000000040), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, r0, 0x0, 0xffffffffffffffff, 0x8) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) getpid() 04:43:16 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) connect$nfc_llcp(r1, &(0x7f0000000000)={0x27, 0x0, 0x0, 0x4, 0x9e, 0x6, "b7a87a546205ea682e1edae91b5dd79eb6234c687ed63e1262c95b5f6f1bb9efd31446fd18fc2046d7f567580c67aaf8ddcdf00a64ef9459069b4bb0760262", 0x3}, 0x60) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 304.528839] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:16 executing program 0: openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffd0a, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) ioctl$VFIO_IOMMU_MAP_DMA(r0, 0x3b71, &(0x7f0000000140)={0x20, 0x7, 0x7, 0x21a, 0x4ab}) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000700)=ANY=[@ANYBLOB="03000000000000000a004e220000001f00000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004006a643ea0b03aeb3d036bb83ff6286b0000000000000000000000000000000000000000000000000000000000000000000000030000000a004e2200000001fe8000000000000000000000000000aaff030000000000000000000000000001000000000000000000000000000000000095000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2100000008fe8000000000000000000000000000bbc67a702f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2000010000fe8000000000000000000000000000aa070000000000000000000000000000000000000000c100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dfee3b6358094a6c12f3d2060093dbe09eb37f0f63ec1cae568b13b7d115f66b2851607879822590d285d83bc500835da81df080864fe6a1c391c49605fe0994cf899c8a53f724c16d9fea39afa26"], 0x210) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x400, 0x0) fchdir(r1) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$USBDEVFS_GET_SPEED(r2, 0x551f) fchmod(r2, 0x6741576111f67cdd) ioctl$TUNSETFILTEREBPF(r2, 0x800454e1, &(0x7f0000000080)) ioctl$VIDIOC_ENUMINPUT(0xffffffffffffffff, 0xc050561a, &(0x7f0000000000)={0x9, "7f1b16c41474cec32f32dc794ba3807fe868861f038cf99b102516b01fd0dfd6", 0x2, 0x3, 0x4, 0x0, 0xbb1856c27ec40b72, 0x4}) 04:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000000)={0xb41d, 0x1, 0x7fff, 0x5}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 2: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3, 0x60, 0x6f, 0x1, 0x0, 0x10001, 0x10000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0xfffffffffffffffc, 0x80}, 0x1000, 0x2, 0x0, 0xe, 0x5, 0x80000000}, 0x0, 0x5, r0, 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$KVM_REINJECT_CONTROL(r1, 0xae71, &(0x7f0000000100)={0x11}) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f00000000c0)=0xb781, 0x4) 04:43:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a4950901, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 5 (fault-call:1 fault-nth:49): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_config_ext={0x0, 0xffffffffffffff80}}, 0x0, 0xc, 0xffffffffffffffff, 0x0) clone(0x8010000, 0x0, 0x0, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200, 0x0) syslog(0x3, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000040)={0x6, 0x6, 0x6, 0x2, 0x8, 0x6}) 04:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x248, 0xda, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10b000, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000140)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000180)={0x10000, 0x5, 0x9, 0xffff, 0x20000}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000040)=[@in={0x2, 0x4e24, @local}, @in={0x2, 0x4e21, @remote}, @in6={0xa, 0x4e24, 0x7, @mcast2, 0x4}, @in={0x2, 0x4e23, @broadcast}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x5c) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000000c0)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x8, 0x6a028, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8007ffffffffffc}, 0x20022, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x9) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(0xffffffffffffffff, 0xc028564e, &(0x7f0000000040)={0x2, 0x2245c7edc808d016, [0x2, 0x0, 0x692, 0xfffe0000, 0x0, 0x13, 0x8001, 0x5]}) [ 304.900804] FAULT_INJECTION: forcing a failure. [ 304.900804] name failslab, interval 1, probability 0, space 0, times 0 04:43:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 304.997843] CPU: 1 PID: 10473 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 305.006040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.015426] Call Trace: [ 305.018185] dump_stack+0x142/0x197 [ 305.021866] should_fail.cold+0x10f/0x159 [ 305.026047] should_failslab+0xdb/0x130 [ 305.026062] kmem_cache_alloc+0x2d7/0x780 [ 305.026075] ? retire_userns_sysctls+0x90/0x90 [ 305.034215] copy_pid_ns+0x1ae/0xa40 [ 305.034230] ? refcount_inc+0x1f/0x40 [ 305.034253] create_new_namespaces+0x267/0x720 [ 305.050956] copy_namespaces+0x284/0x310 [ 305.055056] copy_process.part.0+0x2603/0x6a00 [ 305.059700] ? proc_fail_nth_write+0x7d/0x180 [ 305.064237] ? proc_cwd_link+0x1b0/0x1b0 [ 305.068472] ? __cleanup_sighand+0x50/0x50 [ 305.068492] ? lock_downgrade+0x740/0x740 [ 305.076905] _do_fork+0x19e/0xce0 [ 305.080404] ? fork_idle+0x280/0x280 [ 305.084153] ? fput+0xd4/0x150 [ 305.087374] ? SyS_write+0x15e/0x230 [ 305.091279] SyS_clone+0x37/0x50 [ 305.094763] ? sys_vfork+0x30/0x30 [ 305.098418] do_syscall_64+0x1e8/0x640 [ 305.102318] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.102346] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 305.102356] RIP: 0033:0x45a639 [ 305.102363] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 305.102376] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 305.102383] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 305.102389] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:43:17 executing program 3: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f00000002c0)) ptrace$pokeuser(0x6, r0, 0x388, 0xfffffffffffffffe) ptrace$peek(0x1, r0, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = getpgid(r1) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000280)=0xe8) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000340)) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = dup2(r7, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = dup2(r9, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) sendmsg$netlink(r0, &(0x7f00000003c0)={&(0x7f0000000080)=@proc={0x10, 0x0, 0x25dfdbfb}, 0xc, &(0x7f0000000140)=[{&(0x7f00000000c0)=ANY=[@ANYBLOB="64000000420000022bbd7000ffdbdf2554007300b9d332559ec345882b68101d54ecbf0f707cb146d47c2da09f23edb43503a45cfd29424c7a2d96a81c57b3a6c4af4dd1620a653a8f4c9307b2ff339e827b760a730000"], 