0000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x200, 0x28) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 0: sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x40) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1b3ae8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_io_uring_setup(0x2de1, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000040)=@IORING_OP_READ=@pass_buffer={0x16, 0xa, 0x0, @fd_index, 0x0, 0x0}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f00000001c0)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x9) r2 = syz_io_uring_setup(0x2de1, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_WRITE_FIXED={0x5, 0x2, 0x0, @fd_index=0x8, 0x6, 0x9, 0x18000000, 0x1, 0x0, {0x1}}, 0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r2, 0x0, 0x0, 0x0, {0x1}}, 0x9) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f00000000c0)=0x27df, 0x4) sendmmsg(0xffffffffffffffff, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000010c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0xff00, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000001100)={'lo\x00', 0x0}) sendto$packet(r5, 0x0, 0x0, 0x0, &(0x7f0000001140)={0x11, 0x3, r6}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000040)={@private2, 0x7c, r6}) sendmsg$ETHTOOL_MSG_RINGS_SET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x7c, 0x0, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x8001}, @ETHTOOL_A_RINGS_HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}]}, @ETHTOOL_A_RINGS_RX_JUMBO={0x8, 0x8, 0xffffffff}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x4000}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x200}, @ETHTOOL_A_RINGS_RX_MINI={0x8, 0x7, 0x2}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x7fff}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000004) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r4, &(0x7f0000000080)=@IORING_OP_FADVISE={0x18, 0x3, 0x0, @fd_index=0x2, 0x2, 0x0, 0x2, 0x1, 0x0, {0x0, r7}}, 0x5) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.pending_reads\x00', 0x2b0000, 0x161) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0xc02, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100), 0x400800, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0xea691) set_mempolicy(0x8000, &(0x7f0000000000)=0xf, 0x27a5) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ef) set_mempolicy(0x2, &(0x7f0000000000)=0x10000, 0x8) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:07 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x40000000, 0x30000) 15:50:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 0: setns(0xffffffffffffffff, 0x10000000) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'security\x00', 0x2, [{}, {}]}, 0x48) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000080)={0xa, 0x4e23, 0x0, @local, 0x7}, 0x1c, &(0x7f0000002540)=[{&(0x7f00000000c0)='w', 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20008cd4) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) clock_gettime(0x0, &(0x7f0000003fc0)) recvmmsg(r1, &(0x7f0000003d80)=[{{&(0x7f0000000180)=@ipx, 0x80, &(0x7f0000000000)=[{&(0x7f0000000200)=""/128, 0x80}], 0x1, &(0x7f0000000280)=""/64, 0x40}, 0x9}, {{&(0x7f0000000340)=@hci, 0x80, &(0x7f0000000540)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f00000002c0)=""/35, 0x23}, {&(0x7f0000000440)=""/255, 0xff}], 0x3, &(0x7f0000004140)=""/4111, 0x100f}, 0x2}, {{0x0, 0x0, &(0x7f0000001580), 0x0, &(0x7f00000015c0)}, 0x3000}, {{&(0x7f0000001600)=@generic, 0x80, &(0x7f0000001b40)=[{&(0x7f0000001680)=""/212, 0xd4}, {&(0x7f0000001780)=""/98, 0x62}, {&(0x7f0000001800)=""/86, 0x56}, {&(0x7f0000001880)=""/10, 0xa}, {&(0x7f00000018c0)=""/145, 0x91}, {&(0x7f0000001980)=""/100, 0x64}, {&(0x7f0000001a00)=""/114, 0x72}, {&(0x7f0000001a80)=""/82, 0x52}, {&(0x7f0000002600)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/29, 0x1d}], 0xa, &(0x7f0000001c00)=""/56, 0x38}, 0x4}, {{&(0x7f0000001c40)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001cc0)=""/210, 0xd2}], 0x1, &(0x7f0000001e00)=""/98, 0x62}, 0x1000}, {{&(0x7f0000001e80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000002000)=[{&(0x7f0000001f00)=""/220, 0xdc}], 0x1, &(0x7f0000002040)=""/129, 0x81}, 0x7}, {{&(0x7f0000002100)=@ethernet={0x0, @local}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002180)}, {&(0x7f00000021c0)=""/146, 0x92}, {&(0x7f0000002280)=""/130, 0x82}, {&(0x7f0000002340)=""/48, 0x30}, {&(0x7f0000002380)=""/51, 0x33}, {&(0x7f00000023c0)}, {&(0x7f0000002400)=""/75, 0x4b}], 0x7, &(0x7f0000002500)=""/13, 0xd}, 0x97a}, {{0x0, 0x0, &(0x7f0000003940)=[{&(0x7f0000003600)=""/237, 0xed}, {&(0x7f00000037c0)=""/214, 0xd6}, {&(0x7f00000038c0)=""/114, 0x72}], 0x3, &(0x7f0000003980)=""/140, 0x8c}, 0x9}, {{&(0x7f0000003a40)=@isdn, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003ac0)=""/226, 0xe2}, {&(0x7f0000003bc0)=""/18, 0x12}, {&(0x7f0000004040)=""/203, 0xcb}], 0x3, &(0x7f0000003d40)=""/42, 0x2a}, 0x9}], 0x9, 0x200, &(0x7f0000004000)={0x0, 0x989680}) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x16c0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x400, 0xa0) preadv(r1, &(0x7f0000000100), 0x0, 0xf521, 0x7) write$cgroup_pid(r0, &(0x7f0000000000)=0xffffffffffffffff, 0x12) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x440000) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0xdffe, 0x171040) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000100)={&(0x7f0000000080)=[0x0], 0x1, 0x1ff}) set_mempolicy(0x0, &(0x7f0000000200)=0x200, 0x200) set_mempolicy(0x8000, &(0x7f0000000000)=0x401, 0xe39) set_mempolicy(0x1, &(0x7f0000000240)=0x3, 0x82d5) set_mempolicy(0x8000, &(0x7f0000000280)=0x100, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f00000001c0)={&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000180)=""/62, 0x3e}) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x80) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, &(0x7f0000000080)={&(0x7f0000000000)=[0x0, 0x0, 0x0], 0x3, 0x3}) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b4, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0xb1, 0x8000) shmget$private(0x0, 0x1000, 0x4, &(0x7f0000ffc000/0x1000)=nil) syz_open_dev$usbmon(&(0x7f00000000c0), 0x8, 0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0xda, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x2, 'veth1_to_hsr\x00', {0xf8}, 0x7}) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:09 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f0000000000), 0x2000, 0x600100) 15:50:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x177a82) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x100000c, 0x110, r0, 0xffff) 15:50:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x90}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x4}, 0x0) sched_setattr(r0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x5, 0x0, 0x100000001, 0x0, 0x2}, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500)}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) sched_setattr(0xffffffffffffffff, &(0x7f0000000180)={0x38, 0x2, 0x4, 0x1, 0x3f, 0x622, 0x2, 0x3, 0x401, 0x9}, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f00000001c0)) sync() sync() getrlimit(0x8, &(0x7f0000000100)) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) set_mempolicy(0x4000, &(0x7f0000000080)=0x8, 0x3155) 15:50:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:10 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000100)=""/166, 0xa6}) io_setup(0xffffffff, &(0x7f00000001c0)) 15:50:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xefffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:11 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000001, 0x762a5b8959e0d41e, r0, 0xf29c5000) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0xffffffffffffffff, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), r2) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x44, r3, 0xaf3c7e7cad66b467, 0x0, 0x0, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @ipv4={'\x00', '\xff\xff', @dev}}]}, 0x44}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x7c, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @broadcast}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @local}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'geneve1\x00'}, @NLBL_UNLABEL_A_ACPTFLG={0x5}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @remote}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @multicast1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010100}]}, 0x7c}, 0x1, 0x0, 0x0, 0x81}, 0x40000) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x13, r0, 0x9f889000) openat(r0, &(0x7f0000000000)='./file0\x00', 0x2, 0x100) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xae, 0x1ff) set_mempolicy(0xf176bef9e682dc4b, &(0x7f0000000080)=0x8, 0x6) set_mempolicy(0x0, &(0x7f0000000000)=0x7fffffff, 0x9) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="ab5e3797964ef1d85b90661d9d3bf7026c9a9c1ab85099812a77454f9c30e8340cd74982e871f4ba9fbb7d7e9b774aac5992a8b736a4dad07ef3ae96b3ff2aa5ed2d2f2c3a7ec1bcb5e7ab32540a5dd27b0b47117d623a541db4059d84b87377cb6397802d904dec9e63662f355a28f162debec4993bad2a525cf98d23769d41691db779d2beebc3628f074a38f3b72f482e8e8faa1014ff1ae294830a7032ee198665e1419a57176ad622c73024069a39905864cf2d", 0xb6}, {&(0x7f00000001c0)="319ed5a67eab596505a871524217fa2fb3ca677be13b7f3aa97a428e154029dcd32265fe3d9335f5b25f58437d2688c3df22b06f3065b40251192495861a5d642f6b203aa1b30b2cc71469ea291b3a91d3d76a0d643d51a2cbb7f53db6df5a0d20d8f718eeece274873b56c0eafddd53c56f68c7a2ee3f17e4c669b5942e2a16aec602d1ea113bf452b93c5cd1eeec14e396c09414d234f5169ef6bb17892cab6cacf59a33ab2298b816d901f692f2dceae0e65c4a1265645aff8c3050cecc9b71c88650d09b4bb4d4d51ad18294df21183c36cb5e971c592792bc6dc7c6008f145eb927d0e73a4a8283053e5ebb0b7c369cf24b4a23ee", 0xf7}], 0x2) syz_open_dev$usbmon(&(0x7f00000000c0), 0x1000, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0x3, &(0x7f0000000080), 0x7f) syz_open_dev$usbmon(&(0x7f0000000000), 0x400000000003, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000140)={{0x6, 0x61}, 'port1\x00', 0x2, 0x800, 0xabdb, 0x62a, 0x1, 0x1000, 0xfffffffb, 0x0, 0x5}) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0x4000, &(0x7f0000000000)=0xfffffffffffffff7, 0xfffffffffffffffe) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:12 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x1) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/locks\x00', 0x0, 0x0) lseek(r0, 0x31, 0x0) flock(r0, 0x5) r1 = creat(&(0x7f00000004c0)='./file0\x00', 0x0) flock(r1, 0x1) rmdir(&(0x7f0000000080)='./file0\x00') set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0xc000, &(0x7f0000000000)=0x1, 0x45) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x4c010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) fsopen(&(0x7f0000000000)='hostfs\x00', 0x1) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x2000, 0x400202) syz_io_uring_setup(0x7388, &(0x7f0000000100)={0x0, 0x7e7d, 0x20, 0x0, 0x158}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000080)) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc024c0, 0x80) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) mmap$usbmon(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xb, 0x10, r0, 0x5) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) dup(r0) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={{0x14}, [@NFT_MSG_DELSETELEM={0x28, 0xe, 0xa, 0x201, 0x0, 0x0, {0x2, 0x0, 0x7}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x3}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELRULE={0x48, 0x8, 0xa, 0x301, 0x0, 0x0, {0x7, 0x0, 0x9}, [@NFTA_RULE_POSITION_ID={0x8, 0xa, 0x1, 0x0, 0x3}, @NFTA_RULE_HANDLE={0xc, 0x3, 0x1, 0x0, 0x4}, @NFTA_RULE_POSITION_ID={0x8}, @NFTA_RULE_POSITION={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz1\x00'}]}], {0x14}}, 0x98}}, 0x4000) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: set_mempolicy(0x4003, &(0x7f0000000080)=0x6, 0x7fff) set_mempolicy(0x0, &(0x7f0000000000)=0x6, 0x4) syz_open_dev$usbmon(&(0x7f0000000040), 0x10001, 0x80) set_mempolicy(0x8000, &(0x7f00000000c0)=0x5, 0x40) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0x2, &(0x7f0000000000)=0xa7af, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000001100)={&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000100)=""/4096, 0x1000}) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 0: set_mempolicy(0x3, &(0x7f0000000000)=0x7, 0x5) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000080)=0x10, 0x80000) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000100)={0xe86e1de, {{0x2, 0x4e20, @broadcast}}, 0x1, 0x3, [{{0x2, 0x4e24, @multicast2}}, {{0x2, 0x4e24, @loopback}}, {{0x2, 0x4e23, @empty}}]}, 0x210) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x92020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb2020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0x1f, 0x6) 15:50:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xb4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) set_mempolicy(0x0, &(0x7f0000000000)=0x45, 0x72bf76d2) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f0000000080), 0x0, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = dup2(r1, r1) r4 = perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x80, 0x8, 0x1, 0x0, 0x3f, 0x0, 0x401, 0x4046, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0x0, 0x0, 0x7, 0x8, 0x10000, 0xfffffffd, 0xdd72, 0x0, 0xb3, 0x0, 0x100}, r3, 0x2, r0, 0xc) splice(r4, &(0x7f0000000240)=0x7c5b, r0, &(0x7f0000000280)=0x1, 0x7f, 0xb3eb57508b838e59) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_REGISTER_BEACONS(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r2, 0x200, 0x2, 0x25dfdbfe, {{}, {@void, @void, @val={0xc, 0x99, {0xffffffe0, 0x11}}}}, ["", "", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xe83a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 0: set_mempolicy(0x1, &(0x7f0000000040)=0xb1, 0x80000001ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xefffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:14 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0x372, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x60c0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000000)=0xc5c, 0x401) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x11}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x8000, 0x100) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000280)={&(0x7f0000000080), &(0x7f00000001c0)=""/144, 0x90}) read$usbmon(r0, &(0x7f0000000100)=""/180, 0xb4) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xff010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x12}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, &(0x7f0000000100)=""/4096) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) r1 = memfd_create(&(0x7f00000011c0)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00', 0x3) pwritev(r1, &(0x7f0000000000)=[{&(0x7f0000001240)="754ba67d380ed295cd090b73200fad4b183c8579b72838f4af3057139ef0ceccb143d850b7c6c11bf5ee9386789e58d42a7d78644d756390e72ec7576601d6a06bea496f02f6845a6b44b6fae79e82a1df12931959433e794d90", 0x5a}], 0x1, 0x4, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) fstatfs(r0, &(0x7f0000001100)=""/134) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x27}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x48}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x6, 0x3) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x80010, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ioctl$MON_IOCX_GETX(r0, 0x4018920a, &(0x7f0000000080)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000100)=""/233, 0xe9}) set_mempolicy(0x3, &(0x7f0000000200)=0x5, 0x5) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) io_setup(0x6, &(0x7f0000000000)) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xf, 0x100010, r0, 0xb8ab9000) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x68}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={0xffffffffffffffff, 0x1, 0x176, 0x20000000000000}) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x1, 0x4) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x16a00, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000100)={'mangle\x00', 0x0, [0xfffff800, 0x1000, 0x0, 0x5, 0x80000001]}, &(0x7f0000000080)=0x54) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x8081) 15:50:15 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:15 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xef}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x14a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x16c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x292}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2b4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x500}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x600}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x700}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:16 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x900}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:16 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1100}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1200}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4020000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2700}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3f00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:17 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4a01}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6800}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(0xffffffffffffffff, 0x9204, 0x10794d) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c01}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x0) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9202}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c01}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:18 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb402}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7402}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xefff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:18 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7403}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff01}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7404}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x14c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff07}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7405}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffef}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7f) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x16c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7406}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe0000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7407}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7408}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x292}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x0, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2b2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7409}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x740a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x740b}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, 0x0, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1004000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:19 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x740c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x16c0000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:19 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x740d}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040), 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x740e}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7410}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7411}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7412}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(0x0, 0x3, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7427}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x8240) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7448}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x744c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7468}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 3: r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000001140)=ANY=[@ANYRES64=r2, @ANYBLOB="57841ca291ba5a59451b16a5fa45bec5ab864c9151ed0b54bd3945e92f6c7509e65dc6f9b13f9abbf7a5bf90cf8e1baeabf05494fa01cd9490926600d3edee15869da3e8e812dca03518de25162f7f147c43134ed6be34935660e8b4a78c26d0a60000000000"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b540)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0xd9, "e5d9651b4474d7"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004adc0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004afc0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004b1c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000004c1c0)={0x0, 