0x64}], 0x1, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @rights={{0x1c, 0x1, 0x1, [r6, r8, r10]}}], 0x40, 0x4000016}, 0x8) [ 305.102397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 305.102404] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = dup(0xffffffffffffffff) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$netrom_NETROM_IDLE(r0, 0x103, 0x7, &(0x7f0000000000)=0x1000, &(0x7f0000000040)=0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='tunl0\x00', 0x10) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f0000000000)=""/70, 0x0) 04:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000040)=0x2, 0x4) 04:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x80e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3ff, 0x10000) fcntl$setstatus(r0, 0x4, 0x800) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000040)={0x80000, 0x0, [0x0, 0x9, 0x1, 0xa2, 0xa56f, 0x5, 0x6, 0x3]}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) perf_event_open(&(0x7f0000001300)={0x3, 0x70, 0x6, 0x2, 0x20, 0x5, 0x0, 0x23, 0x20, 0x18, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000012c0), 0x4}, 0x80, 0x9bf07af, 0xfffffff7, 0x4, 0xffffffffffffffff, 0xf54, 0x4fdf}, 0x0, 0x10, 0xffffffffffffffff, 0xb) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x420201) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x200000, 0x0) r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) vmsplice(r5, &(0x7f0000001280)=[{&(0x7f0000000140)="f86042a5c4aed2b7af56598001d30993494cb22c3a548f61c68ab46c65b5308752a9518f261f831f381b542145c83cb813466c8cdb92865c7d433c82b2ba3b8a0989396e5fadb8c8055e3ffc1455c00116ef0424111c677d4a957ec9777bbea3ce1414723979bd2a180ddd7f948a3020ccb63a0d37dec50230f59d1263f03681bc6950494e55e78b785ab041e24925f8cf1df5dae77fc0ed48147e", 0x9b}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="79c60ced8be6ebc05f4694d3919fc8624bc6b2124da56295da48f25eb26fd48ccef98d6485748d9dcff6368cbadd414896ea527f14d948bb5a8ea4ec2742e3cc36c45e34a109550875762729c10c59141e4023c96459f8df55990fcb47e87d87a754b4a8", 0x64}], 0x3, 0x1) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000100)=r4) 04:43:17 executing program 5 (fault-call:1 fault-nth:50): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r2}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x0, 0xb, &(0x7f0000000000)='em0/cpuset\x00', r2}, 0x30) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f00000000c0)) 04:43:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f00000002c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000300)={@mcast1, r2}, 0x14) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x2, 0x70, 0x1, 0x2, 0x8, 0x0, 0x0, 0x3, 0x80000, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x6, @perf_config_ext={0x755}, 0x4000, 0x3, 0x8000, 0x5, 0x5, 0x6, 0x5}) pipe2(&(0x7f0000000080), 0x44000) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x40) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000040)={0x2b, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x4, 'lblc\x00', 0x18, 0x3ff, 0x3d}, 0x2c) [ 305.368545] FAULT_INJECTION: forcing a failure. [ 305.368545] name failslab, interval 1, probability 0, space 0, times 0 [ 305.416511] CPU: 1 PID: 10518 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 305.424628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.434218] Call Trace: [ 305.434244] dump_stack+0x142/0x197 [ 305.434272] should_fail.cold+0x10f/0x159 [ 305.434293] should_failslab+0xdb/0x130 [ 305.434308] kmem_cache_alloc_trace+0x2e9/0x790 [ 305.434318] ? kmem_cache_alloc+0x611/0x780 [ 305.434333] ? retire_userns_sysctls+0x90/0x90 [ 305.434368] copy_pid_ns+0x1f4/0xa40 [ 305.434380] ? refcount_inc+0x1f/0x40 [ 305.434403] create_new_namespaces+0x267/0x720 [ 305.462836] copy_namespaces+0x284/0x310 [ 305.462855] copy_process.part.0+0x2603/0x6a00 [ 305.470413] ? proc_fail_nth_write+0x7d/0x180 [ 305.470425] ? proc_cwd_link+0x1b0/0x1b0 [ 305.470459] ? __cleanup_sighand+0x50/0x50 [ 305.470474] ? lock_downgrade+0x740/0x740 [ 305.470497] _do_fork+0x19e/0xce0 [ 305.483840] ? fork_idle+0x280/0x280 [ 305.483859] ? fput+0xd4/0x150 [ 305.483873] ? SyS_write+0x15e/0x230 [ 305.483896] SyS_clone+0x37/0x50 [ 305.483904] ? sys_vfork+0x30/0x30 [ 305.483923] do_syscall_64+0x1e8/0x640 [ 305.483933] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 305.483956] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 305.520134] RIP: 0033:0x45a639 [ 305.520143] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 305.520159] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 305.520165] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 04:43:17 executing program 1: r0 = gettid() sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCCBRK(r2, 0x5428) r3 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x1, 0x4) 04:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/relabel\x00', 0x2, 0x0) [ 305.520172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 305.520179] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 305.520186] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:17 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, r2, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, &(0x7f0000000000)=0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = dup2(r5, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r6, 0xc008551b, &(0x7f0000000080)={0x61322601, 0x10, [0xfffffe00, 0x9711, 0x2, 0x2]}) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x5, 0x101}, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'bridge0\x00', 0x800}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f00000001c0)={&(0x7f00000000c0), &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000180)=[0x0, 0x0, 0x0], 0x0, 0x9, 0x6, 0x3}) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0xcd, &(0x7f0000000040)={{0xa, 0x4e23, 0x7fffffff, @local, 0x68}, {0xa, 0x4e24, 0x100, @mcast1, 0x9}, 0xc7cc, [0x1, 0xfff, 0x3ff, 0x7, 0x1, 0x2, 0x4, 0x4]}, 0x5c) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000200)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_inet_SIOCRTMSG(r3, 0x890d, &(0x7f00000002c0)={0x0, {0x2, 0x4e24, @remote}, {0x2, 0x4e23, @empty}, {0x2, 0x4e24, @empty}, 0x504, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)='netpci0\x00', 0x4, 0x7, 0xfeff}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) geteuid() r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) setsockopt$inet6_opts(r0, 0x29, 0x0, &(0x7f0000000280)=ANY=[], 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000240)) sysinfo(&(0x7f0000000040)=""/233) 04:43:17 executing program 3: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400aa2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x386, 0xda, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x48, 0x0, 0x0, 0x7, 0x0, 0x0, 0x81}, 0x0, 0x0, 0xffffffffffffffff, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = getpid() pipe(&(0x7f0000000080)) perf_event_open(&(0x7f0000000000)={0x3, 0x70, 0x2, 0x7f, 0x0, 0x2, 0x0, 0x80, 0x43, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_config_ext={0x5, 0xe13d}, 0x28a8, 0x3, 0x9, 0x2, 0xffff, 0x9, 0x8}, r0, 0xd, 0xffffffffffffffff, 0x0) 04:43:17 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) lgetxattr(&(0x7f0000000280)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000340)=@random={'os2.', '\x00'}, &(0x7f0000000380)=""/24, 0x18) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x10) r1 = openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0xffffffffffffff4d, 0xda, 0x0, 0x2, 0x0, 0x0, 0x2000000000000009, 0x8004, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x4, 0x4000, 0x3, 0x6}, 0x0, 0xf, r1, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r4, 0xc08c5336, &(0x7f00000001c0)={0xffffffff, 0x6, 0x3, 'queue1\x00', 0x8}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000000)="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") clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x2400, 0x1) 04:43:17 executing program 5 (fault-call:1 fault-nth:51): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 0: msync(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 2: r0 = semget$private(0x0, 0x4, 0x400) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000000)=""/159) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) times(&(0x7f0000000000)) 04:43:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getsockname$ax25(r1, &(0x7f00000000c0)={{}, [@bcast, @default, @default, @bcast, @remote, @null, @remote, @rose]}, &(0x7f0000000140)=0x48) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bind$bt_rfcomm(r0, &(0x7f0000000080)={0x1f, {0x8, 0x1f, 0x4, 0x1f, 0x9, 0x9}}, 0xa) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000040)=0x2, 0x2) gettid() 04:43:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x6) [ 305.838816] FAULT_INJECTION: forcing a failure. [ 305.838816] name failslab, interval 1, probability 0, space 0, times 0 [ 305.914690] CPU: 1 PID: 10571 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 305.922629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 305.922638] Call Trace: [ 305.922659] dump_stack+0x142/0x197 [ 305.922686] should_fail.cold+0x10f/0x159 [ 305.922708] should_failslab+0xdb/0x130 [ 305.922720] kmem_cache_alloc+0x2d7/0x780 [ 305.922742] ? check_preemption_disabled+0x3c/0x250 [ 305.922762] alloc_vfsmnt+0x28/0x7d0 [ 305.922779] vfs_kern_mount.part.0+0x2a/0x3d0 [ 305.922797] ? rcu_read_lock_sched_held+0x110/0x130 [ 305.922819] kern_mount_data+0x56/0xc0 [ 305.922838] pid_ns_prepare_proc+0x1e/0x90 [ 305.922850] alloc_pid+0x9ef/0xc70 [ 305.982018] copy_process.part.0+0x272f/0x6a00 [ 305.982046] ? proc_fail_nth_write+0x7d/0x180 [ 305.994077] ? proc_cwd_link+0x1b0/0x1b0 [ 305.998314] ? __cleanup_sighand+0x50/0x50 [ 306.002586] ? lock_downgrade+0x740/0x740 [ 306.006786] _do_fork+0x19e/0xce0 [ 306.010278] ? fork_idle+0x280/0x280 04:43:17 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fanotify_init(0x8f7534f64424705c, 0x40000) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) 04:43:17 executing program 1: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 306.014191] ? fput+0xd4/0x150 [ 306.017408] ? SyS_write+0x15e/0x230 [ 306.017435] SyS_clone+0x37/0x50 [ 306.017447] ? sys_vfork+0x30/0x30 [ 306.028179] do_syscall_64+0x1e8/0x640 [ 306.032221] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.037213] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 306.042451] RIP: 0033:0x45a639 [ 306.045667] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 306.053587] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 04:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$SIOCX25SCUDMATCHLEN(r0, 0x89e7, &(0x7f0000000000)={0x50}) 04:43:18 executing program 2: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x6, &(0x7f0000000040)=""/66, 0x42) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x100, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2000, 0x0) ioctl$BLKIOMIN(r2, 0x1278, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x182, 0x0, 0x84936934, 0x7}, 0x0, 0x0, r0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f00000000c0)={0x1}) [ 306.053596] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 306.053603] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.053611] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 306.053618] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) 04:43:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffff3, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000200)={0x0, 0x5d, 0x2003}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r3, 0x6741576111f67cdd) mkdirat(r3, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r4 = socket(0x1e, 0x805, 0x0) close(r4) r5 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000100)={0x0, 0x10, &(0x7f0000000680)=[@in={0x2, 0x0, @dev}]}, &(0x7f0000000600)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f00000001c0)={0x1, [0x0]}, &(0x7f000095dffc)=0x42) setsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000140)=@assoc_value={r6}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000080)={r6, @in={{0x2, 0x4e20, @remote}}, 0x2}, &(0x7f0000000140)=0x90) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000180)={r7, 0xe0}, &(0x7f00000001c0)=0x8) sendmsg$TIPC_NL_PEER_REMOVE(r3, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x4e68c266ccfa1feb}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0xb0, 0x0, 0x0, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ADDR={0xfffffffffffffe29, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7f}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9ff9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x65f4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 5 (fault-call:1 fault-nth:52): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x300, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0xc, 0x1, &(0x7f0000000040)={r0, r1+10000000}, &(0x7f0000000080)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x8ed8e689c1df8771, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r2, 0x4040534e, &(0x7f0000000100)={0x90, @tick=0x1000, 0x80, {0xe0, 