0x0, "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", "b36ff0536d24e914df5c31070e3c67bce48acc85e865b5e9824e0626e085d8ba1ab80a20c46def3aa1628de7b9a340ed7dfcde6e357ee5324680e7ab0a1144e063ae0861e097ab60cf1c215038a8271842b3b844701806c5c5b40c77814d58d43dd09457655495846117c6f614ff049137a1b4ef6dbd5595c8f972ee4a296296ae3c6ceedee7a7c8407031e2cebe87c0ef13d148a1fa571d4f604d726043b7e06428c39fffe4264d0ada7c2297e03b423394bb0188acdd555ce079c0448cb1e964c0b5be246869f9fbb1e803add630c5946ebc608fa99a549a135699ddebae76b21624e0ff10ee1dc657f6ab9bcccae261134794549d599af9b17218f1468d0bce35aa91c5840f7b778153ab48ac6e58c6c6dc411098a6c4382cf8f997807b42b4344a100ffb5cb2260c7496b4d67a96f6d67cb2d01509764c6bdb6c04012a58c3654bf8a88050ed4282bfe2c64aec587f44c27ff748d235e77f5e67b56cdfefa7a68243c97adb93978af92f6d72ffec79c26674805b6f4b83d516931ea80b0b5f4b930213de6f870a918f7db8ce6da29d4eb73a7a15f88ec79ec1b13233031d038bf8f5e3e366aa428e75d9a354069aea69002a1adf2d5002687cde750f92d12211b18e6ebf7b26a79e263eb86547c0f2554c3d5c3206e9f5a83c77592f09fa2ee43f5cc406bf9c9b6b313f2156ad96d02619717096b834f4766a3131039e7e7d3a1593f37dfe06d6c4a6f0116f867ade7077ecf25dceda85299c84f8a42376bf78ddb6eeddea91882f6f56dc7e5b35e3edfbfe26a79658ae70a88e4467c16ae147da3d25ec72ac5c0d71d232ad3cabb39d37b17b37e6bcb873fa366bfdc39fc86f9730a4e05db19118876ca31c29c379742c6aa97f635ee19db1dab4452d19a583e22ae2709511ae10bdd0365f9589083eb9c980f810b608f13c998ffdaed151a6b097d22675c8aae9eff95a5a4c46d0bbcf680de9a82c5f4e05f726fb29436a7ec0657faf638e68c95f90de79a1ca72d6001f4cc455441f1a8d71681afcf6fd5f442a2404fb475a268b0b35e0eff80dff2de0561c240ffde8dd9182d83711be93c6195697e4c30f709902126d46d213393c9d40d1d25ae74f84eb7cc359eb3a942f9c545c57ca8b6e2c495a2869b7e47bd86d5f893185a4dec94c428bf50e4c07cdfa0f15c55dafa41c445a0f4a237d28db2fda7f866c5dcf256218c0b80ae05e2ffc368bb25e3d0c1e42e2d9558966a4b0a8c94ba495de8a121eed1f5fddf8c3843b660632896a563465b12fdc23f02236b340ece6e17c8a7cc1d160b859ee54366149d1e65338c7d403e47b562d161325a7e0a45b5d480950a4663a49f3ec53ff98e2e97c3fb7587d736926e8a206d1f341c0effbe6647f5c7e39ea85001506d914fdbc4b5fd5ae97463fd6bd9945b599bf401d92c2e61bd8be3e39fef28305f510c3bdc7669d72c181e68873217abebee1f883e8e62c8b4f0e11a43e68e3c5c7aa5dbbf77af90e8d3c50c3844c4187d18bce5b464c72c7e586796422979c23d89d731f25ccf1d61deba3ef21c53565793e91c74ab9d319d54d48f88dc85d92bbcfacd9865c3004bf37d29f3a977b584a215904653888da9016e606501501435a9f85b3dc2cc54de1ef9d495443caf3c2abe2fd5ee0fa13e479cd7299bd6aca5f5b9fb39843efee5cae6e0d0c6bf62606b299308d9ec633fd3f00a71b1e9dad44ca883d56ed76cf76f3c18ffec36818bda81846475edd683332b897408e25e9fcd6b15500aaf7214f92ddce738e3ecfcf590c0e72535112482743eea70e40f64d6ce6b6e63dabd51532188b80ceae536e02f96ce926b5a369e87d0fccdd9f3b243d905c1251af8b1c2d88b26eb03fe4e4146eb2001695877ff5574cba81ab85b2f690c9a2a172fdd21b67695d3097c9042fba972e23b5ce67a0c4da00e059fc7fcfd6758b59296d1be8ba8ecaa1019930fba07f336dacb5ef3cfb2b8a752baaf49f7eb1cff0a6b424eb3f50be3490dab0ba28b639810b8e99237a9357a04b98eed1c1a75a0e8416573e88179517e646fa3ada261ff6131551746e2718edca26223c3d4c8fcaabe575df19563181c24d560d152dd3347888ee6313216df687ed5424af4acfb2b511cee46294ba30b05b9c3dc298377c3473e221f3962862e27531192af261aa1a25152ca2991cbd22659e2d1041132e46fb7a7b6d627f6c22aeec51ec76aca17f3316d30e66b2d3af927ce42d8c4376d10c0a55170db284b618f8e2d0ba11d5c52dcdbecc14e6ff374545f214228c88bc4abc1155655be1368cd9c8ec81fecc9576504d2937fb7a9f17dd7753bf5cb7e4797c2d8cf9f7ae67c9448eb797f92d7b3af13f007f77cbfcfd36c3fac5fd41b88c3a9d5062e85a58697823d94e832a57297a3c129c588d06c4d780980b612e275a64a03716dff3aaa116a613618350fbd34d2313a9be934515477c41a28417a53cfc5ce6696b33c41decdcc1f25a988159788cad686437ea499937210d2acac5998b9c57fc5125fb10b73bf05bdc276a9022502eff021f88e828ca4ab89128dd176516d4bdb7b96b6630266b662f8afebcef3c0b6b25e785df57049734d48a09b266ce6a4ef4d7bcac682e3a2d363a97219fe8248b9cf153867204f0420d62e80e5411ad732226f684b12ba8fa60375ed27dd49cd5340a34a48fd235d6a7b370ff5fcd5df5159ab5c3556ed365110c4300a704dffba936924cddb340b7ae8eb4fa30498cba012250aff4c68d9d666f3f8ba8a106ad927f235c9832bb087138f9bfc93e16137cb2898594aef623648b9c43421f2e02b8e18cda9db62547ce2f05ea0f484e9e1fea3e3ab4c62d10932bccc9283bada49efc0e75d81593fa7465271a7cf21f0409afd0d91a5adf7c1cafe01dd813b3ed13376cf54a92620f52ef3cbc05917846eccc45ab256516da833c0e53f77f6c053e7a07c27445543e9ba713ed20025d7862acd4da04064e67e68a9bd897c863257fa43358e92bc772a96aad7942927e4ced7e67849f9df752ed2888fd3bf6aac931458c94b2c26cbc29a633d94dea371b4256b820f67c49e27726e786d26d330fc8c42d32a882fa16dbe2194d55be12927f604f8a2ead6d528d74bb81b9fc5d72ba386795a108e9192523bafb9cfd07628ec80cfc2585b4b9d407af490df275128d1cca66fde86d53db49041871cf1826b01faad069554e1e744969f62a0fc8c5691ce875feae8b2b524bb70767789e95fef6658799b1631624cb8ea1578f8f78910f74a859b36640ab440945be102993e0bdd9829c5ef3e55f4dc38adf193a36da32e18d2866089af228780ab0dde8d7390398f39e3638aed71c018b79cd6ac1b04cf56d1126147931ac242674eec4b44b7bb4ea94d986a49914fbcfca7092806b76678f4eea55887acb3fee130fb462839cacbcbb1d299c462763221558565c03c8360f258db01e6c81d94d553dbc28e785709660e3b031507203b8357a4aaf84d2e6c18f1ef07ab475820f92676f8098b0bc19c04a02495184f538d039d33b6dc36d9ccf5b5b5b6c44070e176ae88aad43df1fd4d04d7e601e4aab1d50cac25d426b8783a90dfdad2844993fb6c9c9e8bacbdc3b8b4bf19a91d760a86e2530152153feb954bad54f1e8b57df6ea20b2b1b95085650d7cacb47874c64ed12e2746c987739c1a6c1156538d2d22db75a21196c955355769cc6bef2a0465d8187d4477870093131ac13fe377e7e99d2737080250fc7f1a2302812cafd3a28dbd8ecb771ff7df6e9d993d6d0006042b77f4cb1218cf564c4d8c4891f376d8015f3dd8a5f20020f5cc4445914842472d1b808d7a23a1674f596a807597016b8623ccd1add59c12855599bfeec454bb3c6382deb56865e8670dea23d73bd063d30a0c524456edb2d062cf0845d43230755159225e46319183dd28154cbd97c4a79b14eda7688a2cfe72860796ba06a30e34922accd9a34f0fb9a7168aafe959d29840150506de525a57115558d745db0d0b4f9211e79836d0d8fdcfe67984a54803027f58193f0c3a3b214d05ff91b7d13c3011e3d01cc87e01a0b7f5b63e19af32076098e6a44df81c9e87ec55918e4f2807d39ce11226c485678a29f8e0d0d126483e4297fc32d314d743257880d64bbbb96c6390d5d70dc49265760b0199b7992b12e3e49f3fdffb6013d93d01556584ef6757efd573abd33e045e58e518f338104fe45b3612bee2743cc2ecd5fdb6dadb78105723348ccef6e96cdb7b5dd3432ae957aa570b40eebaae22b87cdbaa0b43d71e1008c04ca4d5353a6729b796458ddc83509f1c936a9535ba1211738736036bf71d66b5200379b6432a11ab5df671b096e5cb8256bb010f3783d65051ec135be6911b7e86ef6f60a8e5ead31eb3d7766beedd4dfc97ad3e30c7e0232df2d74071556633e4203d05e7c7d49e53f71056da6c0abda858d4350199b19ab63dcda42e6caf690d11c5abfde6ec73e1507a2d1388866dc42977403f97efdb0183d7f19ed7fcf9af8fd95fc7ebc76204630282e3d73cf0332f1ae5f2933ded0f69bab1ec4929f6a9ac675f3ddda2d97dd2c966fe5872f88e6d03118c463272402a4022a0e0da4035b163a0ec969f63bb35a65288182681d2160c63f972efa6d5c81e3d0216f09358dd375c91a9907e2ae7d3e9c92e30fe8c90ea768d8cbe46d316c307f034c7ee660dfb1adcbb8da7a74407b141932ffc1ac9c3688a97d55e0ed0d527290cde329030eee84b17e7a96a6e3e67a2d453ebe145e7a534db16503467d635bcad70611b14bce9fbd89c97ce32d08ea8fb7264b67a27d3cfee7ad2d2f621dd307dab1a674f6f6ed4eae394330652d2aafcbef9b02e671e8333c1e98f20e29c04abbf6736b1e95db9b43d37de1403201acde42724c0dcef4f59a3989e3484f65300afaaf1e3e700ac20aced2f16ca43a880971213382443a4df6be20185b65658107f477de5e72d0a7d2703a8886892ba9d13bd651d0499296d7cdb1f649209f36dff3446648b727f0b0ca73ff0eaf211a156d09ec8e10089a30ef5f31a4f2bd9ae91dcc1caa548cf62a5a18ee366b753364776c0ea3abe07b2a9347272cc280864d7acbb11b33033f5f5b89139ba2cd170181f115aef0190b7e391a4ae455c87ab94a090c67b221c6e92aca5c24469864bba13dba05a670c0d5c13cdd19ed79c1fb0a26830206afdd189c8c944b6c8c30c0001d5785ea6f2ab3b457056524973b67b35d91f8f10046e16d0ad56975e8ae1e9abfee3f02a25a9e76b2aa55484758101d84761d6b4a723f8078fbe9b5f526dbe47f3d618f89a6dcb632aecbaf8a047f99433d8d4122a91434d428ba2c9dede7e4360f53616c4fa4828977089f77aa796b34d4e6cdc84e0df814e11f785d"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004d1c0)={0x3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {0x0, r4}, {r5}, {r6, r7}], 0x10, "c00eab2c74b4ba"}) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r8 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) close(r8) fcntl$setstatus(r8, 0x4, 0xf6f01cc533963cf9) r9 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r9, 0x0) preadv(r9, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$IPSET_CMD_TEST(r9, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x50, 0xb, 0x6, 0x201, 0x0, 0x0, {0x7, 0x0, 0x1}, [@IPSET_ATTR_LINENO={0x8, 0x9, 0x1, 0x0, 0x8}, @IPSET_ATTR_LINENO={0x8}, @IPSET_ATTR_ADT={0x24, 0x8, 0x0, 0x1, [{0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_NAMEREF={0x9, 0x13, 'syz2\x00'}}, {0x10, 0x7, 0x0, 0x1, @IPSET_ATTR_BYTES={0xc, 0x18, 0x1, 0x0, 0x101}}]}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x50}, 0x1, 0x0, 0x0, 0x8050}, 0x4) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x746c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}, {&(0x7f0000001600)=""/138, 0x8a}], 0x8) 15:50:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7474}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, 0x0, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) io_uring_enter(0xffffffffffffffff, 0x6525, 0xf4cd, 0x0, &(0x7f0000000000)={[0x80]}, 0x8) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x747a}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, 0x0, 0x0) 15:50:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002440)={[{@size={'size', 0x3d, [0x45]}}]}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x10001, 0x6) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, 0x0, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74c0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}, {&(0x7f0000001500)=""/213, 0xd5}], 0x7) 15:50:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000100)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r3, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r3) r4 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r4, 0x11, 0x0, 0x100007e00) r5 = openat(r1, &(0x7f0000000040)='./file0\x00', 0x40000, 0x84) r6 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r6, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r6) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000080)={0x100, 0x0, &(0x7f0000000180)=[r0, r2, r4, r3, r5, r1, r6]}, 0x7) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}, {&(0x7f0000001480)=""/119, 0x77}], 0x6) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1b3ae8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 3: set_mempolicy(0x1, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000080)=[{}, {}, {}, {}], 0x4, 0xd824, &(0x7f0000000100)={[0xfffffffffffffff9]}, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x200, 0x2) set_mempolicy(0x4000, &(0x7f0000000140)=0x1679, 0x9) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}, {&(0x7f0000001380)=""/240, 0xf0}], 0x5) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x11000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}, {&(0x7f00000012c0)=""/156, 0x9c}], 0x4) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x12000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000001c0)={0xffffffff, {{0x2, 0x4e21, @multicast2}}}, 0x88) set_mempolicy(0x2, &(0x7f0000000140)=0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffe000/0x2000)=nil, 0x2000}, &(0x7f0000000100)=0x10) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3000006, 0x4010, r0, 0xd495d000) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x20000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/169, 0xa9}], 0x3) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x27000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000200)=""/4096, 0x1000}], 0x2) 15:50:21 executing program 3: sendmsg$MPTCP_PM_CMD_SET_LIMITS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000001c80)=ANY=[@ANYBLOB="7012f4816a57b4e20e366f528b5bc53015602d547e9cb0fe86d4748c16c35306ffff7f0000000000000a959d6aa0f51663bf36977b2d81be613aa1eaa5f68d7ff141265569acd8677e22f070dc750a27b70da2b16e6e4e11178ab7c59dcffbc8c0065ed7901aa023441ef665d92b74f69b992f8f69479c93dcc8f61f82139bb362171d02e5c429589744fe7bf3e927db0df65506147c51fbb506f151f40931502aae876c2641ec75948850bb3bf177520631621cdbf22598bf3ecbe8591ff1609e13b35f68f8851e1d98f64aa4a12fade817be77d8ca6a830cc1b751841d0e7faff8b8539e47781ca55109d016", @ANYRES16=0x0, @ANYBLOB="20002a9d70009271dcac0f00000ab215cb4c95c4c0020c8a0172dea58070a7c2bff3c2084ca4886b5a00a62706bf50654d3bcdba78a8981836298e7faed3cfb220c4b08eb11c67c68b38926ebdeb3c2614e3010a46817e78391ef23bf859b4b394310c066c53f99a688ceb32b3"], 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x20044000) set_mempolicy(0x2, &(0x7f0000001a00)=0x1000000000005, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) io_setup(0x4, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f0000001280)=[&(0x7f0000000180)={0x0, 0x0, 0x8, 0x0, 0x0, r1, &(0x7f00000001c0)='\x00', 0x1}]) r3 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) r4 = openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000240), 0x2, 0x0) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001380), 0x40082, 0x0) openat(r0, &(0x7f0000001840)='./file0\x00', 0x400, 0x20) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100007e00) preadv(0xffffffffffffffff, &(0x7f00000019c0)=[{&(0x7f0000001880)=""/113, 0x71}, {&(0x7f0000001900)=""/187, 0xbb}], 0x2, 0x7fffffff, 0x5) r6 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r6, 0x11, 0x0, 0x100007e00) r7 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r7, 0x11, 0x0, 0x100007e00) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000001780)='rdma.current\x00', 0x0, 0x0) io_submit(r2, 0x8, &(0x7f0000001800)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7f, r3, &(0x7f00000001c0), 0x0, 0x2, 0x0, 0x2}, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x3, 0x9, r4, &(0x7f0000000280)="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", 0x1000, 0x49, 0x0, 0x3, r0}, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x5, 0x3, r0, &(0x7f00000012c0)="ca7fc6149372f7c2737edb7de39811c28ddac72c2622d20db08a0f6d21a9f472b2329ead71f2203935b8c1993d4ce99469a3b0a982f2236b4c961ab3d7a8362adefaede71bc297c13a4604f91b97b63d3af6ebf2aa7582cc7f9335554e440020c2cbace9d7b6ac8a10e37f2517efdcbdb2721f2362da0d", 0x77, 0x1f, 0x0, 0x1}, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x7, 0xff, r5, &(0x7f00000013c0)="14637881053fa48e47aa30bc2242b2b1442a3dd38a15f6fe428b7c97fffb1c2204ae414c30b79b9a310f209ac5a5fe5de63306912eb59a5bd99e5719b0722d32650626049846a20c3122fd75190db39da4ca1075754d1879446878943db5", 0x5e, 0x80, 0x0, 0x0, r0}, &(0x7f0000001540)={0x0, 0x0, 0x0, 0x2, 0x2, r0, &(0x7f0000001480)="d27cced659c815d9b6b075074e28af6e5f3a973d874ad1d1c7f482ab99ffa9a0a9b41cf7fe83e77902f95a43d47bd8787246bde0a0c3b3157b694a37b1d3e74f9b5caccdca216045ba5d3b5ee5e6749433c27744bb8384b52583e9d297f333703d03f115dce43954afa0da852fbe1c2c1e371a861d0b8e85aa8e4a9596aad3108e758481835f258c34522b6e5e53862834e8ec6897725a2614787cc890a1c4bb06292ac10da6136f63", 0xa9, 0x4, 0x0, 0x2}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x3, 0x1, r6, &(0x7f0000001580)="515c488236e94230d2f75e5c5e01a8c85d461c114a4159eeed87b7e9", 0x1c, 0x1000, 0x0, 0x0, r0}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x0, 0x6, r0, &(0x7f0000001600)="7d6b0f7d82e9c7f492b074a9bef26d61b2f7d733fdf8b77f89ed60745c50d1ab0efdf01f428c0c7b796a446314997334971144b9c63f51127d135a992747ee77880b987096092cc7a6fdc1b2ed5d3f962a914b50bc803123922f77c9ae9d67099a4cb7ecc8057b345f087669f26ef3e769bfa07ce509d1c367d9258e684ecda9080a1cb85ea19cc01b47b25119781209fb8535293ed288b24c333752", 0x9c, 0x7ff, 0x0, 0x1, r0}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x1, 0x0, r7, &(0x7f0000001700)="af9902d1fc5a69c33b5af7d3bdb54c60b5fa313cd60ed92bdc455c85075142a385b4b1cff86eefb5db2498f1fd3333446f55a5ed40da84b3fa065accc169b6a609d744f62f0d43f226c82dede6", 0x4d, 0x100000000000, 0x0, 0x3, r8}]) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3f000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x48000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0), 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3f, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'filter\x00', 0x0, [0x6, 0x6, 0x8, 0x8, 0x80000001]}, &(0x7f0000000000)=0x54) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4a010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0), 0x0) 15:50:21 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x68000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:21 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0), 0x0) 15:50:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x6, 0xc0000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{0x0}], 0x1) 15:50:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{0x0}], 0x1) 15:50:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) io_setup(0x0, &(0x7f0000000000)=0x0) r2 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x8001, 0x4, &(0x7f0000001240)=[{&(0x7f0000000140)="fef58ae5a0f81819d2f0400bf0a56ba2114056425b5f57810929b241f3a78399ebd0d3567e7068b5b4f23bea1ae3", 0x2e, 0x5}, {&(0x7f0000000180)="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", 0x1000, 0x4}, {&(0x7f0000001180)="1f69b77e5c3c3c9263202e7239122734dc686c0fe16bd353d807e9076f5a7dd02d92e3e490d0af8ff7f9478919b0e86103db04869e05d450ab45ff148973a963a4db7ff54644eae9add273ec49ee2cc5ca0384cd1561", 0x56, 0x2}, {&(0x7f0000001200)="dd88a29c493b939bd5f83dd716bfd87cd379a8c6d39c4559ded23bb426b1", 0x1e, 0x6}], 0x10, &(0x7f00000012c0)={[{@uni_xlate}, {@iocharset={'iocharset', 0x3d, 'cp932'}}, {@nonumtail}, {@fat=@usefree}, {@utf8no}, {@shortname_mixed}, {@rodir}], [{@obj_user={'obj_user', 0x3d, '/dev/vcs#\x00'}}, {@uid_lt={'uid<', 0xee01}}]}) r3 = dup3(r0, r0, 0x80000) r4 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r4, 0x11, 0x0, 0x100007e00) set_mempolicy(0x2, &(0x7f0000001840), 0x8) r5 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r5, 0x11, 0x0, 0x100007e00) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000001580), 0x6000, 0x0) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000001640)={[0x7ff]}, 0x8, 0x0) set_mempolicy(0x3, &(0x7f0000001880)=0x6, 0x5) r8 = socket$unix(0x1, 0x1, 0x0) io_submit(r1, 0x5, &(0x7f0000001800)=[&(0x7f0000001380)={0x0, 0x0, 0x0, 0x7, 0x100, r2, &(0x7f0000001340)="1c69", 0x2, 0x7fffffff, 0x0, 0x2, r3}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x6, 0x0, r4, &(0x7f00000013c0)="b3e273fa8961c5660880279fe1e4c4d4babcdcd330c42f9acc24c6332f191f04141463c61e96fdbb632b2af011d85cbc2cec02e81355c64a057e6e1bd3bf00feff886ef55b89b2ba60970f10fb485ec7a5de83519db2c2811cee3eb1660e3b9fef1ff3334509271d6a5630ed30285d863a53265bda882148b802a7df7e0faafd3071ddbcdd4efd7103b8cdd5640fb5e567924ba5b2fd78cfab04d0b949646b716e851ab35879902cd30564", 0xab, 0xffffffffffffffff, 0x0, 0x1}, &(0x7f00000015c0)={0x0, 0x0, 0x0, 0x7, 0x2, r5, &(0x7f00000014c0)="84462ff2ca887421d08546c07fb5d123c072baaea1eea722ab7f2aa04cc78c98f085a97649a2f0fc81b8756da6e178803005e686ec9dde1fd6f2bef96b3f9b50571990182671e8b52b889cc31dcc8651bea1fdd9f9def08b25fe2b0d1b0374b36993dbbf5d9584cb366e4fc684eac561231eab69f87435c5d9e8baa9b3c83b161f5246016b1dca26771cf09a18c3455943a704e94eed2deda3e441a8c57f1daaa3fe24d0f8dc50a88827251023ba2ef46fdc31a6e2e187d1b54519f3ec", 0xbd, 0x1, 0x0, 0x0, r6}, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x1, 0x8, r0, &(0x7f0000001600)="0b937b3f68c68bfb8f26504ec039c4780c9702799744d1616ec78997dda333d6b06381c234b6bf59d105f158359522c8b1ae058df6a79e3add18be460638", 0x3e, 0xffffffffffff0001, 0x0, 0x1, r7}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, r8, &(0x7f00000016c0)="28454eaae14f1508c6747441ff8b754800912c0453de653d100f5d9b9dc0cc642414f24c1862c04a1a7791a71d162434c644f7d55a4f5f6bd625e510e262fdbe6b7637d7a40cbba03e0838f1e1ac5b4bda4b9dacf76a2ac3d46305e8fa03cf478a65b2613cbf66ea474a7feefc366729d5c5d5838d78ba6e7eb3d0ad5641234a70e7a928931edb05e6da72a6452cc53aa37d8f4089c7d865f77c48322d83cf7bbfdf738e17125d48e31e86fcd2a387c39f7b80bb2f4086b86aae1932bdb245a8747a548c9c84c367c9a58cea397bf1f35de7bf420ba4ff0dfeb864bb0c2ae1673da5", 0xe2, 0x1ff, 0x0, 0x2}]) 15:50:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x74000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{0x0}], 0x1) 15:50:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x6, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x4000, &(0x7f0000000000)=0x1, 0x3) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) clone(0x80000, &(0x7f0000000100)="214d08c9c290a2dfc4fd1dab405d12ee8f4e014e6aac09ce88f3456e19e00b28fa96ce60dd214396a4c4f36884359227a18e8c0a1bf0914bffcd5f20c20d087ec3362652fc56fc7a0b871b4ddb2fffce74c7fe432496e0ffdff8b5ff0a6355336296d241a59b568aa4c9c58f784862f37c37296338cdedc2efcf42efc56e731c9cf353be4a0dc598fa488b0b5aea1a2bb5b111049642e6568a76c7cd4430", &(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)="bd51748b390c10fec0835b981d7fa07b28708dcdaf6b93d75467e70b063f9a4f013510605d75ed8d03639152529a25e1d32ae055cf8aa35556872320baa0c3869ef9") open(&(0x7f00000002c0)='./file0/file0\x00', 0x4a4200, 0x2c) 15:50:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7406}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:22 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = fcntl$getown(r0, 0x9) syz_open_procfs(r1, &(0x7f0000000000)='net/igmp\x00') fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x92020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x20000001ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x6642ad3540c57fcc) set_mempolicy(0x4000, &(0x7f0000000000)=0xffffffff, 0x7) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) r2 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) dup2(r1, r2) 15:50:23 executing program 0 (fault-call:2 fault-nth:0): set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1063.763359][T15987] FAULT_INJECTION: forcing a failure. [ 1063.763359][T15987] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1063.776508][T15987] CPU: 0 PID: 15987 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 1063.786320][T15987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1063.796381][T15987] Call Trace: [ 1063.799654][T15987] dump_stack+0x137/0x19d [ 1063.804022][T15987] should_fail+0x23c/0x250 [ 1063.808479][T15987] should_fail_usercopy+0x16/0x20 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb4010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x8000, &(0x7f0000000000)=0x100000001, 0x7fffffff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = inotify_init1(0x80000) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) [ 1063.813510][T15987] _copy_from_user+0x1c/0xd0 [ 1063.818109][T15987] iovec_from_user+0xc4/0x2d0 [ 1063.822811][T15987] ? kstrtoull+0x30e/0x350 [ 1063.827316][T15987] __import_iovec+0x49/0x270 [ 1063.831919][T15987] ? do_filp_open+0x17a/0x1f0 [ 1063.836604][T15987] ? fsnotify_perm+0x59/0x2e0 [ 1063.841374][T15987] import_iovec+0x69/0x80 [ 1063.841398][T15987] do_readv+0x108/0x290 [ 1063.841420][T15987] ? __fget_light+0x21b/0x260 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb4020000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 0 (fault-call:2 fault-nth:1): set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) [ 1063.841514][T15987] ? __cond_resched+0x11/0x40 [ 1063.841533][T15987] ? fput+0x2d/0x130 [ 1063.841550][T15987] ? ksys_write+0x157/0x180 [ 1063.841574][T15987] __x64_sys_readv+0x41/0x50 [ 1063.841619][T15987] do_syscall_64+0x4a/0x90 [ 1063.841674][T15987] entry_SYSCALL_64_after_hwframe+0x44/0xae 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xccffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1063.841698][T15987] RIP: 0033:0x4665f9 [ 1063.841711][T15987] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe83a1b00}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1063.841726][T15987] RSP: 002b:00007fc257092188 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 1063.841743][T15987] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1063.841755][T15987] RDX: 0000000000000001 RSI: 00000000200016c0 RDI: 0000000000000003 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1063.841766][T15987] RBP: 00007fc2570921d0 R08: 0000000000000000 R09: 0000000000000000 [ 1063.841778][T15987] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.841789][T15987] R13: 00007ffd04d7cd3f R14: 00007fc257092300 R15: 0000000000022000 [ 1064.028907][T16030] FAULT_INJECTION: forcing a failure. [ 1064.028907][T16030] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1064.028933][T16030] CPU: 1 PID: 16030 Comm: syz-executor.0 Tainted: G W 5.12.0-syzkaller #0 [ 1064.029013][T16030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1064.029024][T16030] Call Trace: [ 1064.029031][T16030] dump_stack+0x137/0x19d [ 1064.029132][T16030] should_fail+0x23c/0x250 [ 1064.029152][T16030] should_fail_usercopy+0x16/0x20 [ 1064.029172][T16030] _copy_from_user+0x1c/0xd0 [ 1064.029196][T16030] kstrtouint_from_user+0x6f/0x130 [ 1064.029218][T16030] ? _copy_to_user+0x77/0x90 [ 1064.029239][T16030] ? fsnotify_perm+0x59/0x2e0 [ 1064.029331][T16030] proc_fail_nth_write+0x38/0x140 [ 1064.029360][T16030] ? proc_fail_nth_read+0x140/0x140 [ 1064.029511][T16030] vfs_write+0x1f3/0x770 [ 1064.029534][T16030] ? __fget_light+0x21b/0x260 [ 1064.029556][T16030] ? __cond_resched+0x11/0x40 [ 1064.029574][T16030] ksys_write+0xce/0x180 [ 1064.029596][T16030] __x64_sys_write+0x3e/0x50 [ 1064.029670][T16030] do_syscall_64+0x4a/0x90 [ 1064.029690][T16030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1064.029790][T16030] RIP: 0033:0x4192df [ 1064.029804][T16030] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1064.029821][T16030] RSP: 002b:00007fc257071170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1064.029841][T16030] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00000000004192df 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xefffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c000000150001000000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000c00100000006c00000000000000000000db974a5568bb6d9afbfff748bd90001701afe53e2cc1a0794666ffc8580a3a384f672baa9f0272de6332639286f3863fd13b964d99e984f47268182e48138ee0ede9f5d6a6bb1c52137448f3c39d3cd4cab6ce16fa96bfb1ec38fdb6ce8c3b7ac40b3b45d9860a8163f63f0ad93aa86ef9903a55d157df670941f6ec07ed087c0ae6a6b1e62bc5a39dc67e0c43b0485da69cead441914695"], 0x5c}}, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x4000, &(0x7f0000000000)=0xa03000, 0x1ec) set_mempolicy(0x3, &(0x7f00000000c0)=0x5, 0x9) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x803, 0x0) set_mempolicy(0x1, &(0x7f0000000200)=0x6, 0xba) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1064.029862][T16030] RDX: 0000000000000001 RSI: 00007fc2570711e0 RDI: 0000000000000004 [ 1064.029875][T16030] RBP: 00007fc2570711d0 R08: 0000000000000000 R09: 0000000000000000 [ 1064.029888][T16030] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 1064.029901][T16030] R13: 00007ffd04d7cd3f R14: 00007fc257071300 R15: 0000000000022000 15:50:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0x7d0}], 0x1) 15:50:23 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) open(&(0x7f0000000000)='./file0\x00', 0x2800, 0x2) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0x200001f2}], 0x1) 15:50:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) sendmsg$NFT_MSG_GETOBJ_RESET(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="70000000150a0500000000000000000003000005080003400000000a0900020073797a31000000000c000640000000000000000108000340000000010900020073797a31000000000c00064000000002000000030800e817000000050c00670e5bff46b49b4ca7fb1cbb26e530064000"], 0x70}, 0x1, 0x0, 0x0, 0x800}, 0x4800) 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfeffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0x7ffff000}], 0x1) 15:50:23 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) set_mempolicy(0x2, &(0x7f0000000000)=0x10000, 0x1f) 15:50:23 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff010000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xffffffffffffffff}], 0x1) 15:50:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x8) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff070000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x50) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff7f}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r3) openat$dir(0xffffffffffffff9c, &(0x7f0000000ac0)='./file0\x00', 