0x2}, 0x2, 0x0, 0x11}) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x1000, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_PDEATHSIG(0x1, 0x7) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x400000001, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'nr0\x01\x00', 0x2}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r3 = open(&(0x7f0000000000)='./bus\x00', 0x163242, 0x40) ftruncate(r3, 0x200004) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r3, 0x0, 0x80001d00c0d0) r4 = socket(0x15, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x0, 0x0) mmap$usbfs(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1d, 0x30, 0xffffffffffffffff, 0xfe) bind$inet(r4, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$nl_generic(0x10, 0x3, 0x10) socket$rds(0x15, 0x5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f00000002c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x3ff) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 306.607490] FAULT_INJECTION: forcing a failure. [ 306.607490] name failslab, interval 1, probability 0, space 0, times 0 [ 306.654938] device nr0 entered promiscuous mode [ 306.691493] CPU: 0 PID: 10647 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 306.699540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 306.709121] Call Trace: [ 306.711753] dump_stack+0x142/0x197 [ 306.715461] should_fail.cold+0x10f/0x159 [ 306.719649] should_failslab+0xdb/0x130 [ 306.723665] kmem_cache_alloc_trace+0x2e9/0x790 [ 306.728454] ? lock_downgrade+0x740/0x740 [ 306.733683] ? do_raw_spin_unlock+0x16b/0x260 [ 306.738217] sget_userns+0xfe/0xc30 [ 306.741873] ? set_anon_super+0x20/0x20 [ 306.745997] ? get_empty_filp.cold+0x3b/0x3b [ 306.750528] mount_ns+0x6d/0x190 [ 306.753925] ? proc_get_inode+0x620/0x620 [ 306.758632] proc_mount+0x6a/0xa0 [ 306.762373] mount_fs+0x97/0x2a1 [ 306.765920] vfs_kern_mount.part.0+0x5e/0x3d0 [ 306.770565] ? rcu_read_lock_sched_held+0x110/0x130 [ 306.775629] kern_mount_data+0x56/0xc0 [ 306.779553] pid_ns_prepare_proc+0x1e/0x90 [ 306.783906] alloc_pid+0x9ef/0xc70 [ 306.787492] copy_process.part.0+0x272f/0x6a00 [ 306.792120] ? proc_fail_nth_write+0x7d/0x180 [ 306.796646] ? proc_cwd_link+0x1b0/0x1b0 [ 306.800880] ? __cleanup_sighand+0x50/0x50 [ 306.805145] ? lock_downgrade+0x740/0x740 [ 306.809332] _do_fork+0x19e/0xce0 [ 306.812826] ? fork_idle+0x280/0x280 [ 306.816580] ? fput+0xd4/0x150 [ 306.819808] ? SyS_write+0x15e/0x230 [ 306.823599] SyS_clone+0x37/0x50 [ 306.826984] ? sys_vfork+0x30/0x30 [ 306.830554] do_syscall_64+0x1e8/0x640 [ 306.834466] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 306.839354] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 306.845005] RIP: 0033:0x45a639 [ 306.848298] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 306.856666] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 306.864104] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 306.871403] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 306.878704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:43:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffe33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={&(0x7f0000000040), 0xd}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x100000, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000100)={0x6, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}]}) [ 306.886005] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$assume_authority(0x10, r0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:18 executing program 2: socket$rxrpc(0x21, 0x2, 0x2) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x9) uselib(&(0x7f0000000040)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x5, @perf_config_ext={0x2000000000000000, 0x40}, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x400b, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 0: clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) dup2(r0, r2) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x11, &(0x7f00000000c0)='keyring]@trusted\x00', 0xffffffffffffffff}, 0x30) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) ptrace(0x4208, r3) timer_create(0xb4c376b5d56a4fb0, &(0x7f0000000140)={0x0, 0x16, 0x0, @thr={&(0x7f0000000340)="1569b816f2a93d8a44c73dd613dd6efc1b00e9667c4e1a47b981b4ddd494c0fc64ffa8f8c09d3a325f9b7a634f92fe7c0a4c12d627c163e7ad7d95a9d0804ad072ba0e298b9f9cb80f62caaf49ca083587c58c740addc2da8da6d489ab419f2f030d4c9e76b8a57cfe25f7f88b836c2831fb218ab0a05bf4eabc280de0065927311114762c5ca1101880d0bace4b7ccdeb22659b2921a2871a86ef1f5ca4eb9c235f2c8f62d719ad", &(0x7f0000000280)="66639fe2daf79332b172ea39aec5a7fb909e45ff1b13a6b94447d015c0c53e22d2100560d8e7a57ab963"}}, &(0x7f0000000180)) r4 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x200000, 0x0) ioctl$USBDEVFS_GET_CAPABILITIES(r4, 0x8004551a, &(0x7f0000000080)) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x8000) 04:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 5 (fault-call:1 fault-nth:53): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3, 0xc8, 0x0, 0x7b, 0x0, 0x0, 0x20000, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x6, @perf_config_ext={0xfffffffffffffffc, 0x7}, 0x14800, 0x1000, 0x2, 0x9, 0x4, 0x3, 0x7}, r0, 0xf, 0xffffffffffffffff, 0x3) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) r2 = accept4(r1, &(0x7f0000000100)=@rc, &(0x7f0000000180)=0x80, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x100, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x28000}, 0x800) 04:43:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20029, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000000)) 04:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x4000, 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x70, 0x1, 0x40, 0x7f, 0x9, 0x0, 0x1, 0x1000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xf0, 0x3, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x6, 0x1f, 0x0, 0x3, 0x80000001, 0x7}, 0xffffffffffffffff, 0x3, r0, 0x8) 04:43:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x1c9c380}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000300)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) getsockname(r1, 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000180)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 307.174424] FAULT_INJECTION: forcing a failure. [ 307.174424] name failslab, interval 1, probability 0, space 0, times 0 [ 307.233315] CPU: 1 PID: 10694 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 307.241626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.251317] Call Trace: [ 307.254082] dump_stack+0x142/0x197 [ 307.257778] should_fail.cold+0x10f/0x159 [ 307.261970] should_failslab+0xdb/0x130 [ 307.266132] kmem_cache_alloc_trace+0x2e9/0x790 [ 307.270833] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 307.276339] ? sget_userns+0xfe/0xc30 [ 307.280376] ? rcu_read_lock_sched_held+0x110/0x130 [ 307.285433] selinux_sb_alloc_security+0x46/0x220 [ 307.290307] security_sb_alloc+0x6d/0xa0 [ 307.294400] sget_userns+0x196/0xc30 [ 307.298269] ? set_anon_super+0x20/0x20 [ 307.302281] ? get_empty_filp.cold+0x3b/0x3b [ 307.306731] mount_ns+0x6d/0x190 [ 307.310126] ? proc_get_inode+0x620/0x620 [ 307.314302] proc_mount+0x6a/0xa0 [ 307.317783] mount_fs+0x97/0x2a1 [ 307.321301] vfs_kern_mount.part.0+0x5e/0x3d0 [ 307.325830] ? rcu_read_lock_sched_held+0x110/0x130 [ 307.330903] kern_mount_data+0x56/0xc0 [ 307.334829] pid_ns_prepare_proc+0x1e/0x90 [ 307.339242] alloc_pid+0x9ef/0xc70 [ 307.342843] copy_process.part.0+0x272f/0x6a00 [ 307.347480] ? proc_fail_nth_write+0x7d/0x180 [ 307.352248] ? proc_cwd_link+0x1b0/0x1b0 [ 307.356360] ? __cleanup_sighand+0x50/0x50 [ 307.360641] ? lock_downgrade+0x740/0x740 [ 307.364471] overlayfs: filesystem on './file0' not supported as upperdir [ 307.364823] _do_fork+0x19e/0xce0 [ 307.364844] ? fork_idle+0x280/0x280 [ 307.379073] ? fput+0xd4/0x150 [ 307.382392] ? SyS_write+0x15e/0x230 [ 307.386288] SyS_clone+0x37/0x50 [ 307.389695] ? sys_vfork+0x30/0x30 [ 307.393315] do_syscall_64+0x1e8/0x640 [ 307.397233] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.402295] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 307.407517] RIP: 0033:0x45a639 [ 307.410722] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 307.418690] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 307.426211] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 307.433757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 307.441230] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 307.448876] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:19 executing program 3: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x0, 0x0, {0x6, 0x800, 0x3, 0x10000}}) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f00000000c0)={0x0, 0x1, 0x80, 0x400, 0xe, 0x0, 0x7f, 0x3, 0x3, 0x1}) 04:43:19 executing program 5 (fault-call:1 fault-nth:54): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x4) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 2: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r2}, 0x30) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f00000000c0)=[@in6={0xa, 0x4e22, 0xfff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, @in={0x2, 0x4e20, @rand_addr=0x1}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, @in={0x2, 0x4e24, @broadcast}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x5c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x0, 0xfffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, r3}, 0x30) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r4, r1, 0x0, 0xffffffffffffff3f, &(0x7f0000000000)=':\x00', r3}, 0x30) perf_event_open(&(0x7f000001d000)={0x2, 0x52, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xffff}, r5, 0x0, 0xffffffffffffffff, 0xe) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f0000000080)={0x0, 0x70, 0x4, 0x20, 0x0, 0x3f, 0x0, 0x8, 0x4100, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0xff, 0x4, @perf_bp={&(0x7f0000000040), 0xc}, 0x8, 0x8, 0x7fffffff, 0x3, 0x6, 0xee, 0xef6}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x4004, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x39) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RFKILL_IOCTL_NOINPUT(r3, 0x5201) [ 307.803646] FAULT_INJECTION: forcing a failure. [ 307.803646] name fail_page_alloc, interval 1, probability 0, space 0, times 0 04:43:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) [ 307.893294] CPU: 1 PID: 10729 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 307.901540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 307.911083] Call Trace: [ 307.913833] dump_stack+0x142/0x197 [ 307.917522] should_fail.cold+0x10f/0x159 [ 307.921829] ? __might_sleep+0x93/0xb0 [ 307.925909] __alloc_pages_nodemask+0x1d6/0x7a0 [ 307.930653] ? check_preemption_disabled+0x3c/0x250 [ 307.935882] ? __alloc_pages_slowpath+0x2930/0x2930 04:43:19 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) sysfs$2(0x2, 0x8, &(0x7f0000000040)=""/195) [ 307.941135] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 307.941154] ? __alloc_pages_nodemask+0x639/0x7a0 [ 307.941245] alloc_pages_current+0xec/0x1e0 [ 307.941264] __get_free_pages+0xf/0x40 [ 307.960175] get_zeroed_page+0x11/0x20 [ 307.960191] selinux_sb_copy_data+0x2a/0x390 [ 307.960213] security_sb_copy_data+0x75/0xb0 [ 307.960231] mount_fs+0x1ec/0x2a1 [ 307.960253] vfs_kern_mount.part.0+0x5e/0x3d0 [ 307.960266] ? rcu_read_lock_sched_held+0x110/0x130 [ 307.960283] kern_mount_data+0x56/0xc0 04:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) connect(r0, &(0x7f0000000000)=@isdn={0x22, 0x39, 0x5, 0x8, 0x7}, 0x80) [ 307.990693] pid_ns_prepare_proc+0x1e/0x90 [ 307.990709] alloc_pid+0x9ef/0xc70 04:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000000)={0x1, 0x0, 0x5, 0x6, 0x2, 0x6, 0x8, 0x6, 0x101, 0x2, 0x9e, 0x401}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TCSBRK(r3, 0x5409, 0x1) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000040)=0xfffffff9, 0x4) [ 307.990748] copy_process.part.0+0x272f/0x6a00 04:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) socket(0x1d, 0x3, 0x48) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) [ 307.990779] ? proc_fail_nth_write+0x7d/0x180 [ 307.990793] ? proc_cwd_link+0x1b0/0x1b0 [ 307.990829] ? __cleanup_sighand+0x50/0x50 [ 307.990845] ? lock_downgrade+0x740/0x740 04:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0xfffffffffffffffc}}, 0x0, 0xd, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x0, 0x3, 0x1, 0x1, 0x10000, 0x70000000000, 0x4, 0x10}}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 307.990872] _do_fork+0x19e/0xce0 [ 307.990894] ? fork_idle+0x280/0x280 [ 307.990915] ? fput+0xd4/0x150 [ 307.990931] ? SyS_write+0x15e/0x230 [ 307.990952] SyS_clone+0x37/0x50 [ 307.990962] ? sys_vfork+0x30/0x30 [ 307.990982] do_syscall_64+0x1e8/0x640 [ 307.990993] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 307.991021] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 307.991033] RIP: 0033:0x45a639 [ 307.991041] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 307.991057] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 