0x400, 0x85) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000540)=@proc={0x10, 0x0, 0x25dfdbfc, 0x80000}, 0xc, &(0x7f0000001200)=[{&(0x7f00000007c0)={0x104, 0x39, 0x2, 0x70bd25, 0x25dfdbfb, "", [@nested={0x65, 0x29, 0x0, 0x1, [@typed={0xc, 0x66, 0x0, 0x0, @u64=0x698}, @typed={0x8, 0x56, 0x0, 0x0, @ipv4=@private=0xa010100}, @generic="db84a4f72b0ec07b6ad3051344d1cfb1a941667c06dee54fb5e62bca47364eb5e2d4048066a666443f18f2b5671d2feacc9d11adff1f5dfb314618b150f9678ee7c0d7a7e8", @typed={0x8, 0x1e, 0x0, 0x0, @fd}]}, @generic="1d86478120cf23efaf508df0411aa2a4d5532b027b1f2d3478b7a394193bb06ba993a80a0a9c9ee8fec4c7067b4d07f42277c5d7485723581e6350f95105360b09da0872aed8a7745e7989d30e7010cae9f3cf9fbed0cd2a7660667673d040df372e0c1afa2f11241370265092af821c8b48f2b6f6bcc44b1f65b81bdb10f4a155", @typed={0x8, 0x29, 0x0, 0x0, @ipv4=@multicast2}]}, 0x104}, {&(0x7f0000000900)={0x68, 0x39, 0xa, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x6f, 0x0, 0x0, @pid}, @generic="0f89e4ba0c85ad80e279711a73ca4bb22053c20e3b54147b68d8d673b4859e9d6311780ef2", @generic="f9460c3879d02186b011dff9beca782e2a253cf04a35fc1fbbd8cf1646aeb9f9829b5c05168869865e"]}, 0x68}, {&(0x7f00000009c0)={0x6c, 0x16, 0x100, 0x70bd2b, 0x25dfdbfb, "", [@generic="0bfd2a01c87eaf481df3e496d82a1a85f35873d93754092e0176df53e75771590cebfb4f37aaab53b0cf62c32d732f9bac3b807bc478f76fe590145ddfed343d5fb350998a5ebcb0e9af06af49107b4f743205154ec6d3f247"]}, 0x6c}, {&(0x7f0000000ec0)={0x34, 0x27, 0x2, 0x70bd25, 0x25dfdbfd, "", [@typed={0xc, 0x89, 0x0, 0x0, @u64=0x200}, @typed={0x4, 0x1f}, @typed={0x14, 0x17, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}]}, 0x34}, {&(0x7f0000001600)={0x10c, 0x2e, 0x400, 0x70bd29, 0x25dfdbfd, "", [@generic, @typed={0x8, 0x33, 0x0, 0x0, @pid}, @generic="655c949b72a5c4b255a9e27188dbbfa96b145be4a9712573ba03a8b0a84a9ef486a008269cb7bec6092931012f33a992f5b1656a28df59704f81b1a8f5851bf5b41d9214ff6f6eb36676a3f85cddb2a839511958a7d5adb043343e179000352de3d70992e6f4c5d7860b48b0bcfad310289ea3945d53faee", @generic="441384d65fa839e7aff16668bf410f8621852d481783f4d7c2aabb33545eb51f77a06871279a4560860feea8b2a4187db0562e0e3d200e2570fed5cdf68f994c5ad6d5b98352cfab25a4c943db6f42b4d077ab45546af5bb352ab43fe92097ebbe238b0d", @nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x32, 0x0, 0x0, @str='{}0($(&,\']$%}#^\x00'}]}]}, 0x10c}], 0x5, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x20, 0x22000000}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24044885}, 0x20004004) r5 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r5, 0x0) preadv(r5, &(0x7f0000000280), 0x18, 0xd9f, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x7f, 0x0, 0x5, 0x0, 0x0, 0x2, 0xbb028, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000140), 0x4}, 0x2000, 0x4, 0xfffffffb, 0x6, 0x3, 0x5, 0x4, 0x0, 0xfffffffd, 0x0, 0xc7}, 0x0, 0xffffffffffffffff, r5, 0x1) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff8c}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x300) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1b3ae8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x5, 0x100000) r1 = epoll_create1(0x80000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r2 = syz_open_dev$vcsa(&(0x7f0000000080), 0x9, 0x4000) lseek(r2, 0x9, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000100)={0x80000000}) r3 = eventfd(0x7) ftruncate(r3, 0x6) set_mempolicy(0x1, &(0x7f0000000000)=0x5, 0x6) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffcc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r0, 0xf502, 0x0) set_mempolicy(0x2, &(0x7f0000000000), 0x1fd) set_mempolicy(0x8000, &(0x7f0000000040)=0x5, 0xfffe000000000000) readv(0xffffffffffffffff, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) bind(0xffffffffffffffff, &(0x7f0000000100)=@llc={0x1a, 0x307, 0x1, 0x8, 0x5, 0x6f}, 0x80) clock_gettime(0x0, &(0x7f0000001ac0)={0x0, 0x0}) recvmmsg(0xffffffffffffffff, &(0x7f0000001a00)=[{{&(0x7f0000000180)=@nfc, 0x80, &(0x7f0000000080)=[{&(0x7f0000000200)=""/131, 0x83}, {&(0x7f00000002c0)=""/162, 0xa2}, {&(0x7f0000000000)=""/35, 0x23}], 0x3, &(0x7f0000000380)=""/210, 0xd2}, 0x6}, {{&(0x7f0000000480)=@nfc_llcp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000500)=""/79, 0x4f}, {&(0x7f0000000580)=""/111, 0x6f}, {&(0x7f0000000600)=""/129, 0x81}], 0x3, &(0x7f0000000700)=""/65, 0x41}, 0xea0}, {{&(0x7f0000000780)=@ax25={{0x3, @null}, [@bcast, @remote, @bcast, @null, @null, @bcast, @default, @rose]}, 0x80, &(0x7f00000009c0)=[{&(0x7f0000000800)=""/234, 0xea}, {&(0x7f0000000900)=""/140, 0x8c}], 0x2, &(0x7f0000000a00)=""/4096, 0x1000}}], 0x3, 0x20, &(0x7f0000001b00)={r0, r1+10000000}) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r2, 0x4, 0xf6f01cc533963cf9) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x60, 0x0, 0x10, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x3c}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e20}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e22}, @FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_TYPE={0x5}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e23}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000800) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffef}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000000)=0x7, 0x280) unshare(0x40000200) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) fcntl$addseals(r0, 0x409, 0xa) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0xa040) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffff6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x4000, &(0x7f0000000000)=0x4, 0x7) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000440)=ANY=[@ANYBLOB="e80100b31559c198839cc2fb9f5d3ee8cabcd89b7ab5c4d321a43bb2888559556bf0486b11a92f798b47d8c5bebadc8677481dde510f27ff13d8e517ff610c027c5d23c24fa5d07158c05de8940ebd06d6d0f43e9ab937e20eca52680ce551a7dac0caa8c19c060501a61ff12fdd595284d8d4c08832432f5027ea6e65e2f0adb64790636db47c979a82f381f81c3f670da1798f4af26532e6cb08a86821cb3b8a368d4270355983d77c19a74ce4984d6c8200"/191, @ANYRES16=r1, @ANYBLOB="000228bd7000fbdbdf253a0000000c009900460400004e000000c8005b00eb7e2c518eb420f598ffb73452ffb084cda4b138b6291f85b140f2cfac55a1c1694a5f10fe70fac4db883991bbcede11c0c29f4cd097475556d39a247c7f5529fef172d50e6077c9cf0f3459b367ccd29d3b1e139a9999c79aa636a0320b17a22c0f835fb8dd7b4e52430fc263f202177979a678e2cb903dc6f5bca4ee468d2688662d35a02d04d1c3608fd9bb4bd25f588b559f79e41d622cc49e4fe95a8a1e260b144730be808c67524120b8f8b0d1493d34a51de90898db189da9287b715867dd8f64fe005b00ac5ccff6c4e0feabdd32b06e32f4bbb2e642d0aae3864d3d8821eafe5ceda843404cf18360c2ed1f1752a75b0574ab9c9565b864d530d226f06c3a9eaa94cc9290e1a3b2a07374c0063c49fd06cc0ea5ef41b9002ab9e68d4c52881e5887d330b39a4c8181a9b11b9c57f31892ca51a19722a618622a87eac665ddef53a081c65d39d012e57511482b82c2193152b0d79352f756f225f689e5dce57cf4defe603003b0c26e89617733d3348b4c6235d32621cea487cec420e3e44f442c1fe7d39fbf11e3a38828b93c92ed6817bcd44fb4b9fe68edfa6e2fd59bc0bc3dd5e2061ad881aa3f7249e9c82bb357a0a975681da60c5a7bd267c70c520000"], 0x1e8}, 0x1, 0x0, 0x0, 0x80}, 0x0) set_mempolicy(0x8000, &(0x7f00000001c0)=0x3fe0000000000, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) set_mempolicy(0x4000, &(0x7f0000000080)=0x7, 0xfffffffffffffffa) set_mempolicy(0x2, &(0x7f0000000180)=0x3f, 0x3) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x8000, &(0x7f0000000080)=0xffffffffffffffe0, 0xffffffffffffffff) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x7) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @link_local}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfffffffe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) preadv(r0, &(0x7f0000000700)=[{&(0x7f0000000000)=""/40, 0x28}, {&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000300)=""/222, 0xde}, {&(0x7f0000000400)=""/136, 0x88}, {&(0x7f00000004c0)=""/223, 0xdf}, {&(0x7f00000005c0)=""/108, 0x6c}, {&(0x7f0000000080)=""/57, 0x39}, {&(0x7f0000000640)=""/168, 0xa8}], 0x8, 0x7, 0x8) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000004, 0x11, 0xffffffffffffffff, 0x8000000) r1 = syz_io_uring_setup(0x2de1, &(0x7f0000000240), &(0x7f0000002000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_READ=@pass_buffer={0x16, 0xa, 0x0, @fd_index, 0x0, 0x0}, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r3, &(0x7f0000000380)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, 0xffffffffffffffff, &(0x7f00000002c0)=0x80, &(0x7f0000000300)=@caif=@dgm, 0x0, 0x81800, 0x1, {0x0, r4}}, 0x401) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd=r1, 0x0, 0x0, 0x0, {0x1}}, 0x9) r5 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000180)=0x80, 0x80800) syz_io_uring_submit(r0, r3, &(0x7f0000000240)=@IORING_OP_CONNECT={0x10, 0x2, 0x0, r5, 0x80, &(0x7f00000001c0)=@rc={0x1f, @any, 0x9}}, 0x7f) set_mempolicy(0x8000, &(0x7f0000000000)=0x7ff, 0x2) r6 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000080)=0x9, 0x1) fcntl$setstatus(r6, 0x4, 0xf6f01cc533963cf9) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x16c0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000200)=""/206, 0xce}, {&(0x7f0000000100)=""/131, 0x83}, {&(0x7f0000000300)=""/197, 0xc5}], 0x3) set_mempolicy(0x2, &(0x7f0000000000)=0x4, 0x2) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x800000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/219, 0xdb}], 0x1, 0x8000, 0x10001) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x5, 0x280) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x4010, r2, 0x3) 15:50:24 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000001000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:24 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000000)=0xffffffffffffff01, 0x8) 15:50:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0xffffffffffffffff, 0x210000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0xfff, 0x8, '\x00', 0x0, &(0x7f0000000000)=[0x0]}) r1 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r1, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) bind(r1, &(0x7f0000000140)=@x25, 0x80) creat(&(0x7f0000000100)='./file0\x00', 0x11c) 15:50:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x10000010000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:25 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x20000, 0x14, 0x10}, 0x18) ioctl$FICLONE(r1, 0x40049409, r0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x20000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x40000100000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r0) set_mempolicy(0x4000, &(0x7f0000000080)=0x200, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = signalfd4(r0, &(0x7f0000000000)={[0x3ff]}, 0x8, 0x80000) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) sendfile(r1, r2, &(0x7f0000000080)=0x1, 0x1) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x16c000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x2, 0x202000) r2 = openat$cgroup_subtree(r1, &(0x7f0000000080), 0x2, 0x0) r3 = syz_io_uring_complete(0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r5, 0x11, 0x0, 0x100007e00) ioctl$LOOP_CLR_FD(r3, 0x4c01) r6 = syz_open_dev$ttys(0xc, 0x2, 0x1) r7 = syz_open_dev$char_raw(&(0x7f0000000100), 0x0, 0x440000) ppoll(&(0x7f0000000140)=[{r2, 0x183e56f1ff5609eb}, {r4, 0x40}, {r5, 0x105}, {r6, 0x200}, {r7, 0x2}, {r0, 0x8001}], 0x6, &(0x7f0000000180)={0x77359400}, &(0x7f00000001c0)={[0x2]}, 0x8) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x300000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0x80080) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xc7, &(0x7f0000000100)="679c0003bdbe0b2da89ac5a269a7c74879ce50f77ce3b683b3064135f5a9e1e6fc3967b1bca357e14f62468825160fbcd0e262abbea20b5e5552d6a4468d477f42dea254f2219a11f7ff4047a5f27923f856a551ed6bff10ca8046f2592cb2a1289715b087917d46a2b4f7fb4b9274ef0accdf185ee7ea3cab29dd44ddf0096136c0d76067f9634b375e24ad787f4671c52fa3cf0ff7d57cf69aef3117f168edd6942248dac22f0479de17e117c5d0a25aeca2731358fa19a539747bb3708c16a90f9a8e35e30d"}) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000000)='^}\x00', 0x1) preadv(r1, &(0x7f0000000640)=[{&(0x7f0000000080)=""/60, 0x3c}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/135, 0x87}, {&(0x7f00000002c0)=""/159, 0x9f}, {&(0x7f0000000380)=""/237, 0xed}, {&(0x7f0000000480)=""/8, 0x8}, {&(0x7f00000004c0)=""/223, 0xdf}, {&(0x7f00000005c0)=""/7, 0x7}, {&(0x7f0000000600)=""/14, 0xe}], 0x9, 0x8001, 0x475c) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x500000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x1ff) set_mempolicy(0x3, &(0x7f0000000040)=0xfbfffffffffffffc, 0x8000) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) clone3(&(0x7f0000000500)={0x200100, &(0x7f00000002c0)=0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340), {0xa}, &(0x7f0000000380)=""/180, 0xb4, &(0x7f0000000440)=""/126, &(0x7f00000004c0)=[0x0, 0x0, 0xffffffffffffffff], 0x3}, 0x58) finit_module(r1, &(0x7f0000000580)='\x00', 0x1) sendmsg(r0, &(0x7f0000000280)={&(0x7f0000000100)=@phonet={0x23, 0xc9, 0x6, 0x1f}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="bcbd437e95e9e9ac1d37b533a1b9dedbf12564934fb8ddd78a395ab445ed1bcdac5c2b96040358c35b535c0db545d21ca2cafb39cb9d6ba9779350472f730ed496d728a24b542be8566004f57b448c6dd2166d4d6af9b8d903d1bb948b3d8298d193b797fe93acdd83", 0x69}, {&(0x7f0000000200)="47c1773b0c891628a756b540ed5caff5ef759caa857c607e0566fdac67934577d8710381e1b66691e28ea276cf76564e892e8d6a4abfd8d76ac4a7bb8a1224fb681ca5c5b2219b73dc3249a99fe9b156d979b7c4f60b", 0x56}], 0x2, &(0x7f0000000280)}, 0x40) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x600000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x100000000, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x700000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x8000, &(0x7f0000000100)=0x2, 0x3) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x1, 0x20200) set_mempolicy(0x0, &(0x7f0000000300)=0x40, 0x7) socket$inet(0x2, 0x5, 0x1ff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0), r1) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="67b400000000000000000700000014000200fe8000000000000000000000000000aa085e000400000000001400030000000000000000000000ffffac1414"], 0x44}}, 0x0) set_mempolicy(0x0, &(0x7f0000000140)=0x3, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xb0, 0x0, 0x100, 0x70bd2b, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_DOI={0x8}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x44, 0x4, 0x0, 0x1, [{0x5, 0x3, 0xaf526c954b2a85a3}, {0x5}, {0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0xffffffffffffffff}, @NLBL_CIPSOV4_A_MLSLVLLST={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xed}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x60}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0xf21a8ff}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x5f6fe366}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x9a}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xf9}]}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x24000851}, 0x40000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r4 = socket$packet(0x11, 0x2, 0x300) ioctl$BTRFS_IOC_INO_PATHS(r4, 0xc0389423, &(0x7f0000000080)={0x9, 0x8, [0x4, 0x1, 0x5034], &(0x7f0000000000)=[0x0]}) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1067.448073][T16571] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 15:50:26 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x900000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000080)={0x50000000}) [ 1067.495446][T16577] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. 15:50:26 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xa00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:26 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000080)={0xfffffffa, 0x0, &(0x7f0000000000)=[0xffffffffffffffff]}, 0x1) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) readv(r1, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/216, 0xd8}], 0x2) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, &(0x7f0000000080)) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) flistxattr(r0, &(0x7f0000000100)=""/4096, 0x1000) set_mempolicy(0x0, &(0x7f00000011c0)=0x100000001, 0x80) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = dup2(r1, r1) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_WIPHY={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000001180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001140)={&(0x7f0000001100)={0x28, r2, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x9, 0x1b}}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x200000c0}, 0x4008801) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xd00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) dup2(r0, r1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) recvfrom$inet(r1, &(0x7f0000000100)=""/113, 0x71, 0x12001, 0x0, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) fstat(r1, &(0x7f0000000100)) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r2 = fcntl$dupfd(r0, 0x406, r0) sync_file_range(r2, 0x11, 0x9, 0x2) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x8000, &(0x7f0000000040)=0x5, 0x1ff) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) fcntl$setstatus(r0, 0x4, 0xf6f01cc5339270f9) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1100000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x2, &(0x7f0000000000)=0x1, 0x3) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x4000, &(0x7f0000000080)=0x2b, 0x9) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x1200000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='cpuset\x00') r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r2, 0x2, 0x70bd26, 0x25dfdbfc, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x7}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x8}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x40) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x4c010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2700000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 3: r0 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r0, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000000)={'filter\x00', 0x7, "9b3fec9b74ca2f"}, &(0x7f0000000080)=0x2b) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x3f00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4a01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:27 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) ftruncate(r0, 0xfffffffffffffcc1) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = syz_open_dev$vcsn(&(0x7f0000000080), 0x1d, 0x200000) ioctl$MON_IOCX_GET(r1, 0x40189206, &(0x7f0000000100)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000140)=""/2, 0x2}) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4c00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x2, &(0x7f0000000240)=0x2a4, 0x10000) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) dup3(r0, r0, 0x80000) pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0xf2, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) ppoll(&(0x7f0000000200)=[{0xffffffffffffffff, 0x3041}, {r0, 0x20b}, {0xffffffffffffffff, 0x1002}, {r0, 0x4608}, {r0, 0x8220}, {r1, 0x502b}], 0x6, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140)={[0x7]}, 0x8) set_mempolicy(0x4000, &(0x7f0000000180)=0x6, 0xb42) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) dup(r2) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6800000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6c00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = signalfd4(r0, &(0x7f0000000100)={[0x1c00000000000]}, 0x8, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r4 = dup2(r2, r2) sendmsg$NL80211_CMD_GET_REG(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c400030", @ANYRES16=r3, @ANYBLOB="010000000000000000001f0000000800010000000000"], 0x1c}}, 0x0) set_mempolicy(0x4000, &(0x7f0000001400)=0x5f1, 0x80000000) set_mempolicy(0x0, &(0x7f00000013c0)=0x2, 0x9) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) clone3(&(0x7f00000016c0)={0x90004000, &(0x7f0000001440)=0xffffffffffffffff, &(0x7f0000001480), &(0x7f00000014c0), {0x7}, &(0x7f0000001500)=""/150, 0x96, &(0x7f00000015c0)=""/154, &(0x7f0000001680)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0], 0xa, {r4}}, 0x58) r7 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r7, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r7) sendfile(r6, r7, &(0x7f0000001740)=0x7fffffff, 0x22) sendmsg$NL80211_CMD_UPDATE_OWE_INFO(r1, &(0x7f0000001380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000001340)={&(0x7f00000001c0)={0x1178, r3, 0x20, 0x70bd2b, 0x25dfdbff, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x47}, @NL80211_ATTR_IE={0x95, 0x2a, [@fast_bss_trans={0x37, 0x7b, {0x5, 0x1, "c07f642fc5e124508bece9a34a36d8d2", "53bebc013bb77733e83d6b505f7c30a2b77835413684e9e67c3b617c2fdf62ed", "647f0a1d85981ed742279dec89f6024bbd95773b14118d20101c0bf8811f12fb", [{0x2, 0x27, "2d77e1e6536d2936efd4ec8fc595b9828ac69de669de384a5f4675fb7ab8a6848f3bad737769a0"}]}}, @link_id={0x65, 0x12, {@random="d977257ae61a", @broadcast, @device_b}}]}, @NL80211_ATTR_IE={0x1039, 0x2a, [@cf={0x4, 0x6, {0x3, 0x1, 0x6, 0x7}}, @rann={0x7e, 0x15, {{0x1, 0x3}, 0xff, 0x5f, @device_a, 0x7a7cd558, 0x4a1a, 0x40}}, @erp={0x2a, 0x1, {0x1, 0x1}}, @measure_req={0x26, 0x1003, {0x0, 0x5, 0x8, "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"}}, @ssid={0x0, 0x6, @default_ap_ssid}, @dsss={0x3, 0x1, 0xad}, @erp={0x2a, 0x1, {0x1, 0x0, 0x1}}]}, @NL80211_ATTR_IE={0x59, 0x2a, [@erp={0x2a, 0x1}, @ssid={0x0, 0x6, @default_ap_ssid}, @preq={0x82, 0x25, @not_ext={{0x0, 0x1, 0x1}, 0xb1, 0x81, 0x22, @device_a, 0x1, "", 0x1, 0x9, 0x1, [{{0x0, 0x0, 0x1}, @broadcast, 0x27d1dc9}]}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0x28, 0x7, 0x2}}, @link_id={0x65, 0x12, {@random="1a45052d25a6", @device_a, @broadcast}}, @mesh_config={0x71, 0x7, {0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, 0xffffffffffffffff, 0xff, 0x20}}]}, @NL80211_ATTR_MAC={0xa}]}, 0x1178}, 0x1, 0x0, 0x0, 0x24000840}, 0x4000040) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) copy_file_range(r0, &(0x7f0000000000)=0x986, r0, &(0x7f0000000080), 0x8, 0x0) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x92020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7a00000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb2020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xb4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8cffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r0, 0x11, 0x0, 0x100007e00) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:28 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9202000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:28 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 3: set_mempolicy(0x0, &(0x7f0000000040)=0x2, 0x5ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x20002) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ioctl$BTRFS_IOC_GET_FEATURES(r1, 0x80189439, &(0x7f0000000000)) 15:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x80ffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xe83a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb401000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x2, &(0x7f0000000000)=0x8, 0x80) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xb402000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 3: set_mempolicy(0x8000, &(0x7f0000000000)=0x5, 0x202) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xefffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xccffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) memfd_create(&(0x7f0000000000)='[%\x00', 0x3) fcntl$setstatus(r0, 0x4, 0x400) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) fcntl$setstatus(r1, 0x4, 0x0) 15:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xe83a1b0000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, &(0x7f0000000040)=0x1c) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000080)=0x1, 0x4) r2 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) fcntl$setstatus(r2, 0x4, 0xce7fc1b874b04bf7) sendmmsg(r2, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) r3 = socket$inet6(0xa, 0x80003, 0x7) connect$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x3fffffffffffe9f, 0x0) recvmmsg(r3, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001200)={@private2={0xfc, 0x2, '\x00', 0x1}, 0x1e}) accept(r1, 0x0, &(0x7f00000011c0)) setsockopt$sock_int(r0, 0x1, 0x7, &(0x7f0000000180)=0x8, 