307.991065] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 307.991073] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 04:43:20 executing program 5 (fault-call:1 fault-nth:55): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) [ 307.991081] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 307.991089] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 04:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='\xba:$\x17/w\x0f\n\x8e\x16F\x836', 0x0, 0x0) r0 = open(&(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x50000, 0x44) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r1, r1) fchmod(r1, 0x186) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000002c0)=0x1c, 0x80000) setsockopt$sock_void(r2, 0x1, 0xd, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) clone(0x24000100, &(0x7f0000000080)="2c234de464e538349d50bd698684e75b061a11605b9fd8a4338ae015b3e792592611638916f6742d0f4ff024b05084ad432da19156289223e67831cb5cc5420220fb2551d33382c8992e3e668dbb26e731e57c88aed2aefd9f29154c19859cd4", &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)="7afd2ee05e6281e44b6bae9c566b5c676eb114490edf900da062440e48298af9316931ae2fddafcfa1fba0269900cedec9956d122c50f2584fe4a5b036aab4ebba46316168ec8b4e9824a9fb8cd5f18b21970959ebef68a1b14b03000000000000003470bdde112245e282a16b90a7393d7926ff13f645413adc6affe18315eb5f4568e3c8c8f89c3cfbb2bdfc4b58383f63bb2661e4c7e02927eba841b0cfead641e71ca1c6d5cb7f19d0cef55297bca75897df38f12bbb70e78ab6c66581012e2e23a048802302dfba402136d9a70e11eb3674612ff9c87a22473f") r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r5, 0x6741576111f67cdd) mkdirat(r5, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = fcntl$dupfd(r5, 0x87c5087681422ab3, r7) ioctl$IMGETCOUNT(r8, 0x80044943, &(0x7f0000000300)) r9 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vsock\x00', 0x80080, 0x0) ioctl$CAPI_GET_PROFILE(r9, 0xc0404309, &(0x7f0000000380)=0xfffff001) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000040)=r4) 04:43:20 executing program 2: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0x800, 0x70bd26, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x10) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) getsockopt$netrom_NETROM_IDLE(r2, 0x103, 0x7, &(0x7f0000000040)=0xd55, &(0x7f0000000080)=0x4) [ 308.409536] FAULT_INJECTION: forcing a failure. [ 308.409536] name failslab, interval 1, probability 0, space 0, times 0 [ 308.438219] Unknown ioctl -1069530359 04:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2000000080, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x1) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'veth0\x00', {0x2, 0x4e21, @remote}}) [ 308.473896] CPU: 1 PID: 10791 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 308.482066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.491463] Call Trace: [ 308.494153] dump_stack+0x142/0x197 [ 308.498108] should_fail.cold+0x10f/0x159 [ 308.502440] should_failslab+0xdb/0x130 [ 308.506445] __kmalloc+0x2f0/0x7a0 [ 308.510114] ? __list_lru_init+0x6b/0x660 [ 308.514484] __list_lru_init+0x6b/0x660 [ 308.518508] sget_userns+0x500/0xc30 04:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000000)={0x1f, {0x80, 0x6, 0x6, 0x20, 0x24, 0x17}, 0x9}, 0xa) 04:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xfa, 0x0, 0x2, 0x0, 0x0, 0x3, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/\x90av_adf_ctl\x00', 0x180000, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) r3 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r3) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r5, r4, r5}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x0f@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00'}, &(0x7f0000000180)}) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)="8579cc41edb70ecb052e3b14a8f7e11bb8a2d06e3cdcf95a8bbc225e4c4f448db9b7594c4666ec7c3d454790e0193b96dff13daa4b05cbcbc0197d5e71", 0x3d}, {&(0x7f0000000200)="170ea0c87100dafefe45d4b44126aa7c9ab8b69cfef0c433bd520cdb6fa4662077b5ec78805d2e84ff35d80e1e183cd076fdbdf286ab1288dd8ffe6dcec5068f638f8f2211c4060ef00da5cdc3e36dc5f399f35d0110a2ea7c06966468563c6a07b292054aae590e42d4b3ce", 0x6c}, {&(0x7f0000000280)="f9328506e80d4016e1ab69ac504a2053a147bf9af71ec8709abda5501b7b3c2607d647f55a077a2ce81aa9aa52e3c4b6930d67d451e7cce8da633de170a1506ec18b225a4bb467b8116116b4f68c06918e230075a2a188084ba50750e5009944b9794355f1e0b963452b573540195ab2deb928e7c8f9ca4251c14ebd262852a6b85c83fe685874a1d49a5542e57920bbe2aa6a28d96651b13392af365aed21097c634c856779", 0xa6}], 0x3, r5) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000100)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup2(r6, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept4$bt_l2cap(r7, &(0x7f0000000140), &(0x7f0000000180)=0xe, 0x81000) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000040)={0x0, @in6={{0xa, 0x20, 0x904, @ipv4={[], [], @broadcast}, 0x3}}, 0x40, 0x101}, 0x90) [ 308.522491] ? set_anon_super+0x20/0x20 [ 308.526499] ? get_empty_filp.cold+0x3b/0x3b [ 308.530957] mount_ns+0x6d/0x190 [ 308.534445] ? proc_get_inode+0x620/0x620 [ 308.538787] proc_mount+0x6a/0xa0 [ 308.542290] mount_fs+0x97/0x2a1 [ 308.546340] vfs_kern_mount.part.0+0x5e/0x3d0 [ 308.550953] ? rcu_read_lock_sched_held+0x110/0x130 [ 308.556171] kern_mount_data+0x56/0xc0 [ 308.560102] pid_ns_prepare_proc+0x1e/0x90 [ 308.564379] alloc_pid+0x9ef/0xc70 [ 308.567977] copy_process.part.0+0x272f/0x6a00 [ 308.572877] ? proc_fail_nth_write+0x7d/0x180 [ 308.577549] ? proc_cwd_link+0x1b0/0x1b0 [ 308.581940] ? __cleanup_sighand+0x50/0x50 [ 308.582000] ? lock_downgrade+0x740/0x740 [ 308.582024] _do_fork+0x19e/0xce0 [ 308.582045] ? fork_idle+0x280/0x280 [ 308.582063] ? fput+0xd4/0x150 [ 308.582082] ? SyS_write+0x15e/0x230 [ 308.582101] SyS_clone+0x37/0x50 [ 308.582109] ? sys_vfork+0x30/0x30 [ 308.582127] do_syscall_64+0x1e8/0x640 [ 308.582136] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 308.582161] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 308.582171] RIP: 0033:0x45a639 [ 308.582178] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 308.616193] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 308.616202] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 308.616210] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 308.616217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 308.616226] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x0) 04:43:20 executing program 5 (fault-call:1 fault-nth:56): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffd31, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0xa2400, 0x0) fremovexattr(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="73656375726974792e006718a819d2399d588f3bfc7e729b8b0a022e695604e4689bdc39f5ec0cd27070"]) r1 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$VIDIOC_G_OUTPUT(r2, 0x8004562e, &(0x7f0000000080)) fchmod(r1, 0x6741576111f67cdd) mkdirat(r1, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x3f) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400000, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/anycast6\x00') renameat(r0, &(0x7f0000000100)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40000, 0x4) ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000080)={0x7fffffff}) 04:43:20 executing program 2: r0 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x7d6c785ae8a9a0c5) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f00000000c0)=0x260002) r1 = fcntl$getown(0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x20, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2}, 0x2cd6, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, r1, 0x0, 0xffffffffffffffff, 0xb) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80, 0x0) setsockopt$CAN_RAW_ERR_FILTER(r2, 0x65, 0x2, &(0x7f0000000040)=0x6, 0x4) [ 308.798569] FAULT_INJECTION: forcing a failure. [ 308.798569] name failslab, interval 1, probability 0, space 0, times 0 [ 308.864095] CPU: 0 PID: 10826 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 308.872229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 308.881760] Call Trace: [ 308.884388] dump_stack+0x142/0x197 [ 308.888056] should_fail.cold+0x10f/0x159 [ 308.892328] should_failslab+0xdb/0x130 [ 308.896315] __kmalloc+0x2f0/0x7a0 [ 308.899872] ? lock_downgrade+0x740/0x740 [ 308.904456] ? register_shrinker+0xbd/0x220 [ 308.908792] register_shrinker+0xbd/0x220 [ 308.913077] sget_userns+0x9bf/0xc30 [ 308.916817] ? set_anon_super+0x20/0x20 [ 308.920951] ? get_empty_filp.cold+0x3b/0x3b [ 308.925500] mount_ns+0x6d/0x190 [ 308.929145] ? proc_get_inode+0x620/0x620 [ 308.933302] proc_mount+0x6a/0xa0 [ 308.936853] mount_fs+0x97/0x2a1 [ 308.940254] vfs_kern_mount.part.0+0x5e/0x3d0 [ 308.944790] ? rcu_read_lock_sched_held+0x110/0x130 [ 308.949812] kern_mount_data+0x56/0xc0 [ 308.953828] pid_ns_prepare_proc+0x1e/0x90 [ 308.958183] alloc_pid+0x9ef/0xc70 [ 308.961737] copy_process.part.0+0x272f/0x6a00 [ 308.966490] ? proc_fail_nth_write+0x7d/0x180 [ 308.970985] ? proc_cwd_link+0x1b0/0x1b0 [ 308.975061] ? __cleanup_sighand+0x50/0x50 [ 308.979298] ? lock_downgrade+0x740/0x740 [ 308.983460] _do_fork+0x19e/0xce0 [ 308.987180] ? fork_idle+0x280/0x280 [ 308.990898] ? fput+0xd4/0x150 [ 308.994136] ? SyS_write+0x15e/0x230 [ 308.997859] SyS_clone+0x37/0x50 [ 309.001326] ? sys_vfork+0x30/0x30 [ 309.005047] do_syscall_64+0x1e8/0x640 [ 309.008946] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.013800] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.019081] RIP: 0033:0x45a639 [ 309.022364] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 309.030210] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 309.037484] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 309.045840] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 309.053543] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 04:43:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x4000, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f00000000c0)={0xc, 0x8, 0xfa00, {0x0}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x80000000001, &(0x7f0000000000)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, r2}}, 0x48) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000480)={0x6, 0x118, 0xfa00, {{0x6, 0xee, "f774f609e6b7b6724b519ffda49f382e45e60363ba635d32a6105035f23ee0b16a02f33e93d9c83105e9c0285350d4765730c2ca269492ff06d3e0ca2816a2ae0a80b5f86c1d201bed571c924df3749a6142ebe93f356b0fb2b08462ea078b26770b76108ca32bfc598e782f742764556cb102218d2aa35d6367d25c0729ad91aa4fc988bc2de922f227976f3c4c7693551611f1b1cb47d792c5be10fc49cc413f4b109e7c4c81e3e2295e0ab16529f0ae0c71c6624be1673a4db0ebd22a7cd7405f4d1791e2313c9e622068e5519a6ffd3b0db182572aebced520879dc3c8f114cad41fe29abaa37436a19e14ddeccd42452577de07464a9801b5dd019d5a60", 0x1, 0x4, 0x5d, 0x3, 0xff, 0x2, 0x1f}, r2}}, 0x120) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_RAUTH(r3, &(0x7f0000000080)={0x14, 0x67, 0x1, {0x0, 0x2, 0x5}}, 0x14) r4 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r4, 0x6741576111f67cdd) mkdirat(r4, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_GET(r5, &(0x7f0000000080)={0x0, 0x9a000000, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="14000000", @ANYRES16=r6, @ANYBLOB="7ddf00000000f76b895113f6e80e6f11f6f55df0372fb9a061c71b498c9e01acf1624d06000000d0b015cd"], 0x14}}, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xf8, r6, 0x300, 0x70bd26, 0x25dfdbff, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8008021}, 0x4004) [ 309.060954] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 04:43:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_WIE_ON(0xffffffffffffffff, 0x700f) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r0, 0x6741576111f67cdd) mkdirat(r0, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) perf_event_open$cgroup(&(0x7f0000000040)={0x2, 0x70, 0x20, 0x3, 0x0, 0x4a, 0x0, 0x0, 0x40000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0x800, 0xbb, 0xa22, 0xa43ed0eefac59f7b, 0x1, 0x4, 0x4}, r0, 0xa, 0xffffffffffffffff, 0x4) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) 04:43:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) lookup_dcookie(0x7fff, &(0x7f0000000000)=""/41, 0x29) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x2, 0x0) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) shutdown(r0, 0x0) 04:43:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) 04:43:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000800)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa748c569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec61221adf59be045b70e48884ca000018cea71fcfed06fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23fb6430a9a4c2850b6380a743d6ea0c3b121f66c716d746aa81c301621b7662c06aae72", 0xd7, r0) keyctl$negate(0xd, 0x0, 0x880, r0) [ 309.472257] ================================================================== [ 309.479889] BUG: KASAN: use-after-free in put_pid_ns+0x100/0x110 [ 309.486078] Read of size 8 at addr ffff888092d45ca8 by task syz-executor.5/10826 [ 309.493636] [ 309.495293] CPU: 0 PID: 10826 Comm: syz-executor.5 Not tainted 4.14.156-syzkaller #0 [ 309.503323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 309.513017] Call Trace: [ 309.515642] dump_stack+0x142/0x197 [ 309.519308] ? put_pid_ns+0x100/0x110 [ 309.523140] print_address_description.cold+0x7c/0x1dc [ 309.528457] ? put_pid_ns+0x100/0x110 [ 309.532449] kasan_report.cold+0xa9/0x2af [ 309.536629] __asan_report_load8_noabort+0x14/0x20 [ 309.541854] put_pid_ns+0x100/0x110 [ 309.545531] free_nsproxy+0x103/0x200 [ 309.549610] switch_task_namespaces+0x98/0xb0 [ 309.554166] exit_task_namespaces+0x18/0x20 [ 309.558527] copy_process.part.0+0x3b59/0x6a00 [ 309.563161] ? proc_fail_nth_write+0x7d/0x180 [ 309.567693] ? proc_cwd_link+0x1b0/0x1b0 [ 309.571806] ? __cleanup_sighand+0x50/0x50 [ 309.576133] ? lock_downgrade+0x740/0x740 [ 309.580329] _do_fork+0x19e/0xce0 [ 309.583828] ? fork_idle+0x280/0x280 [ 309.587578] ? fput+0xd4/0x150 [ 309.590802] ? SyS_write+0x15e/0x230 [ 309.594549] SyS_clone+0x37/0x50 [ 309.598054] ? sys_vfork+0x30/0x30 [ 309.601621] do_syscall_64+0x1e8/0x640 [ 309.605670] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 309.610724] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.616134] RIP: 0033:0x45a639 [ 309.619345] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 309.627084] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 309.634466] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 309.642028] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 309.649336] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 309.656805] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 309.664285] [ 309.665931] Allocated by task 10826: [ 309.669720] save_stack_trace+0x16/0x20 [ 309.673872] save_stack+0x45/0xd0 [ 309.677353] kasan_kmalloc+0xce/0xf0 [ 309.681270] kasan_slab_alloc+0xf/0x20 [ 309.685271] kmem_cache_alloc+0x12e/0x780 [ 309.689440] copy_pid_ns+0x1ae/0xa40 [ 309.693188] create_new_namespaces+0x267/0x720 [ 309.697954] copy_namespaces+0x284/0x310 [ 309.702040] copy_process.part.0+0x2603/0x6a00 [ 309.706646] _do_fork+0x19e/0xce0 [ 309.710119] SyS_clone+0x37/0x50 [ 309.713508] do_syscall_64+0x1e8/0x640 [ 309.717422] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 309.722626] [ 309.724330] Freed by task 7084: [ 309.727723] save_stack_trace+0x16/0x20 [ 309.731725] save_stack+0x45/0xd0 [ 309.735225] kasan_slab_free+0x75/0xc0 [ 309.739228] kmem_cache_free+0x83/0x2b0 [ 309.743247] delayed_free_pidns+0x89/0xb0 [ 309.747424] rcu_process_callbacks+0x7b8/0x12b0 [ 309.752279] __do_softirq+0x244/0x9a0 [ 309.756293] [ 309.757980] The buggy address belongs to the object at ffff888092d45470 [ 309.757980] which belongs to the cache pid_namespace of size 2264 [ 309.771015] The buggy address is located 2104 bytes inside of [ 309.771015] 2264-byte region [ffff888092d45470, ffff888092d45d48) [ 309.783402] The buggy address belongs to the page: [ 309.788363] page:ffffea00024b5100 count:1 mapcount:0 mapping:ffff888092d441c0 index:0x0 compound_mapcount: 0 [ 309.798517] flags: 0x1fffc0000008100(slab|head) [ 309.803225] raw: 01fffc0000008100 ffff888092d441c0 0000000000000000 0000000100000003 [ 309.811137] raw: ffffea0002795520 ffffea00013d7a20 ffff888219f77640 0000000000000000 [ 309.819052] page dumped because: kasan: bad access detected [ 309.824784] [ 309.826519] Memory state around the buggy address: [ 309.831472] ffff888092d45b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 309.838875] ffff888092d45c00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 309.846308] >ffff888092d45c80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 309.853934] ^ [ 309.858628] ffff888092d45d00: fb fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc [ 309.866190] ffff888092d45d80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 04:43:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa2ffaad1a92b3859, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x0) clone(0x300000080160101, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) fchmod(r2, 0x6741576111f67cdd) mkdirat(r2, &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r3 = perf_event_open$cgroup(&(0x7f00000000c0)={0x5, 0x70, 0x81, 0x7f, 0x86, 0x52, 0x0, 0x7, 0xc8000, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3f, 0x6, @perf_bp={&(0x7f0000000080), 0xd}, 0x20000, 0x1, 0x0, 0x1, 0x5, 0x4, 0x6136}, r1, 0xb, r2, 0x3) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x9, 0x5, 0x6, 0xff, 0x0, 0x1ff, 0x8004, 0xe55471572ea52237, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, @perf_config_ext={0x4, 0x1f}, 0x800, 0x7fffffff, 0x5, 0x2, 0x6, 0x8, 0x8001}, 0xffffffffffffffff, 0x6, r3, 0x9) [ 309.873972] ================================================================== [ 309.881370] Disabling lock debugging due to kernel taint [ 310.248336] Kernel panic - not syncing: panic_on_warn set ... [ 310.248336] [ 310.256097] CPU: 0 PID: 10826 Comm: syz-executor.5 Tainted: G B 4.14.156-syzkaller #0 [ 310.265379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 310.274989] Call Trace: [ 310.277617] dump_stack+0x142/0x197 [ 310.281628] ? put_pid_ns+0x100/0x110 [ 310.285459] panic+0x1f9/0x42d [ 310.288683] ? add_taint.cold+0x16/0x16 [ 310.292691] ? ___preempt_schedule+0x16/0x18 [ 310.297313] kasan_end_report+0x47/0x4f [ 310.301319] kasan_report.cold+0x130/0x2af [ 310.306198] __asan_report_load8_noabort+0x14/0x20 [ 310.311341] put_pid_ns+0x100/0x110 [ 310.315150] free_nsproxy+0x103/0x200 [ 310.318983] switch_task_namespaces+0x98/0xb0 [ 310.323534] exit_task_namespaces+0x18/0x20 [ 310.327885] copy_process.part.0+0x3b59/0x6a00 [ 310.332508] ? proc_fail_nth_write+0x7d/0x180 [ 310.337206] ? proc_cwd_link+0x1b0/0x1b0 [ 310.341507] ? __cleanup_sighand+0x50/0x50 [ 310.345938] ? lock_downgrade+0x740/0x740 [ 310.350723] _do_fork+0x19e/0xce0 [ 310.354212] ? fork_idle+0x280/0x280 [ 310.357960] ? fput+0xd4/0x150 [ 310.361190] ? SyS_write+0x15e/0x230 [ 310.364942] SyS_clone+0x37/0x50 [ 310.368343] ? sys_vfork+0x30/0x30 [ 310.371922] do_syscall_64+0x1e8/0x640 [ 310.375847] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 310.380911] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 310.386136] RIP: 0033:0x45a639 [ 310.389343] RSP: 002b:00007f55db6d7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 310.397083] RAX: ffffffffffffffda RBX: 00007f55db6d7c90 RCX: 000000000045a639 [ 310.404380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 03000000a0160101 [ 310.411770] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 310.419071] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f55db6d86d4 [ 310.426541] R13: 00000000004c0d31 R14: 00000000004d38c8 R15: 0000000000000004 [ 310.435703] Kernel Offset: disabled [ 310.439724] Rebooting in 86400 seconds..