0x4) recvmmsg(r2, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x82, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE(r2, 0x5000940e, &(0x7f00000001c0)={{r1}, "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"}) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000100)={@private1}, &(0x7f0000000140)=0x14) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xefffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xf6ffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:29 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x20000d57, 0x639440) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) bind$unix(r1, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0x6e) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) set_mempolicy(0x3, &(0x7f0000000000)=0x4, 0xffff) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xff010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xfeffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x80001ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff01000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x80080, 0x0) r2 = timerfd_create(0x5, 0x800) sendfile(r1, r2, &(0x7f0000000080)=0x4f, 0x20) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xff07000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x8000, &(0x7f0000000080)=0x6, 0x8) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x8, 0x6) set_mempolicy(0x2, &(0x7f0000000100)=0x2, 0x2) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffff7f00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf6f01cc533963cf9) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x4180, 0x0) fchmod(r0, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffff00000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x2, &(0x7f0000000000)=0x200, 0x2) r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x35f7, 0x29e383) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffffffffffef}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x400180) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xffffffffffffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x4000, &(0x7f0000000000)=0x4, 0x15e) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x3, &(0x7f0000000080)=0x5, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x141) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:30 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x18, 0x3f9, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x40800}, 0x4000000) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f0000000540)=@proc={0x10, 0x0, 0x25dfdbfc, 0x80000}, 0xc, &(0x7f0000001200)=[{&(0x7f00000007c0)={0x104, 0x39, 0x2, 0x70bd25, 0x25dfdbfb, "", [@nested={0x65, 0x29, 0x0, 0x1, [@typed={0xc, 0x66, 0x0, 0x0, @u64=0x698}, @typed={0x8, 0x56, 0x0, 0x0, @ipv4=@private=0xa010100}, @generic="db84a4f72b0ec07b6ad3051344d1cfb1a941667c06dee54fb5e62bca47364eb5e2d4048066a666443f18f2b5671d2feacc9d11adff1f5dfb314618b150f9678ee7c0d7a7e8", @typed={0x8, 0x1e, 0x0, 0x0, @fd}]}, @generic="1d86478120cf23efaf508df0411aa2a4d5532b027b1f2d3478b7a394193bb06ba993a80a0a9c9ee8fec4c7067b4d07f42277c5d7485723581e6350f95105360b09da0872aed8a7745e7989d30e7010cae9f3cf9fbed0cd2a7660667673d040df372e0c1afa2f11241370265092af821c8b48f2b6f6bcc44b1f65b81bdb10f4a155", @typed={0x8, 0x29, 0x0, 0x0, @ipv4=@multicast2}]}, 0x104}, {&(0x7f0000000900)={0x48, 0x39, 0xa, 0x70bd2c, 0x25dfdbff, "", [@typed={0x8, 0x6f, 0x0, 0x0, @pid}, @generic="0f89e4ba0c85ad80e279711a73ca4bb22053c20e3b54147b68d8d673b4859e9d6311780ef2", @typed={0x8, 0x80, 0x0, 0x0, @pid=r1}]}, 0x48}, {&(0x7f00000009c0)={0x6c, 0x16, 0x100, 0x70bd2b, 0x25dfdbfb, "", [@generic="0bfd2a01c87eaf481df3e496d82a1a85f35873d93754092e0176df53e75771590cebfb4f37aaab53b0cf62c32d732f9bac3b807bc478f76fe590145ddfed343d5fb350998a5ebcb0e9af06af49107b4f743205154ec6d3f247"]}, 0x6c}, {&(0x7f0000000ec0)={0x34, 0x27, 0x2, 0x70bd25, 0x25dfdbfd, "", [@typed={0xc, 0x89, 0x0, 0x0, @u64=0x200}, @typed={0x4, 0x1f}, @typed={0x14, 0x17, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00'}]}, 0x34}, {&(0x7f0000001600)={0x10c, 0x2e, 0x400, 0x70bd29, 0x25dfdbfd, "", [@generic, @typed={0x8, 0x33, 0x0, 0x0, @pid}, @generic="655c949b72a5c4b255a9e27188dbbfa96b145be4a9712573ba03a8b0a84a9ef486a008269cb7bec6092931012f33a992f5b1656a28df59704f81b1a8f5851bf5b41d9214ff6f6eb36676a3f85cddb2a839511958a7d5adb043343e179000352de3d70992e6f4c5d7860b48b0bcfad310289ea3945d53faee", @generic="441384d65fa839e7aff16668bf410f8621852d481783f4d7c2aabb33545eb51f77a06871279a4560860feea8b2a4187db0562e0e3d200e2570fed5cdf68f994c5ad6d5b98352cfab25a4c943db6f42b4d077ab45546af5bb352ab43fe92097ebbe238b0d", @nested={0x18, 0x0, 0x0, 0x1, [@typed={0x14, 0x32, 0x0, 0x0, @str='{}0($(&,\']$%}#^\x00'}]}]}, 0x10c}], 0x5, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}], 0x20, 0x22000000}, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001300)=0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001340), 0x101000, 0x0) r6 = getpid() ptrace(0x10, r6) ptrace$getregset(0x4205, r6, 0x202, &(0x7f0000000400)={0x0}) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getpeername(r0, &(0x7f0000001700)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000001780)=0x80) r9 = openat$cgroup_type(r0, &(0x7f00000017c0), 0x2, 0x0) r10 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000001800), 0x2, 0x0) r11 = perf_event_open(&(0x7f0000001880)={0x4, 0x80, 0x0, 0x8, 0x1, 0x0, 0x0, 0x2, 0x2000, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, @perf_bp={&(0x7f0000001840)}, 0x44008, 0x5, 0x1, 0x4, 0x3, 0x3, 0x8ad, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0xb, 0xffffffffffffffff, 0x0) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r13 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r13, 0x11, 0x0, 0x100007e00) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000019c0)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000080)=[{&(0x7f0000000180)="186d5f98b3c7a477ceabdb07b889230b507190dedd52956a7ca6c8c8c669fa43b156e0c5e3f241ec8ef3c6765e9312a1882ec7963892d45411376e68f13097edce3dee7a8169a242e9efe743b9c525b12b1ef700b3e325e464a95a5a4319e7ebbdb209cb07d89a17", 0x68}, {&(0x7f0000000200)="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", 0x1000}], 0x2, &(0x7f0000001440)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff}}}, @rights={{0x1c, 0x1, 0x1, [r5, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee01, r7}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0xc0, 0x4008000}, {&(0x7f0000001500)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000016c0)=[{&(0x7f0000001580)="90586856d68e64ecb00bacd179c1007d98fbf9e8d115f621665e2ba670680d2aba9ced16088379af07", 0x29}, {&(0x7f00000015c0)="beae108aa9cc27e03d974381f0deee96664a724d7c00c546185b96e8870d3250db824ab3d23915513258e462e1a359b08e2bb7b15d17e6a5cea800ad624ecadbb499694f59e775b3c8a4f961cc13af2eabc4bb78be864c334f1d369ce713785d6623f5025ab2b272f065c53db877a67761a1cd8a2c26b1eb32fc09b9700e0a0cbf1af1cb2d3dcb8efe3f3a8fe411dadc729a782dc09ad03bf93674dd26024930825f021a57bb68f828086358ded8aa24", 0xb0}, {&(0x7f0000001680)="a3fe59ba6c05c4d55878f9e810eb95f985f644c4b77c", 0x16}], 0x3, &(0x7f0000001900)=[@rights={{0x20, 0x1, 0x1, [r0, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x2c, 0x1, 0x1, [r0, r8, r0, r0, r9, r10, r11]}}, @rights={{0x30, 0x1, 0x1, [r0, r12, r0, r13, r0, r0, r0, r0]}}], 0xa0, 0x4000}], 0x2, 0x8810) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0xc000, &(0x7f0000000080)=0x7fff, 0x6) ioctl$int_out(r0, 0x5460, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x85}, 0x1) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x5, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) vmsplice(r2, &(0x7f0000000240)=[{&(0x7f0000000340)="a53c6f601d9664a3cc01a0a9f03490976b248aabedcd49d7c53fea7538023f534e457d35eeac950fc69a72875fa47dc656b93a81f9a2d45966d51b8f34fe6c809be42e2e74ca34c8a254e7512a19b7207b6d1a3225827849e2ac586ce35527484f44610e5bbbbc2d709675dbf531d6e1a8b4067c5b21c7a02846482e3b10838c5191cafc7854cb6c7a317c9308bb815ab88c464a169aa0a7d83ad5a8cee877d1f8b962441cac12ae55d85d15a40ae45fe0ee28ecd1391aab015b4582fea4c3cf655d2f37ffd6e36d186ac3ab3e7d9a2030fd154c3c6f3604f2c7cab46380cbeb527635fac4f8234e56ba", 0xea}, {&(0x7f0000000200)="a57274eae798b7b28b9eba39387a41aa3b40bf7f176c635e5b8fb32b0c93088bda990a3138c4935f9148", 0x2a}, {&(0x7f0000000440)="523fda3938525691a0f47dd0f17cf74028c65454360ef1db091783becc3d11514e4341b3b7b9cc9d019e7badf759d40f1c4637e9885b5c09279148acc1d6b0b2f8c392e5c82230de095ba74291921117da1463f5e73355ea1ad1445ed4526a7a7fac80f5a17c4f51e7d79be626b0084932aae7e10e87a5bd942c86020dac376e241253588853ed8955ad96ee946c814c2715b0eb310aa527", 0x98}, {&(0x7f0000000500)="9afdb0b8f73980d419daae3420e59faffa9125f79a68dc89c5b105993475ec2b1b968487e6f3369aaf9b36c2590257a154685086cc1c26ca5c24ea3bb8addb7056cb4767283ec6ae045f36d0b28d83517ca1679407798eae32f1aa4d6d82e7f1a37cf5517d4beb", 0x67}], 0x4, 0xc) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="05082dbd7000ffdbdf25030000100800020001000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8001}, 0x4000810) sendfile(r1, r0, &(0x7f0000000000), 0x6) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x5, 0x9) fcntl$setstatus(r0, 0x4, 0xf6f01cc5339614f9) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) close(r1) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) ftruncate(r2, 0xd960) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000003, 0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0x6221, 0x800) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0xff, 0x4) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x3, &(0x7f0000000100)=0x6, 0x2) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000180)) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x9e55e7c0010aec9, &(0x7f0000000000)=0x1, 0x3) fcntl$dupfd(r1, 0x406, r1) set_mempolicy(0x3, &(0x7f0000000140)=0xff, 0x7) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000001c0)=0x0) syz_open_procfs(r2, &(0x7f0000000200)='net/ip_mr_cache\x00') fcntl$setstatus(r1, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x2, &(0x7f0000000080)=0x6, 0x1) set_mempolicy(0x0, &(0x7f0000000000)=0x8, 0x40) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x8000, 0x6, &(0x7f00000005c0)=[{&(0x7f0000000180)="73bed096971ecab77953c1320118fd3e2fa314f86808965327b592ca6a75d0b9daa429fb5d7bb74425d9e2a1c0efbe122e7d663da76c6fb4b077401ba6d77ad047ef08e90714ab005b85a0986f2311dd21e7191d0d9c0a2408656a6430154fb3829e06a2", 0x64, 0x4}, {&(0x7f0000000200)="5b637d5ecac82bcd4372da9c5e90ef906d8d0d819cce420f40d6ba5a26f21a1828b3c20f61391a11b3a2ecdac66f26e751f4b92279303b49266f8a1dd74b349cf73d338cb770f8d7f8894ca71e81b640cb06b52a8e0256594f2df25a43bbedf215c9ff79a26e4ea21ec1295c7f2406bab8c4bce11db95ea0bc8a7e4ecaf63434c6836e6174054279466d63f7a7d5060657e19f8abe74b1c60dd2c29e2271861d8e372cf2d713", 0xa6, 0x3}, {&(0x7f00000002c0)="e4d1f61f6a0c0fd1e9ba009912849a1b08b0f748a458e20392549d499573619ae4ffac8c7b7ccda0ff4fdd251046e4bbae1ad7e32b43af433874db65f58aa99d7230112ce719ac33614377bdafe16afe632190562e8abb762623d1367abb0c1d44816e77c746bf7c99434b7e5ed47affb10830b349757d2577141d58e8e8c7349a6468e6dc667e40ad4d0ec934c7901342d28669506f3879e1583dfd7b1b9eed9dc36ab09a7d88d8116bc5d3e65b34dea02b601669aad000a60907f3872dfc0eb3f48ab51183ad2d2d31e52dd68451ff50da1505971304d60e34e8fbfbd7477fb0c90eddd0df9de8b4d50468461f74209ba632770fa5", 0xf6, 0xffffffffffffffff}, {&(0x7f00000003c0)="5294eb2ec476d388f8848166c92cd4d08163fb13d444b93dfa9f28258a22676fe0bfddcf60dd46d5040b0cf1af9939a0d6e2d3d5e43c8d790f5c47ba9b9712b91191774462f1bb4aa82201090a7383c04222f034631244e557dcd7753be0c6453592b3f5ebfbccfe44961b4f1e2fb132ff32", 0x72, 0x1}, {&(0x7f0000000440)="edfa0081f2eacd882a77f223d78bc445c41580fd256c94e923ba3afdd70aed44a027c76b1c663feb9879ac37b67ea023ba18e7fa2c3a61191b9a431fcd2df8475004dfaf37ae82bac4cd3198ed23ea469f42b649ddade154ee", 0x59}, {&(0x7f00000004c0)="e6483fe58819b14ac026382b09beba8d3511585b588518ae92b44cc14c115c960de08cce8db4ee3df6d7dc72392d3a3336f2af5a3d2c06b60e82dd438e764d2a67d223858b553150a66ab5cb99019a5bb4fec8e115a0b63ad7f41295e44ba84a0a4d86371cfc3147ace9d92dc6dc1738830e0ec86d5ab1dc821795d3991ead21bb1e83f92351e6b726f3e653cd1f54b64197d80f4e6460613e42ab3e9053ae01d7ebb898b4a213cde432a3b49eaa3426583dd7259239ce8836444ed54e1a3a077d38f1e5f3af16315b53cb66e5f1b721a5e39e841bfdd13e4fba090365413a1649dde91e75", 0xe5, 0xffffffffffffffe1}], 0x800, &(0x7f0000000680)={[{@dioread_nolock}, {@dioread_nolock}, {@jqfmt_vfsv1}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x8}}], [{@dont_measure}, {@subj_role={'subj_role', 0x3d, '/dev/vcs#\x00'}}]}) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, 0x1010, r1, 0x108cd000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:31 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) gettid() r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x48702) syz_open_dev$sg(&(0x7f0000000000), 0xcbf6, 0x10000) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000000)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) dup2(r0, r1) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x8, 0x24400) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x68) r2 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) ftruncate(0xffffffffffffffff, 0xffff) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x7fffffff, 0x5a70c1) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = pidfd_open(0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="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"], 0xd2) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x9) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) open(&(0x7f0000000000)='./file0\x00', 0x400001, 0x2) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) fcntl$notify(r1, 0x402, 0x4) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x2, &(0x7f0000000000)=0x4da, 0x4) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533963cf9) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) ftruncate(r1, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x3, &(0x7f0000000000)=0x400, 0x2) set_mempolicy(0x3, &(0x7f0000000080)=0x8, 0x4) syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) set_mempolicy(0x3, &(0x7f0000000100), 0x2) r0 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) fcntl$setstatus(r0, 0x4, 0xf6f01cc533920cf9) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffff8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:32 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 3 (fault-call:2 fault-nth:0): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1073.683085][T17552] FAULT_INJECTION: forcing a failure. [ 1073.683085][T17552] name failslab, interval 1, probability 0, space 0, times 0 [ 1073.695930][T17552] CPU: 0 PID: 17552 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1073.705823][T17552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.716225][T17552] Call Trace: [ 1073.719595][T17552] dump_stack+0x137/0x19d [ 1073.723937][T17552] should_fail+0x23c/0x250 [ 1073.728389][T17552] ? mon_bin_ioctl+0x3cb/0x8b0 15:50:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1073.733172][T17552] __should_failslab+0x81/0x90 [ 1073.738046][T17552] should_failslab+0x5/0x20 [ 1073.742566][T17552] __kmalloc+0x66/0x340 [ 1073.746735][T17552] ? selinux_file_ioctl+0x8e0/0x970 [ 1073.751955][T17552] ? mon_bin_poll+0xd0/0xd0 [ 1073.756932][T17552] mon_bin_ioctl+0x3cb/0x8b0 [ 1073.761694][T17552] ? mon_bin_poll+0xd0/0xd0 [ 1073.766422][T17552] __se_sys_ioctl+0xcb/0x140 [ 1073.771043][T17552] __x64_sys_ioctl+0x3f/0x50 [ 1073.775649][T17552] do_syscall_64+0x4a/0x90 [ 1073.780080][T17552] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1073.786148][T17552] RIP: 0033:0x4665f9 [ 1073.790083][T17552] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1073.810117][T17552] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1073.818688][T17552] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1073.826700][T17552] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1073.835034][T17552] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1073.843067][T17552] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1073.851049][T17552] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:33 executing program 3 (fault-call:2 fault-nth:1): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1073.926025][T17573] FAULT_INJECTION: forcing a failure. [ 1073.926025][T17573] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1073.940110][T17573] CPU: 0 PID: 17573 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1073.950032][T17573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1073.960180][T17573] Call Trace: [ 1073.963469][T17573] dump_stack+0x137/0x19d [ 1073.968091][T17573] should_fail+0x23c/0x250 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1073.973542][T17573] __alloc_pages+0xe7/0x310 [ 1073.978653][T17573] alloc_pages+0x21d/0x310 [ 1073.983566][T17573] get_zeroed_page+0x13/0x40 [ 1073.988290][T17573] mon_bin_ioctl+0x40a/0x8b0 [ 1073.993076][T17573] ? mon_bin_poll+0xd0/0xd0 [ 1073.998901][T17573] __se_sys_ioctl+0xcb/0x140 15:50:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.020212][T17573] __x64_sys_ioctl+0x3f/0x50 [ 1074.030212][T17573] do_syscall_64+0x4a/0x90 [ 1074.034811][T17573] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1074.041059][T17573] RIP: 0033:0x4665f9 [ 1074.047064][T17573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.067876][T17573] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.077735][T17573] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1074.086305][T17573] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1074.096060][T17573] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1074.104394][T17573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1074.114214][T17573] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 3 (fault-call:2 fault-nth:2): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x16c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.243705][T17604] FAULT_INJECTION: forcing a failure. [ 1074.243705][T17604] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1074.259265][T17604] CPU: 0 PID: 17604 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1074.269575][T17604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.279724][T17604] Call Trace: [ 1074.283202][T17604] dump_stack+0x137/0x19d [ 1074.287556][T17604] should_fail+0x23c/0x250 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.292075][T17604] __alloc_pages+0xe7/0x310 [ 1074.296774][T17604] alloc_pages+0x21d/0x310 [ 1074.301290][T17604] get_zeroed_page+0x13/0x40 [ 1074.305931][T17604] mon_bin_ioctl+0x40a/0x8b0 [ 1074.311207][T17604] ? mon_bin_poll+0xd0/0xd0 [ 1074.315829][T17604] __se_sys_ioctl+0xcb/0x140 [ 1074.331384][T17604] __x64_sys_ioctl+0x3f/0x50 [ 1074.336020][T17604] do_syscall_64+0x4a/0x90 [ 1074.340652][T17604] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1074.346858][T17604] RIP: 0033:0x4665f9 [ 1074.351049][T17604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.374035][T17604] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.383271][T17604] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.391515][T17604] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1074.399888][T17604] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1074.408085][T17604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1074.416334][T17604] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x292}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:33 executing program 3 (fault-call:2 fault-nth:3): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.550357][T17635] FAULT_INJECTION: forcing a failure. [ 1074.550357][T17635] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1074.563620][T17635] CPU: 0 PID: 17635 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1074.574377][T17635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.584535][T17635] Call Trace: [ 1074.587934][T17635] dump_stack+0x137/0x19d [ 1074.592672][T17635] should_fail+0x23c/0x250 [ 1074.597104][T17635] __alloc_pages+0xe7/0x310 [ 1074.601612][T17635] alloc_pages+0x21d/0x310 [ 1074.606136][T17635] get_zeroed_page+0x13/0x40 [ 1074.610736][T17635] mon_bin_ioctl+0x40a/0x8b0 [ 1074.615420][T17635] ? mon_bin_poll+0xd0/0xd0 [ 1074.620076][T17635] __se_sys_ioctl+0xcb/0x140 [ 1074.624692][T17635] __x64_sys_ioctl+0x3f/0x50 [ 1074.629292][T17635] do_syscall_64+0x4a/0x90 [ 1074.633792][T17635] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1074.639720][T17635] RIP: 0033:0x4665f9 [ 1074.643719][T17635] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1074.663777][T17635] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1074.672196][T17635] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1074.680169][T17635] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1074.688186][T17635] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.696225][T17635] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1074.704215][T17635] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 3 (fault-call:2 fault-nth:4): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.900215][T17667] FAULT_INJECTION: forcing a failure. [ 1074.900215][T17667] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1074.914114][T17667] CPU: 0 PID: 17667 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1074.923940][T17667] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1074.934668][T17667] Call Trace: [ 1074.938071][T17667] dump_stack+0x137/0x19d [ 1074.942875][T17667] should_fail+0x23c/0x250 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1074.947307][T17667] __alloc_pages+0xe7/0x310 [ 1074.951820][T17667] alloc_pages+0x21d/0x310 [ 1074.957031][T17667] get_zeroed_page+0x13/0x40 [ 1074.962432][T17667] mon_bin_ioctl+0x40a/0x8b0 [ 1074.967201][T17667] ? mon_bin_poll+0xd0/0xd0 [ 1074.971984][T17667] __se_sys_ioctl+0xcb/0x140 [ 1074.976600][T17667] __x64_sys_ioctl+0x3f/0x50 [ 1074.982296][T17667] do_syscall_64+0x4a/0x90 [ 1074.987529][T17667] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1074.993631][T17667] RIP: 0033:0x4665f9 [ 1074.998844][T17667] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.021685][T17667] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.030133][T17667] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1075.041033][T17667] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1075.052261][T17667] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.062207][T17667] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.070410][T17667] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 3 (fault-call:2 fault-nth:5): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1075.243414][T17707] FAULT_INJECTION: forcing a failure. [ 1075.243414][T17707] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.256802][T17707] CPU: 0 PID: 17707 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1075.266795][T17707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.276961][T17707] Call Trace: [ 1075.280270][T17707] dump_stack+0x137/0x19d [ 1075.284807][T17707] should_fail+0x23c/0x250 [ 1075.289269][T17707] __alloc_pages+0xe7/0x310 [ 1075.293872][T17707] alloc_pages+0x21d/0x310 [ 1075.298932][T17707] get_zeroed_page+0x13/0x40 [ 1075.303670][T17707] mon_bin_ioctl+0x40a/0x8b0 [ 1075.308292][T17707] ? mon_bin_poll+0xd0/0xd0 [ 1075.312824][T17707] __se_sys_ioctl+0xcb/0x140 [ 1075.317597][T17707] __x64_sys_ioctl+0x3f/0x50 [ 1075.322260][T17707] do_syscall_64+0x4a/0x90 [ 1075.326735][T17707] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1075.333220][T17707] RIP: 0033:0x4665f9 [ 1075.337124][T17707] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.357119][T17707] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.366352][T17707] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1075.374716][T17707] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1075.387413][T17707] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.396111][T17707] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.404387][T17707] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:34 executing program 3 (fault-call:2 fault-nth:6): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:34 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1075.497639][T17734] FAULT_INJECTION: forcing a failure. [ 1075.497639][T17734] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.515650][T17734] CPU: 0 PID: 17734 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1075.526880][T17734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.538532][T17734] Call Trace: [ 1075.544671][T17734] dump_stack+0x137/0x19d [ 1075.549475][T17734] should_fail+0x23c/0x250 [ 1075.555004][T17734] __alloc_pages+0xe7/0x310 [ 1075.559853][T17734] alloc_pages+0x21d/0x310 [ 1075.564580][T17734] get_zeroed_page+0x13/0x40 [ 1075.569864][T17734] mon_bin_ioctl+0x40a/0x8b0 [ 1075.575118][T17734] ? mon_bin_poll+0xd0/0xd0 [ 1075.579864][T17734] __se_sys_ioctl+0xcb/0x140 [ 1075.584805][T17734] __x64_sys_ioctl+0x3f/0x50 [ 1075.591325][T17734] do_syscall_64+0x4a/0x90 [ 1075.596326][T17734] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1075.603823][T17734] RIP: 0033:0x4665f9 [ 1075.608894][T17734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.634788][T17734] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.645810][T17734] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1075.656849][T17734] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1075.669097][T17734] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.679240][T17734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 15:50:35 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 3 (fault-call:2 fault-nth:7): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1075.690045][T17734] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x14c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1075.779924][T17752] FAULT_INJECTION: forcing a failure. [ 1075.779924][T17752] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1075.793337][T17752] CPU: 1 PID: 17752 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1075.804916][T17752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.814992][T17752] Call Trace: [ 1075.818279][T17752] dump_stack+0x137/0x19d [ 1075.822640][T17752] should_fail+0x23c/0x250 [ 1075.827097][T17752] __alloc_pages+0xe7/0x310 [ 1075.831786][T17752] alloc_pages+0x21d/0x310 [ 1075.836245][T17752] get_zeroed_page+0x13/0x40 [ 1075.841028][T17752] mon_bin_ioctl+0x40a/0x8b0 [ 1075.846007][T17752] ? mon_bin_poll+0xd0/0xd0 [ 1075.851152][T17752] __se_sys_ioctl+0xcb/0x140 [ 1075.855771][T17752] __x64_sys_ioctl+0x3f/0x50 [ 1075.860666][T17752] do_syscall_64+0x4a/0x90 [ 1075.865611][T17752] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1075.871650][T17752] RIP: 0033:0x4665f9 [ 1075.875735][T17752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.897403][T17752] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1075.906423][T17752] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1075.915102][T17752] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1075.923460][T17752] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1075.932562][T17752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1075.941845][T17752] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 3 (fault-call:2 fault-nth:8): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x10000010000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x16c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.063510][T17772] FAULT_INJECTION: forcing a failure. [ 1076.063510][T17772] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.087321][T17772] CPU: 0 PID: 17772 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1076.109990][T17772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.125460][T17772] Call Trace: [ 1076.129694][T17772] dump_stack+0x137/0x19d [ 1076.135128][T17772] should_fail+0x23c/0x250 [ 1076.142131][T17772] __alloc_pages+0xe7/0x310 [ 1076.146964][T17772] alloc_pages+0x21d/0x310 [ 1076.151404][T17772] get_zeroed_page+0x13/0x40 [ 1076.156186][T17772] mon_bin_ioctl+0x40a/0x8b0 [ 1076.162204][T17772] ? mon_bin_poll+0xd0/0xd0 [ 1076.167547][T17772] __se_sys_ioctl+0xcb/0x140 [ 1076.172263][T17772] __x64_sys_ioctl+0x3f/0x50 [ 1076.177485][T17772] do_syscall_64+0x4a/0x90 [ 1076.181993][T17772] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1076.188205][T17772] RIP: 0033:0x4665f9 [ 1076.192744][T17772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.213075][T17772] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1076.221772][T17772] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1076.230550][T17772] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1076.238559][T17772] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.247379][T17772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1076.256331][T17772] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 3 (fault-call:2 fault-nth:9): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:35 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.361689][T17789] FAULT_INJECTION: forcing a failure. [ 1076.361689][T17789] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.385367][T17789] CPU: 1 PID: 17789 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1076.397828][T17789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.408700][T17789] Call Trace: [ 1076.412143][T17789] dump_stack+0x137/0x19d [ 1076.416520][T17789] should_fail+0x23c/0x250 [ 1076.421130][T17789] __alloc_pages+0xe7/0x310 [ 1076.426211][T17789] alloc_pages+0x21d/0x310 [ 1076.431087][T17789] get_zeroed_page+0x13/0x40 [ 1076.436684][T17789] mon_bin_ioctl+0x40a/0x8b0 [ 1076.442506][T17789] ? mon_bin_poll+0xd0/0xd0 [ 1076.447581][T17789] __se_sys_ioctl+0xcb/0x140 [ 1076.453917][T17789] __x64_sys_ioctl+0x3f/0x50 [ 1076.459246][T17789] do_syscall_64+0x4a/0x90 [ 1076.464963][T17789] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1076.471221][T17789] RIP: 0033:0x4665f9 [ 1076.475145][T17789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.495925][T17789] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.506872][T17789] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1076.523690][T17789] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1076.531875][T17789] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1076.541189][T17789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.549812][T17789] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x40000100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:35 executing program 3 (fault-call:2 fault-nth:10): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:35 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.668905][T17812] FAULT_INJECTION: forcing a failure. [ 1076.668905][T17812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.682542][T17812] CPU: 0 PID: 17812 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1076.692793][T17812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.703020][T17812] Call Trace: [ 1076.706644][T17812] dump_stack+0x137/0x19d [ 1076.711093][T17812] should_fail+0x23c/0x250 15:50:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x292}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.716031][T17812] __alloc_pages+0xe7/0x310 [ 1076.721232][T17812] alloc_pages+0x21d/0x310 [ 1076.725672][T17812] get_zeroed_page+0x13/0x40 [ 1076.730415][T17812] mon_bin_ioctl+0x40a/0x8b0 [ 1076.735195][T17812] ? mon_bin_poll+0xd0/0xd0 [ 1076.739831][T17812] __se_sys_ioctl+0xcb/0x140 [ 1076.744575][T17812] __x64_sys_ioctl+0x3f/0x50 [ 1076.749538][T17812] do_syscall_64+0x4a/0x90 [ 1076.754379][T17812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1076.760471][T17812] RIP: 0033:0x4665f9 [ 1076.764632][T17812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1076.784737][T17812] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1076.793258][T17812] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1076.802310][T17812] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1076.810675][T17812] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x80ffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1076.818837][T17812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1076.826999][T17812] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:36 executing program 3 (fault-call:2 fault-nth:11): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1076.924350][T17835] FAULT_INJECTION: forcing a failure. [ 1076.924350][T17835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1076.937875][T17835] CPU: 0 PID: 17835 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1076.947824][T17835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1076.958104][T17835] Call Trace: [ 1076.961597][T17835] dump_stack+0x137/0x19d [ 1076.968983][T17835] should_fail+0x23c/0x250 [ 1076.974392][T17835] __alloc_pages+0xe7/0x310 [ 1076.980022][T17835] alloc_pages+0x21d/0x310 [ 1076.984819][T17835] get_zeroed_page+0x13/0x40 [ 1076.990708][T17835] mon_bin_ioctl+0x40a/0x8b0 [ 1076.997508][T17835] ? mon_bin_poll+0xd0/0xd0 [ 1077.004365][T17835] __se_sys_ioctl+0xcb/0x140 [ 1077.011639][T17835] __x64_sys_ioctl+0x3f/0x50 15:50:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1077.019865][T17835] do_syscall_64+0x4a/0x90 [ 1077.026383][T17835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1077.035885][T17835] RIP: 0033:0x4665f9 [ 1077.042271][T17835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1077.068601][T17835] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.081406][T17835] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1077.094675][T17835] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1077.105748][T17835] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2b2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1077.116194][T17835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1077.131158][T17835] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:36 executing program 3 (fault-call:2 fault-nth:12): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1077.257686][T17862] FAULT_INJECTION: forcing a failure. [ 1077.257686][T17862] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1077.272866][T17862] CPU: 1 PID: 17862 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1077.284636][T17862] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.295733][T17862] Call Trace: [ 1077.299464][T17862] dump_stack+0x137/0x19d [ 1077.304781][T17862] should_fail+0x23c/0x250 [ 1077.309697][T17862] __alloc_pages+0xe7/0x310 [ 1077.314632][T17862] alloc_pages+0x21d/0x310 [ 1077.321466][T17862] get_zeroed_page+0x13/0x40 [ 1077.329051][T17862] mon_bin_ioctl+0x40a/0x8b0 [ 1077.334015][T17862] ? mon_bin_poll+0xd0/0xd0 [ 1077.338735][T17862] __se_sys_ioctl+0xcb/0x140 [ 1077.343382][T17862] __x64_sys_ioctl+0x3f/0x50 [ 1077.348358][T17862] do_syscall_64+0x4a/0x90 [ 1077.353457][T17862] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1077.359485][T17862] RIP: 0033:0x4665f9 [ 1077.364099][T17862] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1077.389196][T17862] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.397757][T17862] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1077.406043][T17862] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1077.424167][T17862] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1077.432532][T17862] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1077.449108][T17862] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x300000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:36 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 3 (fault-call:2 fault-nth:13): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1077.725299][T17906] FAULT_INJECTION: forcing a failure. [ 1077.725299][T17906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1077.738727][T17906] CPU: 1 PID: 17906 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1077.749000][T17906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1077.762730][T17906] Call Trace: [ 1077.766898][T17906] dump_stack+0x137/0x19d [ 1077.771691][T17906] should_fail+0x23c/0x250 [ 1077.777321][T17906] __alloc_pages+0xe7/0x310 [ 1077.782372][T17906] alloc_pages+0x21d/0x310 [ 1077.787596][T17906] get_zeroed_page+0x13/0x40 [ 1077.792240][T17906] mon_bin_ioctl+0x40a/0x8b0 [ 1077.798893][T17906] ? mon_bin_poll+0xd0/0xd0 [ 1077.803896][T17906] __se_sys_ioctl+0xcb/0x140 [ 1077.808563][T17906] __x64_sys_ioctl+0x3f/0x50 [ 1077.813184][T17906] do_syscall_64+0x4a/0x90 [ 1077.817822][T17906] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1077.824277][T17906] RIP: 0033:0x4665f9 [ 1077.828304][T17906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1077.849991][T17906] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1077.859218][T17906] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x500000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1077.868662][T17906] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1077.882782][T17906] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1077.891958][T17906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1077.901352][T17906] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 3 (fault-call:2 fault-nth:14): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x600000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.051069][T17926] FAULT_INJECTION: forcing a failure. [ 1078.051069][T17926] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1078.065282][T17926] CPU: 0 PID: 17926 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1078.076962][T17926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.088888][T17926] Call Trace: [ 1078.093087][T17926] dump_stack+0x137/0x19d [ 1078.098171][T17926] should_fail+0x23c/0x250 [ 1078.105045][T17926] __alloc_pages+0xe7/0x310 [ 1078.110103][T17926] alloc_pages+0x21d/0x310 [ 1078.115717][T17926] get_zeroed_page+0x13/0x40 [ 1078.123308][T17926] mon_bin_ioctl+0x40a/0x8b0 [ 1078.129823][T17926] ? mon_bin_poll+0xd0/0xd0 [ 1078.136847][T17926] __se_sys_ioctl+0xcb/0x140 [ 1078.142177][T17926] __x64_sys_ioctl+0x3f/0x50 [ 1078.147987][T17926] do_syscall_64+0x4a/0x90 [ 1078.153618][T17926] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1078.161166][T17926] RIP: 0033:0x4665f9 [ 1078.165588][T17926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1078.189895][T17926] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.198357][T17926] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1078.206577][T17926] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1078.216190][T17926] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1078.227421][T17926] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1078.235584][T17926] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 3 (fault-call:2 fault-nth:15): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:37 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.424056][T17971] FAULT_INJECTION: forcing a failure. [ 1078.424056][T17971] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1078.443433][T17971] CPU: 0 PID: 17971 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 15:50:37 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.467431][T17971] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.478528][T17971] Call Trace: [ 1078.483327][T17971] dump_stack+0x137/0x19d [ 1078.488993][T17971] should_fail+0x23c/0x250 [ 1078.494323][T17971] __alloc_pages+0xe7/0x310 [ 1078.500326][T17971] alloc_pages+0x21d/0x310 [ 1078.505157][T17971] get_zeroed_page+0x13/0x40 [ 1078.510496][T17971] mon_bin_ioctl+0x40a/0x8b0 [ 1078.515299][T17971] ? mon_bin_poll+0xd0/0xd0 [ 1078.520380][T17971] __se_sys_ioctl+0xcb/0x140 [ 1078.529203][T17971] __x64_sys_ioctl+0x3f/0x50 [ 1078.533820][T17971] do_syscall_64+0x4a/0x90 [ 1078.538258][T17971] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1078.544290][T17971] RIP: 0033:0x4665f9 [ 1078.548192][T17971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1078.568913][T17971] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.577338][T17971] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1078.585966][T17971] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1078.594477][T17971] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1078.604377][T17971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:50:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x900000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.614216][T17971] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 3 (fault-call:2 fault-nth:16): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1078.740799][T18004] FAULT_INJECTION: forcing a failure. [ 1078.740799][T18004] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1078.754548][T18004] CPU: 1 PID: 18004 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1078.764659][T18004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1078.775447][T18004] Call Trace: [ 1078.783256][T18004] dump_stack+0x137/0x19d [ 1078.787608][T18004] should_fail+0x23c/0x250 [ 1078.792358][T18004] __alloc_pages+0xe7/0x310 [ 1078.797020][T18004] alloc_pages+0x21d/0x310 [ 1078.801451][T18004] get_zeroed_page+0x13/0x40 [ 1078.806141][T18004] mon_bin_ioctl+0x40a/0x8b0 [ 1078.811165][T18004] ? mon_bin_poll+0xd0/0xd0 [ 1078.815918][T18004] __se_sys_ioctl+0xcb/0x140 [ 1078.820544][T18004] __x64_sys_ioctl+0x3f/0x50 [ 1078.825144][T18004] do_syscall_64+0x4a/0x90 [ 1078.829595][T18004] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1078.836392][T18004] RIP: 0033:0x4665f9 [ 1078.840857][T18004] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1078.863280][T18004] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1078.872149][T18004] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1078.880440][T18004] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1078.889738][T18004] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1078.897740][T18004] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1078.905732][T18004] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xa00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 3 (fault-call:2 fault-nth:17): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.110481][T18041] FAULT_INJECTION: forcing a failure. [ 1079.110481][T18041] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1079.128743][T18041] CPU: 0 PID: 18041 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1079.138678][T18041] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.148850][T18041] Call Trace: [ 1079.152147][T18041] dump_stack+0x137/0x19d [ 1079.157122][T18041] should_fail+0x23c/0x250 [ 1079.162198][T18041] __alloc_pages+0xe7/0x310 [ 1079.166760][T18041] alloc_pages+0x21d/0x310 [ 1079.171563][T18041] get_zeroed_page+0x13/0x40 [ 1079.176347][T18041] mon_bin_ioctl+0x40a/0x8b0 [ 1079.181417][T18041] ? mon_bin_poll+0xd0/0xd0 [ 1079.186036][T18041] __se_sys_ioctl+0xcb/0x140 [ 1079.190826][T18041] __x64_sys_ioctl+0x3f/0x50 [ 1079.195506][T18041] do_syscall_64+0x4a/0x90 [ 1079.199944][T18041] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1079.206006][T18041] RIP: 0033:0x4665f9 [ 1079.209994][T18041] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.229604][T18041] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1079.238061][T18041] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1079.246113][T18041] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.254620][T18041] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1079.262605][T18041] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1079.270736][T18041] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 3 (fault-call:2 fault-nth:18): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xd00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:38 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.412151][T18066] FAULT_INJECTION: forcing a failure. [ 1079.412151][T18066] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1079.430077][T18066] CPU: 0 PID: 18066 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1079.441363][T18066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.454204][T18066] Call Trace: [ 1079.457518][T18066] dump_stack+0x137/0x19d [ 1079.461971][T18066] should_fail+0x23c/0x250 [ 1079.466671][T18066] __alloc_pages+0xe7/0x310 [ 1079.471442][T18066] alloc_pages+0x21d/0x310 [ 1079.475881][T18066] get_zeroed_page+0x13/0x40 [ 1079.481203][T18066] mon_bin_ioctl+0x40a/0x8b0 [ 1079.486874][T18066] ? mon_bin_poll+0xd0/0xd0 [ 1079.491517][T18066] __se_sys_ioctl+0xcb/0x140 [ 1079.497916][T18066] __x64_sys_ioctl+0x3f/0x50 [ 1079.504275][T18066] do_syscall_64+0x4a/0x90 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.510583][T18066] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1079.518205][T18066] RIP: 0033:0x4665f9 [ 1079.522467][T18066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.547135][T18066] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.557437][T18066] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1079.566949][T18066] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1079.577631][T18066] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1079.586602][T18066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1079.596479][T18066] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 3 (fault-call:2 fault-nth:19): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.691600][T18096] FAULT_INJECTION: forcing a failure. [ 1079.691600][T18096] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1079.711633][T18096] CPU: 1 PID: 18096 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1079.723425][T18096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1079.740372][T18096] Call Trace: [ 1079.744142][T18096] dump_stack+0x137/0x19d [ 1079.749337][T18096] should_fail+0x23c/0x250 [ 1079.755486][T18096] __alloc_pages+0xe7/0x310 [ 1079.760852][T18096] alloc_pages+0x21d/0x310 [ 1079.771083][T18096] get_zeroed_page+0x13/0x40 [ 1079.775990][T18096] mon_bin_ioctl+0x40a/0x8b0 [ 1079.782922][T18096] ? mon_bin_poll+0xd0/0xd0 [ 1079.787565][T18096] __se_sys_ioctl+0xcb/0x140 [ 1079.792193][T18096] __x64_sys_ioctl+0x3f/0x50 [ 1079.796830][T18096] do_syscall_64+0x4a/0x90 [ 1079.801285][T18096] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1079.807476][T18096] RIP: 0033:0x4665f9 [ 1079.811478][T18096] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1079.832424][T18096] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xe00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1079.841022][T18096] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1079.849982][T18096] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1079.858509][T18096] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1079.867041][T18096] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1079.875202][T18096] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 3 (fault-call:2 fault-nth:20): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x1200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.183814][T18150] FAULT_INJECTION: forcing a failure. [ 1080.183814][T18150] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1080.197462][T18150] CPU: 0 PID: 18150 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1080.207277][T18150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.218383][T18150] Call Trace: [ 1080.221768][T18150] dump_stack+0x137/0x19d [ 1080.226186][T18150] should_fail+0x23c/0x250 [ 1080.230700][T18150] __alloc_pages+0xe7/0x310 [ 1080.235310][T18150] alloc_pages+0x21d/0x310 [ 1080.239875][T18150] get_zeroed_page+0x13/0x40 [ 1080.244490][T18150] mon_bin_ioctl+0x40a/0x8b0 [ 1080.249205][T18150] ? mon_bin_poll+0xd0/0xd0 [ 1080.254080][T18150] __se_sys_ioctl+0xcb/0x140 [ 1080.259664][T18150] __x64_sys_ioctl+0x3f/0x50 [ 1080.264453][T18150] do_syscall_64+0x4a/0x90 [ 1080.270885][T18150] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1080.276975][T18150] RIP: 0033:0x4665f9 [ 1080.280974][T18150] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1080.302093][T18150] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.311307][T18150] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1080.320264][T18150] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.328252][T18150] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1080.336339][T18150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1080.344331][T18150] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x2700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x3f00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 3 (fault-call:2 fault-nth:21): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:39 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1b3ae8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.559503][T18189] FAULT_INJECTION: forcing a failure. [ 1080.559503][T18189] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1080.574357][T18189] CPU: 0 PID: 18189 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1080.584262][T18189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.594445][T18189] Call Trace: [ 1080.597727][T18189] dump_stack+0x137/0x19d [ 1080.602152][T18189] should_fail+0x23c/0x250 [ 1080.606597][T18189] __alloc_pages+0xe7/0x310 [ 1080.611190][T18189] alloc_pages+0x21d/0x310 [ 1080.615616][T18189] get_zeroed_page+0x13/0x40 [ 1080.620261][T18189] mon_bin_ioctl+0x40a/0x8b0 [ 1080.624927][T18189] ? mon_bin_poll+0xd0/0xd0 [ 1080.629441][T18189] __se_sys_ioctl+0xcb/0x140 [ 1080.634134][T18189] __x64_sys_ioctl+0x3f/0x50 [ 1080.638823][T18189] do_syscall_64+0x4a/0x90 [ 1080.645715][T18189] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1080.653776][T18189] RIP: 0033:0x4665f9 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.658070][T18189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1080.682172][T18189] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1080.691298][T18189] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1080.699381][T18189] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.707677][T18189] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1080.716644][T18189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1080.724732][T18189] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 3 (fault-call:2 fault-nth:22): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.901042][T18224] FAULT_INJECTION: forcing a failure. [ 1080.901042][T18224] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1080.914432][T18224] CPU: 0 PID: 18224 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1080.924382][T18224] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1080.934780][T18224] Call Trace: [ 1080.938288][T18224] dump_stack+0x137/0x19d [ 1080.943784][T18224] should_fail+0x23c/0x250 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1080.948827][T18224] __alloc_pages+0xe7/0x310 [ 1080.953672][T18224] alloc_pages+0x21d/0x310 [ 1080.958733][T18224] get_zeroed_page+0x13/0x40 [ 1080.963412][T18224] mon_bin_ioctl+0x40a/0x8b0 [ 1080.968488][T18224] ? mon_bin_poll+0xd0/0xd0 [ 1080.973223][T18224] __se_sys_ioctl+0xcb/0x140 [ 1080.977863][T18224] __x64_sys_ioctl+0x3f/0x50 [ 1080.983084][T18224] do_syscall_64+0x4a/0x90 [ 1080.987644][T18224] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1080.993687][T18224] RIP: 0033:0x4665f9 [ 1080.997629][T18224] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.082717][T18224] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.095823][T18224] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1081.104329][T18224] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1081.123528][T18224] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.135665][T18224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.146786][T18224] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4a01000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 3 (fault-call:2 fault-nth:23): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x4c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x16c0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.351306][T18265] FAULT_INJECTION: forcing a failure. [ 1081.351306][T18265] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1081.365491][T18265] CPU: 0 PID: 18265 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1081.375583][T18265] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.386698][T18265] Call Trace: [ 1081.390353][T18265] dump_stack+0x137/0x19d [ 1081.396224][T18265] should_fail+0x23c/0x250 [ 1081.401943][T18265] __alloc_pages+0xe7/0x310 [ 1081.407344][T18265] alloc_pages+0x21d/0x310 [ 1081.412579][T18265] get_zeroed_page+0x13/0x40 [ 1081.417977][T18265] mon_bin_ioctl+0x40a/0x8b0 [ 1081.423916][T18265] ? mon_bin_poll+0xd0/0xd0 [ 1081.429620][T18265] __se_sys_ioctl+0xcb/0x140 [ 1081.434564][T18265] __x64_sys_ioctl+0x3f/0x50 [ 1081.440495][T18265] do_syscall_64+0x4a/0x90 [ 1081.445316][T18265] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1081.452131][T18265] RIP: 0033:0x4665f9 [ 1081.456231][T18265] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.490053][T18265] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.499955][T18265] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1081.509534][T18265] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1081.519312][T18265] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.528281][T18265] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1081.536382][T18265] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:40 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 3 (fault-call:2 fault-nth:24): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x6c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.764478][T18315] FAULT_INJECTION: forcing a failure. [ 1081.764478][T18315] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1081.778931][T18315] CPU: 1 PID: 18315 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1081.789722][T18315] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1081.800776][T18315] Call Trace: [ 1081.804764][T18315] dump_stack+0x137/0x19d [ 1081.809475][T18315] should_fail+0x23c/0x250 [ 1081.814021][T18315] __alloc_pages+0xe7/0x310 [ 1081.819041][T18315] alloc_pages+0x21d/0x310 [ 1081.825339][T18315] get_zeroed_page+0x13/0x40 [ 1081.830224][T18315] mon_bin_ioctl+0x40a/0x8b0 [ 1081.835230][T18315] ? mon_bin_poll+0xd0/0xd0 [ 1081.839834][T18315] __se_sys_ioctl+0xcb/0x140 [ 1081.845185][T18315] __x64_sys_ioctl+0x3f/0x50 [ 1081.850240][T18315] do_syscall_64+0x4a/0x90 [ 1081.855888][T18315] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1081.863518][T18315] RIP: 0033:0x4665f9 [ 1081.867445][T18315] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1081.889606][T18315] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1081.898482][T18315] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1081.906848][T18315] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1081.917096][T18315] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1081.925308][T18315] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1081.933288][T18315] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 3 (fault-call:2 fault-nth:25): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.114501][T18348] FAULT_INJECTION: forcing a failure. [ 1082.114501][T18348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1082.134788][T18348] CPU: 1 PID: 18348 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1082.145883][T18348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.155963][T18348] Call Trace: [ 1082.159256][T18348] dump_stack+0x137/0x19d [ 1082.163734][T18348] should_fail+0x23c/0x250 [ 1082.168254][T18348] __alloc_pages+0xe7/0x310 [ 1082.172869][T18348] alloc_pages+0x21d/0x310 [ 1082.177404][T18348] get_zeroed_page+0x13/0x40 [ 1082.183994][T18348] mon_bin_ioctl+0x40a/0x8b0 [ 1082.190609][T18348] ? mon_bin_poll+0xd0/0xd0 [ 1082.196650][T18348] __se_sys_ioctl+0xcb/0x140 [ 1082.202344][T18348] __x64_sys_ioctl+0x3f/0x50 [ 1082.209864][T18348] do_syscall_64+0x4a/0x90 [ 1082.215219][T18348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1082.222017][T18348] RIP: 0033:0x4665f9 [ 1082.226214][T18348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.248708][T18348] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x7a00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.258310][T18348] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1082.267359][T18348] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1082.275441][T18348] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.283978][T18348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1082.293755][T18348] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:41 executing program 3 (fault-call:2 fault-nth:26): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:41 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.432117][T18370] FAULT_INJECTION: forcing a failure. [ 1082.432117][T18370] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1082.446039][T18370] CPU: 1 PID: 18370 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1082.457901][T18370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.469835][T18370] Call Trace: [ 1082.473766][T18370] dump_stack+0x137/0x19d 15:50:41 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:41 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.479462][T18370] should_fail+0x23c/0x250 [ 1082.484194][T18370] __alloc_pages+0xe7/0x310 [ 1082.489453][T18370] alloc_pages+0x21d/0x310 [ 1082.494058][T18370] get_zeroed_page+0x13/0x40 [ 1082.498998][T18370] mon_bin_ioctl+0x40a/0x8b0 [ 1082.504091][T18370] ? mon_bin_poll+0xd0/0xd0 [ 1082.510009][T18370] __se_sys_ioctl+0xcb/0x140 [ 1082.515097][T18370] __x64_sys_ioctl+0x3f/0x50 [ 1082.521152][T18370] do_syscall_64+0x4a/0x90 [ 1082.525772][T18370] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1082.532935][T18370] RIP: 0033:0x4665f9 [ 1082.536860][T18370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.559701][T18370] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1082.568386][T18370] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1082.576844][T18370] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1082.585632][T18370] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.595540][T18370] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1082.646625][T18370] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xb402000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 3 (fault-call:2 fault-nth:27): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.790359][T18404] FAULT_INJECTION: forcing a failure. [ 1082.790359][T18404] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1082.805154][T18404] CPU: 0 PID: 18404 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1082.815482][T18404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1082.825814][T18404] Call Trace: [ 1082.829255][T18404] dump_stack+0x137/0x19d [ 1082.833606][T18404] should_fail+0x23c/0x250 [ 1082.838300][T18404] __alloc_pages+0xe7/0x310 [ 1082.843074][T18404] alloc_pages+0x21d/0x310 [ 1082.847603][T18404] get_zeroed_page+0x13/0x40 [ 1082.852763][T18404] mon_bin_ioctl+0x40a/0x8b0 [ 1082.857635][T18404] ? mon_bin_poll+0xd0/0xd0 [ 1082.862441][T18404] __se_sys_ioctl+0xcb/0x140 [ 1082.867960][T18404] __x64_sys_ioctl+0x3f/0x50 [ 1082.872577][T18404] do_syscall_64+0x4a/0x90 [ 1082.877186][T18404] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1082.885058][T18404] RIP: 0033:0x4665f9 [ 1082.889002][T18404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1082.910180][T18404] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xc000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1082.920007][T18404] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1082.950285][T18404] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1082.959005][T18404] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1082.967247][T18404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1082.975823][T18404] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:42 executing program 3 (fault-call:2 fault-nth:28): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.073854][T18433] FAULT_INJECTION: forcing a failure. [ 1083.073854][T18433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.095673][T18433] CPU: 1 PID: 18433 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1083.107797][T18433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.118831][T18433] Call Trace: [ 1083.122298][T18433] dump_stack+0x137/0x19d [ 1083.127574][T18433] should_fail+0x23c/0x250 [ 1083.132102][T18433] __alloc_pages+0xe7/0x310 [ 1083.137157][T18433] alloc_pages+0x21d/0x310 [ 1083.142029][T18433] get_zeroed_page+0x13/0x40 [ 1083.147464][T18433] mon_bin_ioctl+0x40a/0x8b0 [ 1083.155656][T18433] ? mon_bin_poll+0xd0/0xd0 [ 1083.160734][T18433] __se_sys_ioctl+0xcb/0x140 [ 1083.167912][T18433] __x64_sys_ioctl+0x3f/0x50 [ 1083.180379][T18433] do_syscall_64+0x4a/0x90 [ 1083.186098][T18433] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.192318][T18433] RIP: 0033:0x4665f9 [ 1083.211701][T18433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.239865][T18433] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.250079][T18433] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1083.263033][T18433] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.272959][T18433] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.283676][T18433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.296333][T18433] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xfeffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb202}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffffff7f00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 3 (fault-call:2 fault-nth:29): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:42 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:42 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.541149][T18479] FAULT_INJECTION: forcing a failure. [ 1083.541149][T18479] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.556900][T18479] CPU: 0 PID: 18479 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1083.584511][T18479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.597817][T18479] Call Trace: [ 1083.601432][T18479] dump_stack+0x137/0x19d [ 1083.606386][T18479] should_fail+0x23c/0x250 [ 1083.612484][T18479] __alloc_pages+0xe7/0x310 [ 1083.617787][T18479] alloc_pages+0x21d/0x310 [ 1083.624725][T18479] get_zeroed_page+0x13/0x40 [ 1083.631187][T18479] mon_bin_ioctl+0x40a/0x8b0 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.641373][T18479] ? mon_bin_poll+0xd0/0xd0 [ 1083.648636][T18479] __se_sys_ioctl+0xcb/0x140 [ 1083.655997][T18479] __x64_sys_ioctl+0x3f/0x50 [ 1083.662902][T18479] do_syscall_64+0x4a/0x90 [ 1083.668383][T18479] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.677067][T18479] RIP: 0033:0x4665f9 [ 1083.685933][T18479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.718252][T18479] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1083.728168][T18479] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1083.737321][T18479] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.747091][T18479] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1083.757110][T18479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.765590][T18479] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:43 executing program 3 (fault-call:2 fault-nth:30): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1083.857011][T18502] FAULT_INJECTION: forcing a failure. [ 1083.857011][T18502] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1083.871941][T18502] CPU: 1 PID: 18502 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1083.882820][T18502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1083.893434][T18502] Call Trace: [ 1083.913975][T18502] dump_stack+0x137/0x19d [ 1083.923127][T18502] should_fail+0x23c/0x250 [ 1083.927868][T18502] __alloc_pages+0xe7/0x310 [ 1083.932839][T18502] alloc_pages+0x21d/0x310 [ 1083.937363][T18502] get_zeroed_page+0x13/0x40 [ 1083.941968][T18502] mon_bin_ioctl+0x40a/0x8b0 [ 1083.947129][T18502] ? mon_bin_poll+0xd0/0xd0 [ 1083.952005][T18502] __se_sys_ioctl+0xcb/0x140 [ 1083.956715][T18502] __x64_sys_ioctl+0x3f/0x50 [ 1083.961642][T18502] do_syscall_64+0x4a/0x90 [ 1083.966546][T18502] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1083.995576][T18502] RIP: 0033:0x4665f9 [ 1083.999572][T18502] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.019849][T18502] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.029159][T18502] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1084.037874][T18502] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1084.046876][T18502] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xefff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.055580][T18502] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1084.063835][T18502] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xff01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 3 (fault-call:2 fault-nth:31): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1084.264526][T18544] FAULT_INJECTION: forcing a failure. [ 1084.264526][T18544] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1084.279164][T18544] CPU: 1 PID: 18544 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1084.300800][T18544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.311031][T18544] Call Trace: [ 1084.314470][T18544] dump_stack+0x137/0x19d [ 1084.318949][T18544] should_fail+0x23c/0x250 [ 1084.323578][T18544] __alloc_pages+0xe7/0x310 [ 1084.328117][T18544] alloc_pages+0x21d/0x310 [ 1084.332819][T18544] get_zeroed_page+0x13/0x40 [ 1084.338093][T18544] mon_bin_ioctl+0x40a/0x8b0 [ 1084.342737][T18544] ? mon_bin_poll+0xd0/0xd0 [ 1084.347491][T18544] __se_sys_ioctl+0xcb/0x140 [ 1084.352198][T18544] __x64_sys_ioctl+0x3f/0x50 [ 1084.356847][T18544] do_syscall_64+0x4a/0x90 [ 1084.361997][T18544] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.368099][T18544] RIP: 0033:0x4665f9 [ 1084.373834][T18544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.395661][T18544] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.404978][T18544] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xff07}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.413200][T18544] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1084.421865][T18544] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.431471][T18544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1084.439710][T18544] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:43 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:43 executing program 3 (fault-call:2 fault-nth:32): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:43 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.591204][T18572] FAULT_INJECTION: forcing a failure. [ 1084.591204][T18572] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1084.605277][T18572] CPU: 0 PID: 18572 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1084.615925][T18572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.626327][T18572] Call Trace: [ 1084.629799][T18572] dump_stack+0x137/0x19d [ 1084.634185][T18572] should_fail+0x23c/0x250 15:50:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.638922][T18572] __alloc_pages+0xe7/0x310 [ 1084.644144][T18572] alloc_pages+0x21d/0x310 [ 1084.648953][T18572] get_zeroed_page+0x13/0x40 [ 1084.653939][T18572] mon_bin_ioctl+0x40a/0x8b0 [ 1084.658935][T18572] ? mon_bin_poll+0xd0/0xd0 [ 1084.663905][T18572] __se_sys_ioctl+0xcb/0x140 [ 1084.669154][T18572] __x64_sys_ioctl+0x3f/0x50 [ 1084.675149][T18572] do_syscall_64+0x4a/0x90 [ 1084.679641][T18572] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.685799][T18572] RIP: 0033:0x4665f9 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.689905][T18572] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.711526][T18572] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.720276][T18572] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1084.728549][T18572] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.737383][T18572] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.746638][T18572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1084.754869][T18572] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 3 (fault-call:2 fault-nth:33): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.843409][T18594] FAULT_INJECTION: forcing a failure. [ 1084.843409][T18594] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1084.856823][T18594] CPU: 0 PID: 18594 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1084.868178][T18594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1084.878675][T18594] Call Trace: [ 1084.882331][T18594] dump_stack+0x137/0x19d [ 1084.886888][T18594] should_fail+0x23c/0x250 15:50:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1084.891872][T18594] __alloc_pages+0xe7/0x310 [ 1084.896610][T18594] alloc_pages+0x21d/0x310 [ 1084.901091][T18594] get_zeroed_page+0x13/0x40 [ 1084.905718][T18594] mon_bin_ioctl+0x40a/0x8b0 [ 1084.910338][T18594] ? mon_bin_poll+0xd0/0xd0 [ 1084.915317][T18594] __se_sys_ioctl+0xcb/0x140 [ 1084.920210][T18594] __x64_sys_ioctl+0x3f/0x50 [ 1084.925532][T18594] do_syscall_64+0x4a/0x90 [ 1084.930224][T18594] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1084.936660][T18594] RIP: 0033:0x4665f9 [ 1084.940577][T18594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1084.961263][T18594] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1084.970249][T18594] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1084.978491][T18594] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1084.986587][T18594] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1084.994589][T18594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.004654][T18594] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:44 executing program 3 (fault-call:2 fault-nth:34): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1b3ae8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.120813][T18613] FAULT_INJECTION: forcing a failure. [ 1085.120813][T18613] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1085.134389][T18613] CPU: 0 PID: 18613 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1085.144918][T18613] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.155403][T18613] Call Trace: [ 1085.158979][T18613] dump_stack+0x137/0x19d [ 1085.163817][T18613] should_fail+0x23c/0x250 [ 1085.168856][T18613] __alloc_pages+0xe7/0x310 [ 1085.174069][T18613] alloc_pages+0x21d/0x310 [ 1085.178501][T18613] get_zeroed_page+0x13/0x40 [ 1085.183108][T18613] mon_bin_ioctl+0x40a/0x8b0 [ 1085.187748][T18613] ? mon_bin_poll+0xd0/0xd0 [ 1085.192361][T18613] __se_sys_ioctl+0xcb/0x140 [ 1085.197101][T18613] __x64_sys_ioctl+0x3f/0x50 [ 1085.201961][T18613] do_syscall_64+0x4a/0x90 [ 1085.206571][T18613] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1085.212486][T18613] RIP: 0033:0x4665f9 [ 1085.216391][T18613] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.236546][T18613] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.245413][T18613] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1085.253677][T18613] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1085.261951][T18613] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.270624][T18613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.278637][T18613] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:44 executing program 3 (fault-call:2 fault-nth:35): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.406524][T18638] FAULT_INJECTION: forcing a failure. [ 1085.406524][T18638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1085.420065][T18638] CPU: 0 PID: 18638 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1085.430693][T18638] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.441851][T18638] Call Trace: [ 1085.445431][T18638] dump_stack+0x137/0x19d [ 1085.450451][T18638] should_fail+0x23c/0x250 [ 1085.454887][T18638] __alloc_pages+0xe7/0x310 [ 1085.459790][T18638] alloc_pages+0x21d/0x310 [ 1085.465507][T18638] get_zeroed_page+0x13/0x40 [ 1085.471422][T18638] mon_bin_ioctl+0x40a/0x8b0 [ 1085.476037][T18638] ? mon_bin_poll+0xd0/0xd0 [ 1085.480720][T18638] __se_sys_ioctl+0xcb/0x140 [ 1085.485332][T18638] __x64_sys_ioctl+0x3f/0x50 [ 1085.489939][T18638] do_syscall_64+0x4a/0x90 [ 1085.494390][T18638] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1085.500304][T18638] RIP: 0033:0x4665f9 15:50:44 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.504193][T18638] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.525590][T18638] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.534590][T18638] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1085.543568][T18638] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.552081][T18638] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1085.560155][T18638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1085.568671][T18638] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:44 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 3 (fault-call:2 fault-nth:36): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1085.828217][T18684] FAULT_INJECTION: forcing a failure. [ 1085.828217][T18684] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1085.843265][T18684] CPU: 0 PID: 18684 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1085.853688][T18684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1085.864712][T18684] Call Trace: [ 1085.868177][T18684] dump_stack+0x137/0x19d [ 1085.872871][T18684] should_fail+0x23c/0x250 [ 1085.878288][T18684] __alloc_pages+0xe7/0x310 [ 1085.885340][T18684] alloc_pages+0x21d/0x310 [ 1085.893453][T18684] get_zeroed_page+0x13/0x40 [ 1085.900047][T18684] mon_bin_ioctl+0x40a/0x8b0 [ 1085.906509][T18684] ? mon_bin_poll+0xd0/0xd0 [ 1085.913984][T18684] __se_sys_ioctl+0xcb/0x140 [ 1085.919731][T18684] __x64_sys_ioctl+0x3f/0x50 [ 1085.925696][T18684] do_syscall_64+0x4a/0x90 [ 1085.931817][T18684] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1085.942608][T18684] RIP: 0033:0x4665f9 [ 1085.948347][T18684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.982564][T18684] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1085.998721][T18684] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1086.015356][T18684] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1086.050241][T18684] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:45 executing program 3 (fault-call:2 fault-nth:37): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x16c0000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.068639][T18684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1086.091448][T18684] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.196637][T18701] FAULT_INJECTION: forcing a failure. [ 1086.196637][T18701] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1086.223439][T18701] CPU: 0 PID: 18701 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1086.246521][T18701] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.262301][T18701] Call Trace: [ 1086.266943][T18701] dump_stack+0x137/0x19d [ 1086.274571][T18701] should_fail+0x23c/0x250 [ 1086.280534][T18701] __alloc_pages+0xe7/0x310 [ 1086.286195][T18701] alloc_pages+0x21d/0x310 [ 1086.290689][T18701] get_zeroed_page+0x13/0x40 [ 1086.295627][T18701] mon_bin_ioctl+0x40a/0x8b0 [ 1086.300821][T18701] ? mon_bin_poll+0xd0/0xd0 [ 1086.305872][T18701] __se_sys_ioctl+0xcb/0x140 [ 1086.312874][T18701] __x64_sys_ioctl+0x3f/0x50 [ 1086.317775][T18701] do_syscall_64+0x4a/0x90 [ 1086.322855][T18701] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.329047][T18701] RIP: 0033:0x4665f9 [ 1086.333671][T18701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.366343][T18701] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1086.376819][T18701] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1086.407731][T18701] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1086.417092][T18701] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x92020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.428780][T18701] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1086.489119][T18701] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:45 executing program 3 (fault-call:2 fault-nth:38): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:45 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.630090][T18727] FAULT_INJECTION: forcing a failure. [ 1086.630090][T18727] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1086.646190][T18727] CPU: 0 PID: 18727 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1086.658668][T18727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1086.669543][T18727] Call Trace: [ 1086.673792][T18727] dump_stack+0x137/0x19d [ 1086.679491][T18727] should_fail+0x23c/0x250 [ 1086.684695][T18727] __alloc_pages+0xe7/0x310 [ 1086.689851][T18727] alloc_pages+0x21d/0x310 [ 1086.703700][T18727] get_zeroed_page+0x13/0x40 [ 1086.708719][T18727] mon_bin_ioctl+0x40a/0x8b0 [ 1086.713875][T18727] ? mon_bin_poll+0xd0/0xd0 [ 1086.719635][T18727] __se_sys_ioctl+0xcb/0x140 [ 1086.724264][T18727] __x64_sys_ioctl+0x3f/0x50 [ 1086.730397][T18727] do_syscall_64+0x4a/0x90 [ 1086.735822][T18727] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1086.742870][T18727] RIP: 0033:0x4665f9 [ 1086.747502][T18727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.770395][T18727] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1086.780697][T18727] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1086.789029][T18727] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1086.798606][T18727] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1086.807300][T18727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1086.816360][T18727] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 3 (fault-call:2 fault-nth:39): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1086.969253][T18760] FAULT_INJECTION: forcing a failure. [ 1086.969253][T18760] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1086.988648][T18760] CPU: 1 PID: 18760 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1087.001449][T18760] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.014448][T18760] Call Trace: [ 1087.018960][T18760] dump_stack+0x137/0x19d [ 1087.024546][T18760] should_fail+0x23c/0x250 [ 1087.030859][T18760] __alloc_pages+0xe7/0x310 [ 1087.036872][T18760] alloc_pages+0x21d/0x310 [ 1087.043083][T18760] get_zeroed_page+0x13/0x40 [ 1087.048583][T18760] mon_bin_ioctl+0x40a/0x8b0 [ 1087.054525][T18760] ? mon_bin_poll+0xd0/0xd0 [ 1087.059545][T18760] __se_sys_ioctl+0xcb/0x140 [ 1087.065162][T18760] __x64_sys_ioctl+0x3f/0x50 [ 1087.070414][T18760] do_syscall_64+0x4a/0x90 [ 1087.075209][T18760] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.081865][T18760] RIP: 0033:0x4665f9 [ 1087.085911][T18760] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.110722][T18760] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.133687][T18760] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1087.146482][T18760] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1087.155244][T18760] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.163463][T18760] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1087.176048][T18760] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe83a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xefffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 3 (fault-call:2 fault-nth:40): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.482020][T18812] FAULT_INJECTION: forcing a failure. [ 1087.482020][T18812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1087.496285][T18812] CPU: 0 PID: 18812 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1087.506290][T18812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.517602][T18812] Call Trace: [ 1087.521598][T18812] dump_stack+0x137/0x19d [ 1087.525963][T18812] should_fail+0x23c/0x250 [ 1087.531498][T18812] __alloc_pages+0xe7/0x310 [ 1087.536285][T18812] alloc_pages+0x21d/0x310 [ 1087.541251][T18812] get_zeroed_page+0x13/0x40 [ 1087.546124][T18812] mon_bin_ioctl+0x40a/0x8b0 [ 1087.551355][T18812] ? mon_bin_poll+0xd0/0xd0 [ 1087.556299][T18812] __se_sys_ioctl+0xcb/0x140 [ 1087.561285][T18812] __x64_sys_ioctl+0x3f/0x50 [ 1087.566289][T18812] do_syscall_64+0x4a/0x90 [ 1087.570971][T18812] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.579818][T18812] RIP: 0033:0x4665f9 [ 1087.584098][T18812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.604593][T18812] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.613499][T18812] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1087.621831][T18812] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:47 executing program 3 (fault-call:2 fault-nth:41): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.629903][T18812] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.637930][T18812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1087.648223][T18812] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.726273][T18828] FAULT_INJECTION: forcing a failure. [ 1087.726273][T18828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1087.740074][T18828] CPU: 0 PID: 18828 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1087.750820][T18828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1087.761774][T18828] Call Trace: [ 1087.765174][T18828] dump_stack+0x137/0x19d [ 1087.769861][T18828] should_fail+0x23c/0x250 [ 1087.774305][T18828] __alloc_pages+0xe7/0x310 [ 1087.778878][T18828] alloc_pages+0x21d/0x310 [ 1087.783418][T18828] get_zeroed_page+0x13/0x40 [ 1087.788029][T18828] mon_bin_ioctl+0x40a/0x8b0 [ 1087.792699][T18828] ? mon_bin_poll+0xd0/0xd0 [ 1087.798441][T18828] __se_sys_ioctl+0xcb/0x140 [ 1087.803082][T18828] __x64_sys_ioctl+0x3f/0x50 [ 1087.808323][T18828] do_syscall_64+0x4a/0x90 [ 1087.812767][T18828] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1087.818873][T18828] RIP: 0033:0x4665f9 15:50:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.822879][T18828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1087.844886][T18828] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1087.853662][T18828] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1087.862334][T18828] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1087.871033][T18828] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1087.879034][T18828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1087.887209][T18828] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:47 executing program 3 (fault-call:2 fault-nth:42): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1087.970414][T18845] FAULT_INJECTION: forcing a failure. [ 1087.970414][T18845] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1087.984142][T18845] CPU: 0 PID: 18845 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1087.994061][T18845] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.006267][T18845] Call Trace: [ 1088.009942][T18845] dump_stack+0x137/0x19d [ 1088.014550][T18845] should_fail+0x23c/0x250 [ 1088.019809][T18845] __alloc_pages+0xe7/0x310 [ 1088.025383][T18845] alloc_pages+0x21d/0x310 [ 1088.030700][T18845] get_zeroed_page+0x13/0x40 [ 1088.035977][T18845] mon_bin_ioctl+0x40a/0x8b0 [ 1088.040715][T18845] ? mon_bin_poll+0xd0/0xd0 [ 1088.047366][T18845] __se_sys_ioctl+0xcb/0x140 [ 1088.053294][T18845] __x64_sys_ioctl+0x3f/0x50 [ 1088.058115][T18845] do_syscall_64+0x4a/0x90 [ 1088.063126][T18845] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.069148][T18845] RIP: 0033:0x4665f9 [ 1088.073786][T18845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.095831][T18845] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.105599][T18845] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1088.114910][T18845] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1088.124274][T18845] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.132505][T18845] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1088.140912][T18845] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 3 (fault-call:2 fault-nth:43): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:47 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1088.571025][T18906] FAULT_INJECTION: forcing a failure. [ 1088.571025][T18906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.585733][T18906] CPU: 1 PID: 18906 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1088.596361][T18906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.608479][T18906] Call Trace: [ 1088.611949][T18906] dump_stack+0x137/0x19d [ 1088.616352][T18906] should_fail+0x23c/0x250 [ 1088.620954][T18906] __alloc_pages+0xe7/0x310 [ 1088.625478][T18906] alloc_pages+0x21d/0x310 [ 1088.629989][T18906] get_zeroed_page+0x13/0x40 [ 1088.634638][T18906] mon_bin_ioctl+0x40a/0x8b0 [ 1088.639364][T18906] ? mon_bin_poll+0xd0/0xd0 [ 1088.643910][T18906] __se_sys_ioctl+0xcb/0x140 [ 1088.654864][T18906] __x64_sys_ioctl+0x3f/0x50 [ 1088.659748][T18906] do_syscall_64+0x4a/0x90 [ 1088.664189][T18906] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.670210][T18906] RIP: 0033:0x4665f9 [ 1088.674341][T18906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1088.694768][T18906] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1088.703762][T18906] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1088.711866][T18906] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1088.720113][T18906] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1088.728309][T18906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1088.736838][T18906] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 3 (fault-call:2 fault-nth:44): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1088.887389][T18928] FAULT_INJECTION: forcing a failure. [ 1088.887389][T18928] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1088.901797][T18928] CPU: 1 PID: 18928 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1088.912479][T18928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1088.923718][T18928] Call Trace: [ 1088.927187][T18928] dump_stack+0x137/0x19d [ 1088.931541][T18928] should_fail+0x23c/0x250 [ 1088.937242][T18928] __alloc_pages+0xe7/0x310 [ 1088.941979][T18928] alloc_pages+0x21d/0x310 [ 1088.946707][T18928] get_zeroed_page+0x13/0x40 [ 1088.951401][T18928] mon_bin_ioctl+0x40a/0x8b0 [ 1088.956241][T18928] ? mon_bin_poll+0xd0/0xd0 [ 1088.961152][T18928] __se_sys_ioctl+0xcb/0x140 [ 1088.967051][T18928] __x64_sys_ioctl+0x3f/0x50 [ 1088.971882][T18928] do_syscall_64+0x4a/0x90 [ 1088.976597][T18928] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1088.984486][T18928] RIP: 0033:0x4665f9 [ 1088.988579][T18928] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.008950][T18928] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.017470][T18928] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1089.027370][T18928] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1089.035899][T18928] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1089.044291][T18928] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1089.056452][T18928] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 3 (fault-call:2 fault-nth:45): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1089.242032][T18959] FAULT_INJECTION: forcing a failure. [ 1089.242032][T18959] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1089.255697][T18959] CPU: 1 PID: 18959 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1089.265522][T18959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.275586][T18959] Call Trace: [ 1089.278893][T18959] dump_stack+0x137/0x19d [ 1089.283416][T18959] should_fail+0x23c/0x250 [ 1089.287978][T18959] __alloc_pages+0xe7/0x310 [ 1089.293665][T18959] alloc_pages+0x21d/0x310 [ 1089.298381][T18959] get_zeroed_page+0x13/0x40 [ 1089.302999][T18959] mon_bin_ioctl+0x40a/0x8b0 [ 1089.308145][T18959] ? mon_bin_poll+0xd0/0xd0 [ 1089.312671][T18959] __se_sys_ioctl+0xcb/0x140 [ 1089.317540][T18959] __x64_sys_ioctl+0x3f/0x50 [ 1089.322159][T18959] do_syscall_64+0x4a/0x90 [ 1089.326610][T18959] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.332610][T18959] RIP: 0033:0x4665f9 [ 1089.336511][T18959] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.356509][T18959] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.365077][T18959] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1089.373337][T18959] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1089.381638][T18959] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1089.389798][T18959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1089.398683][T18959] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:48 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 3 (fault-call:2 fault-nth:46): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1089.791561][T19013] FAULT_INJECTION: forcing a failure. [ 1089.791561][T19013] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1089.805149][T19013] CPU: 0 PID: 19013 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1089.814961][T19013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1089.825050][T19013] Call Trace: [ 1089.828332][T19013] dump_stack+0x137/0x19d [ 1089.832786][T19013] should_fail+0x23c/0x250 [ 1089.837471][T19013] __alloc_pages+0xe7/0x310 [ 1089.841998][T19013] alloc_pages+0x21d/0x310 [ 1089.846449][T19013] get_zeroed_page+0x13/0x40 [ 1089.851068][T19013] mon_bin_ioctl+0x40a/0x8b0 [ 1089.855762][T19013] ? mon_bin_poll+0xd0/0xd0 [ 1089.860345][T19013] __se_sys_ioctl+0xcb/0x140 [ 1089.865086][T19013] __x64_sys_ioctl+0x3f/0x50 [ 1089.869804][T19013] do_syscall_64+0x4a/0x90 [ 1089.874276][T19013] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1089.881003][T19013] RIP: 0033:0x4665f9 [ 1089.884908][T19013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1089.904604][T19013] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1089.913266][T19013] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1089.922577][T19013] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1089.931231][T19013] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:49 executing program 3 (fault-call:2 fault-nth:47): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1089.939304][T19013] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1089.947285][T19013] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.045669][T19025] FAULT_INJECTION: forcing a failure. [ 1090.045669][T19025] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1090.060008][T19025] CPU: 1 PID: 19025 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1090.069901][T19025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.080688][T19025] Call Trace: [ 1090.083976][T19025] dump_stack+0x137/0x19d [ 1090.088577][T19025] should_fail+0x23c/0x250 [ 1090.093619][T19025] __alloc_pages+0xe7/0x310 [ 1090.098174][T19025] alloc_pages+0x21d/0x310 [ 1090.102617][T19025] get_zeroed_page+0x13/0x40 [ 1090.107308][T19025] mon_bin_ioctl+0x40a/0x8b0 [ 1090.111956][T19025] ? mon_bin_poll+0xd0/0xd0 [ 1090.116475][T19025] __se_sys_ioctl+0xcb/0x140 [ 1090.121191][T19025] __x64_sys_ioctl+0x3f/0x50 [ 1090.126023][T19025] do_syscall_64+0x4a/0x90 [ 1090.130520][T19025] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.137115][T19025] RIP: 0033:0x4665f9 [ 1090.141103][T19025] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.161689][T19025] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1090.170243][T19025] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1090.178348][T19025] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1090.187168][T19025] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.196183][T19025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1090.205154][T19025] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 3 (fault-call:2 fault-nth:48): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x10000010000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:49 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.554834][T19079] FAULT_INJECTION: forcing a failure. [ 1090.554834][T19079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1090.568924][T19079] CPU: 0 PID: 19079 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1090.578778][T19079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1090.589203][T19079] Call Trace: [ 1090.592759][T19079] dump_stack+0x137/0x19d [ 1090.597105][T19079] should_fail+0x23c/0x250 [ 1090.601568][T19079] __alloc_pages+0xe7/0x310 [ 1090.606107][T19079] alloc_pages+0x21d/0x310 [ 1090.610907][T19079] get_zeroed_page+0x13/0x40 [ 1090.615799][T19079] mon_bin_ioctl+0x40a/0x8b0 [ 1090.620413][T19079] ? mon_bin_poll+0xd0/0xd0 [ 1090.624969][T19079] __se_sys_ioctl+0xcb/0x140 [ 1090.629750][T19079] __x64_sys_ioctl+0x3f/0x50 [ 1090.634383][T19079] do_syscall_64+0x4a/0x90 [ 1090.638840][T19079] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1090.647884][T19079] RIP: 0033:0x4665f9 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.652136][T19079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1090.672953][T19079] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1090.681917][T19079] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1090.690771][T19079] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1090.698805][T19079] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1090.706917][T19079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1090.715172][T19079] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x40000100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 3 (fault-call:2 fault-nth:49): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x16c000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.019936][T19118] FAULT_INJECTION: forcing a failure. [ 1091.019936][T19118] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.033779][T19118] CPU: 0 PID: 19118 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1091.045086][T19118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.055586][T19118] Call Trace: [ 1091.058889][T19118] dump_stack+0x137/0x19d [ 1091.063432][T19118] should_fail+0x23c/0x250 [ 1091.068043][T19118] __alloc_pages+0xe7/0x310 [ 1091.072595][T19118] alloc_pages+0x21d/0x310 [ 1091.077514][T19118] get_zeroed_page+0x13/0x40 [ 1091.082513][T19118] mon_bin_ioctl+0x40a/0x8b0 [ 1091.087303][T19118] ? mon_bin_poll+0xd0/0xd0 [ 1091.146390][T19118] __se_sys_ioctl+0xcb/0x140 [ 1091.151297][T19118] __x64_sys_ioctl+0x3f/0x50 [ 1091.155944][T19118] do_syscall_64+0x4a/0x90 [ 1091.160463][T19118] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.167349][T19118] RIP: 0033:0x4665f9 [ 1091.172059][T19118] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.198971][T19118] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1091.209907][T19118] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1091.219208][T19118] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1091.230328][T19118] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.240962][T19118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.254648][T19118] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:50 executing program 3 (fault-call:2 fault-nth:50): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x300000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.348556][T19134] FAULT_INJECTION: forcing a failure. [ 1091.348556][T19134] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.363119][T19134] CPU: 0 PID: 19134 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1091.374930][T19134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.386703][T19134] Call Trace: [ 1091.391118][T19134] dump_stack+0x137/0x19d [ 1091.395498][T19134] should_fail+0x23c/0x250 [ 1091.400120][T19134] __alloc_pages+0xe7/0x310 [ 1091.405080][T19134] alloc_pages+0x21d/0x310 [ 1091.409695][T19134] get_zeroed_page+0x13/0x40 [ 1091.415044][T19134] mon_bin_ioctl+0x40a/0x8b0 [ 1091.419919][T19134] ? mon_bin_poll+0xd0/0xd0 [ 1091.424564][T19134] __se_sys_ioctl+0xcb/0x140 [ 1091.429364][T19134] __x64_sys_ioctl+0x3f/0x50 [ 1091.434064][T19134] do_syscall_64+0x4a/0x90 [ 1091.438840][T19134] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.445072][T19134] RIP: 0033:0x4665f9 [ 1091.453392][T19134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.478593][T19134] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1091.491378][T19134] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1091.504107][T19134] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1091.514205][T19134] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.525583][T19134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:50:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.537137][T19134] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:50 executing program 3 (fault-call:2 fault-nth:51): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:50 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x500000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.680309][T19158] FAULT_INJECTION: forcing a failure. [ 1091.680309][T19158] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1091.695908][T19158] CPU: 0 PID: 19158 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1091.706240][T19158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1091.718560][T19158] Call Trace: [ 1091.722064][T19158] dump_stack+0x137/0x19d 15:50:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1091.726853][T19158] should_fail+0x23c/0x250 [ 1091.731461][T19158] __alloc_pages+0xe7/0x310 [ 1091.736625][T19158] alloc_pages+0x21d/0x310 [ 1091.741082][T19158] get_zeroed_page+0x13/0x40 [ 1091.745716][T19158] mon_bin_ioctl+0x40a/0x8b0 [ 1091.752106][T19158] ? mon_bin_poll+0xd0/0xd0 [ 1091.757192][T19158] __se_sys_ioctl+0xcb/0x140 [ 1091.761800][T19158] __x64_sys_ioctl+0x3f/0x50 [ 1091.766408][T19158] do_syscall_64+0x4a/0x90 [ 1091.770974][T19158] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1091.778057][T19158] RIP: 0033:0x4665f9 [ 1091.782136][T19158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1091.803629][T19158] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1091.812169][T19158] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1091.820505][T19158] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1091.828631][T19158] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1091.837350][T19158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1091.845430][T19158] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x600000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 3 (fault-call:2 fault-nth:52): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1092.237849][T19210] FAULT_INJECTION: forcing a failure. [ 1092.237849][T19210] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1092.251381][T19210] CPU: 0 PID: 19210 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1092.263700][T19210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.273851][T19210] Call Trace: [ 1092.277877][T19210] dump_stack+0x137/0x19d [ 1092.284618][T19210] should_fail+0x23c/0x250 [ 1092.290364][T19210] __alloc_pages+0xe7/0x310 [ 1092.296298][T19210] alloc_pages+0x21d/0x310 [ 1092.302772][T19210] get_zeroed_page+0x13/0x40 [ 1092.309047][T19210] mon_bin_ioctl+0x40a/0x8b0 [ 1092.315994][T19210] ? mon_bin_poll+0xd0/0xd0 [ 1092.322077][T19210] __se_sys_ioctl+0xcb/0x140 [ 1092.326890][T19210] __x64_sys_ioctl+0x3f/0x50 [ 1092.331846][T19210] do_syscall_64+0x4a/0x90 [ 1092.337067][T19210] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.345747][T19210] RIP: 0033:0x4665f9 [ 1092.351311][T19210] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.372915][T19210] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:51 executing program 3 (fault-call:2 fault-nth:53): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1092.384230][T19210] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1092.392716][T19210] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1092.402955][T19210] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.412341][T19210] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.421495][T19210] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x900000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:51 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1092.499222][T19219] FAULT_INJECTION: forcing a failure. [ 1092.499222][T19219] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1092.516124][T19219] CPU: 0 PID: 19219 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1092.528900][T19219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.539312][T19219] Call Trace: [ 1092.542696][T19219] dump_stack+0x137/0x19d [ 1092.547348][T19219] should_fail+0x23c/0x250 [ 1092.551898][T19219] __alloc_pages+0xe7/0x310 [ 1092.556527][T19219] alloc_pages+0x21d/0x310 [ 1092.561136][T19219] get_zeroed_page+0x13/0x40 [ 1092.565764][T19219] mon_bin_ioctl+0x40a/0x8b0 [ 1092.570596][T19219] ? mon_bin_poll+0xd0/0xd0 [ 1092.575483][T19219] __se_sys_ioctl+0xcb/0x140 [ 1092.580942][T19219] __x64_sys_ioctl+0x3f/0x50 [ 1092.585559][T19219] do_syscall_64+0x4a/0x90 [ 1092.590250][T19219] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.596278][T19219] RIP: 0033:0x4665f9 [ 1092.600196][T19219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.620814][T19219] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1092.629531][T19219] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1092.638862][T19219] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1092.649205][T19219] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.657660][T19219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.665836][T19219] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:52 executing program 3 (fault-call:2 fault-nth:54): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xa00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1092.759051][T19243] FAULT_INJECTION: forcing a failure. [ 1092.759051][T19243] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1092.772866][T19243] CPU: 0 PID: 19243 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1092.783211][T19243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1092.795378][T19243] Call Trace: [ 1092.799072][T19243] dump_stack+0x137/0x19d [ 1092.803670][T19243] should_fail+0x23c/0x250 [ 1092.808396][T19243] __alloc_pages+0xe7/0x310 [ 1092.813221][T19243] alloc_pages+0x21d/0x310 [ 1092.817744][T19243] get_zeroed_page+0x13/0x40 [ 1092.822595][T19243] mon_bin_ioctl+0x40a/0x8b0 [ 1092.827840][T19243] ? mon_bin_poll+0xd0/0xd0 [ 1092.832395][T19243] __se_sys_ioctl+0xcb/0x140 [ 1092.837093][T19243] __x64_sys_ioctl+0x3f/0x50 [ 1092.842041][T19243] do_syscall_64+0x4a/0x90 [ 1092.846595][T19243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1092.852817][T19243] RIP: 0033:0x4665f9 [ 1092.856900][T19243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1092.877405][T19243] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1092.886169][T19243] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1092.895222][T19243] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1092.903485][T19243] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1092.911649][T19243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1092.919788][T19243] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:52 executing program 3 (fault-call:2 fault-nth:55): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.020469][T19261] FAULT_INJECTION: forcing a failure. [ 1093.020469][T19261] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1093.035277][T19261] CPU: 0 PID: 19261 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1093.046253][T19261] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.056453][T19261] Call Trace: [ 1093.059913][T19261] dump_stack+0x137/0x19d [ 1093.064515][T19261] should_fail+0x23c/0x250 15:50:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.068998][T19261] __alloc_pages+0xe7/0x310 [ 1093.073900][T19261] alloc_pages+0x21d/0x310 [ 1093.078648][T19261] get_zeroed_page+0x13/0x40 [ 1093.083426][T19261] mon_bin_ioctl+0x40a/0x8b0 [ 1093.089934][T19261] ? mon_bin_poll+0xd0/0xd0 [ 1093.095582][T19261] __se_sys_ioctl+0xcb/0x140 [ 1093.100368][T19261] __x64_sys_ioctl+0x3f/0x50 [ 1093.105389][T19261] do_syscall_64+0x4a/0x90 [ 1093.110384][T19261] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.159872][T19261] RIP: 0033:0x4665f9 [ 1093.164851][T19261] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.185760][T19261] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1093.194704][T19261] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:50:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x92020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.204815][T19261] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1093.214889][T19261] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.224825][T19261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1093.235215][T19261] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 3 (fault-call:2 fault-nth:56): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xc00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.340188][T19277] FAULT_INJECTION: forcing a failure. [ 1093.340188][T19277] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1093.358655][T19277] CPU: 0 PID: 19277 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1093.371197][T19277] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.385297][T19277] Call Trace: [ 1093.389052][T19277] dump_stack+0x137/0x19d [ 1093.394029][T19277] should_fail+0x23c/0x250 [ 1093.399057][T19277] __alloc_pages+0xe7/0x310 [ 1093.405124][T19277] alloc_pages+0x21d/0x310 [ 1093.411775][T19277] get_zeroed_page+0x13/0x40 [ 1093.418147][T19277] mon_bin_ioctl+0x40a/0x8b0 [ 1093.424740][T19277] ? mon_bin_poll+0xd0/0xd0 [ 1093.430432][T19277] __se_sys_ioctl+0xcb/0x140 [ 1093.438669][T19277] __x64_sys_ioctl+0x3f/0x50 [ 1093.444734][T19277] do_syscall_64+0x4a/0x90 [ 1093.454624][T19277] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1093.463295][T19277] RIP: 0033:0x4665f9 [ 1093.469377][T19277] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1093.502741][T19277] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1093.523291][T19277] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1093.541665][T19277] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1093.557239][T19277] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1093.580796][T19277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:50:52 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xd00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.589942][T19277] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb2020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a01}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb4010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 3 (fault-call:2 fault-nth:57): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xccffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1093.911120][T19336] FAULT_INJECTION: forcing a failure. [ 1093.911120][T19336] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1093.924946][T19336] CPU: 0 PID: 19336 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1093.934770][T19336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1093.944870][T19336] Call Trace: [ 1093.948360][T19336] dump_stack+0x137/0x19d [ 1093.952722][T19336] should_fail+0x23c/0x250 [ 1093.957531][T19336] __alloc_pages+0xe7/0x310 [ 1093.962753][T19336] alloc_pages+0x21d/0x310 [ 1093.968091][T19336] get_zeroed_page+0x13/0x40 [ 1093.972706][T19336] mon_bin_ioctl+0x40a/0x8b0 [ 1093.978654][T19336] ? mon_bin_poll+0xd0/0xd0 [ 1093.983299][T19336] __se_sys_ioctl+0xcb/0x140 [ 1093.988132][T19336] __x64_sys_ioctl+0x3f/0x50 [ 1093.994094][T19336] do_syscall_64+0x4a/0x90 [ 1093.999243][T19336] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.005334][T19336] RIP: 0033:0x4665f9 [ 1094.009271][T19336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.030813][T19336] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1094.040476][T19336] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1094.049545][T19336] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.057804][T19336] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.066288][T19336] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.074994][T19336] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:53 executing program 3 (fault-call:2 fault-nth:58): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe83a1b00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x1200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.177709][T19348] FAULT_INJECTION: forcing a failure. [ 1094.177709][T19348] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1094.191697][T19348] CPU: 0 PID: 19348 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1094.201920][T19348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.212982][T19348] Call Trace: [ 1094.216580][T19348] dump_stack+0x137/0x19d [ 1094.220929][T19348] should_fail+0x23c/0x250 [ 1094.225600][T19348] __alloc_pages+0xe7/0x310 [ 1094.230160][T19348] alloc_pages+0x21d/0x310 [ 1094.239413][T19348] get_zeroed_page+0x13/0x40 [ 1094.244208][T19348] mon_bin_ioctl+0x40a/0x8b0 [ 1094.248933][T19348] ? mon_bin_poll+0xd0/0xd0 [ 1094.253574][T19348] __se_sys_ioctl+0xcb/0x140 [ 1094.258478][T19348] __x64_sys_ioctl+0x3f/0x50 [ 1094.263385][T19348] do_syscall_64+0x4a/0x90 [ 1094.268124][T19348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.274222][T19348] RIP: 0033:0x4665f9 [ 1094.278714][T19348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.298812][T19348] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1094.307608][T19348] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1094.334629][T19348] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1094.343273][T19348] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.372967][T19348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.382460][T19348] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:53 executing program 3 (fault-call:2 fault-nth:59): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:53 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x2700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xefffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.466136][T19369] FAULT_INJECTION: forcing a failure. [ 1094.466136][T19369] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1094.479698][T19369] CPU: 0 PID: 19369 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1094.489867][T19369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.500024][T19369] Call Trace: [ 1094.503879][T19369] dump_stack+0x137/0x19d [ 1094.508945][T19369] should_fail+0x23c/0x250 [ 1094.514471][T19369] __alloc_pages+0xe7/0x310 [ 1094.519862][T19369] alloc_pages+0x21d/0x310 [ 1094.524480][T19369] get_zeroed_page+0x13/0x40 [ 1094.529268][T19369] mon_bin_ioctl+0x40a/0x8b0 [ 1094.534266][T19369] ? mon_bin_poll+0xd0/0xd0 [ 1094.539027][T19369] __se_sys_ioctl+0xcb/0x140 [ 1094.544349][T19369] __x64_sys_ioctl+0x3f/0x50 [ 1094.548961][T19369] do_syscall_64+0x4a/0x90 [ 1094.553545][T19369] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.560005][T19369] RIP: 0033:0x4665f9 [ 1094.563959][T19369] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.583964][T19369] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1094.593442][T19369] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1094.601508][T19369] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1094.609668][T19369] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1094.617999][T19369] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.626005][T19369] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x3f00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 3 (fault-call:2 fault-nth:60): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.745500][T19394] FAULT_INJECTION: forcing a failure. [ 1094.745500][T19394] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1094.758817][T19394] CPU: 0 PID: 19394 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1094.768634][T19394] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1094.779136][T19394] Call Trace: [ 1094.782557][T19394] dump_stack+0x137/0x19d [ 1094.786902][T19394] should_fail+0x23c/0x250 [ 1094.791437][T19394] __alloc_pages+0xe7/0x310 [ 1094.795944][T19394] alloc_pages+0x21d/0x310 [ 1094.800396][T19394] get_zeroed_page+0x13/0x40 [ 1094.805187][T19394] mon_bin_ioctl+0x40a/0x8b0 [ 1094.809970][T19394] ? mon_bin_poll+0xd0/0xd0 [ 1094.814549][T19394] __se_sys_ioctl+0xcb/0x140 [ 1094.819893][T19394] __x64_sys_ioctl+0x3f/0x50 [ 1094.824494][T19394] do_syscall_64+0x4a/0x90 [ 1094.828925][T19394] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1094.834848][T19394] RIP: 0033:0x4665f9 [ 1094.838923][T19394] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1094.859353][T19394] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1094.867995][T19394] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1094.876308][T19394] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1094.884701][T19394] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:54 executing program 3 (fault-call:2 fault-nth:61): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.892765][T19394] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1094.901201][T19394] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4a01000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb402}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1094.998209][T19412] FAULT_INJECTION: forcing a failure. [ 1094.998209][T19412] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1095.011700][T19412] CPU: 0 PID: 19412 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1095.021540][T19412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.031695][T19412] Call Trace: [ 1095.034981][T19412] dump_stack+0x137/0x19d [ 1095.039406][T19412] should_fail+0x23c/0x250 [ 1095.043875][T19412] __alloc_pages+0xe7/0x310 [ 1095.048386][T19412] alloc_pages+0x21d/0x310 [ 1095.052888][T19412] get_zeroed_page+0x13/0x40 [ 1095.057691][T19412] mon_bin_ioctl+0x40a/0x8b0 [ 1095.062306][T19412] ? mon_bin_poll+0xd0/0xd0 [ 1095.066832][T19412] __se_sys_ioctl+0xcb/0x140 [ 1095.071438][T19412] __x64_sys_ioctl+0x3f/0x50 [ 1095.076038][T19412] do_syscall_64+0x4a/0x90 [ 1095.080551][T19412] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.086492][T19412] RIP: 0033:0x4665f9 [ 1095.090530][T19412] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1095.110237][T19412] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1095.118796][T19412] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1095.126774][T19412] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1095.134752][T19412] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.142743][T19412] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1095.150828][T19412] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:54 executing program 3 (fault-call:2 fault-nth:62): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xff010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.272385][T19433] FAULT_INJECTION: forcing a failure. [ 1095.272385][T19433] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1095.285753][T19433] CPU: 0 PID: 19433 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1095.295611][T19433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.305680][T19433] Call Trace: [ 1095.308986][T19433] dump_stack+0x137/0x19d [ 1095.313323][T19433] should_fail+0x23c/0x250 [ 1095.317750][T19433] __alloc_pages+0xe7/0x310 [ 1095.322280][T19433] alloc_pages+0x21d/0x310 [ 1095.326743][T19433] get_zeroed_page+0x13/0x40 [ 1095.331453][T19433] mon_bin_ioctl+0x40a/0x8b0 [ 1095.336106][T19433] ? mon_bin_poll+0xd0/0xd0 [ 1095.340632][T19433] __se_sys_ioctl+0xcb/0x140 [ 1095.345305][T19433] __x64_sys_ioctl+0x3f/0x50 [ 1095.349909][T19433] do_syscall_64+0x4a/0x90 [ 1095.354508][T19433] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.360442][T19433] RIP: 0033:0x4665f9 [ 1095.364341][T19433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1095.384919][T19433] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1095.394165][T19433] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1095.402498][T19433] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1095.411214][T19433] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x6c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:54 executing program 3 (fault-call:2 fault-nth:63): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:54 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xff070000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.419431][T19433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1095.427761][T19433] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:54 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.516667][T19460] FAULT_INJECTION: forcing a failure. [ 1095.516667][T19460] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1095.529981][T19460] CPU: 1 PID: 19460 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1095.539895][T19460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1095.550047][T19460] Call Trace: [ 1095.553328][T19460] dump_stack+0x137/0x19d [ 1095.557679][T19460] should_fail+0x23c/0x250 [ 1095.562104][T19460] __alloc_pages+0xe7/0x310 [ 1095.566612][T19460] alloc_pages+0x21d/0x310 [ 1095.571233][T19460] get_zeroed_page+0x13/0x40 [ 1095.575935][T19460] mon_bin_ioctl+0x40a/0x8b0 [ 1095.580713][T19460] ? mon_bin_poll+0xd0/0xd0 [ 1095.585244][T19460] __se_sys_ioctl+0xcb/0x140 [ 1095.590043][T19460] __x64_sys_ioctl+0x3f/0x50 [ 1095.594751][T19460] do_syscall_64+0x4a/0x90 [ 1095.599180][T19460] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1095.605120][T19460] RIP: 0033:0x4665f9 [ 1095.609038][T19460] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1095.631170][T19460] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1095.639623][T19460] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1095.649100][T19460] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1095.658229][T19460] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.666217][T19460] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1095.674487][T19460] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x7a00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x80ffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8cffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 3 (fault-call:2 fault-nth:64): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffcc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x9202000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1095.984050][T19520] FAULT_INJECTION: forcing a failure. [ 1095.984050][T19520] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1095.997515][T19520] CPU: 0 PID: 19520 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1096.007330][T19520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.017674][T19520] Call Trace: [ 1096.020976][T19520] dump_stack+0x137/0x19d [ 1096.025365][T19520] should_fail+0x23c/0x250 [ 1096.029790][T19520] __alloc_pages+0xe7/0x310 [ 1096.034299][T19520] alloc_pages+0x21d/0x310 [ 1096.038789][T19520] get_zeroed_page+0x13/0x40 [ 1096.043384][T19520] mon_bin_ioctl+0x40a/0x8b0 [ 1096.047986][T19520] ? mon_bin_poll+0xd0/0xd0 [ 1096.052498][T19520] __se_sys_ioctl+0xcb/0x140 [ 1096.057121][T19520] __x64_sys_ioctl+0x3f/0x50 [ 1096.061723][T19520] do_syscall_64+0x4a/0x90 [ 1096.066285][T19520] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.072229][T19520] RIP: 0033:0x4665f9 [ 1096.076124][T19520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.095999][T19520] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1096.104674][T19520] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1096.112660][T19520] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1096.120649][T19520] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb401000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.128632][T19520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1096.136621][T19520] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:55 executing program 3 (fault-call:2 fault-nth:65): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xb402000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.284100][T19538] FAULT_INJECTION: forcing a failure. [ 1096.284100][T19538] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1096.297484][T19538] CPU: 0 PID: 19538 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1096.307567][T19538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.317644][T19538] Call Trace: [ 1096.320929][T19538] dump_stack+0x137/0x19d [ 1096.325277][T19538] should_fail+0x23c/0x250 [ 1096.329747][T19538] __alloc_pages+0xe7/0x310 [ 1096.334387][T19538] alloc_pages+0x21d/0x310 [ 1096.338809][T19538] get_zeroed_page+0x13/0x40 [ 1096.343430][T19538] mon_bin_ioctl+0x40a/0x8b0 [ 1096.348039][T19538] ? mon_bin_poll+0xd0/0xd0 [ 1096.352551][T19538] __se_sys_ioctl+0xcb/0x140 [ 1096.357147][T19538] __x64_sys_ioctl+0x3f/0x50 [ 1096.361742][T19538] do_syscall_64+0x4a/0x90 [ 1096.366252][T19538] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.372166][T19538] RIP: 0033:0x4665f9 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.376077][T19538] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.395691][T19538] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1096.404374][T19538] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1096.412355][T19538] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1096.420334][T19538] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.428310][T19538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1096.436459][T19538] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xccffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 3 (fault-call:2 fault-nth:66): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:55 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xe83a1b0000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.596130][T19568] FAULT_INJECTION: forcing a failure. [ 1096.596130][T19568] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1096.609512][T19568] CPU: 0 PID: 19568 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1096.619414][T19568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.629644][T19568] Call Trace: [ 1096.632927][T19568] dump_stack+0x137/0x19d [ 1096.637277][T19568] should_fail+0x23c/0x250 [ 1096.642245][T19568] __alloc_pages+0xe7/0x310 [ 1096.647649][T19568] alloc_pages+0x21d/0x310 [ 1096.652080][T19568] get_zeroed_page+0x13/0x40 [ 1096.656682][T19568] mon_bin_ioctl+0x40a/0x8b0 [ 1096.661568][T19568] ? mon_bin_poll+0xd0/0xd0 [ 1096.666157][T19568] __se_sys_ioctl+0xcb/0x140 [ 1096.670758][T19568] __x64_sys_ioctl+0x3f/0x50 [ 1096.675372][T19568] do_syscall_64+0x4a/0x90 [ 1096.680019][T19568] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.685925][T19568] RIP: 0033:0x4665f9 [ 1096.689828][T19568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.709443][T19568] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1096.717887][T19568] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1096.725870][T19568] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1096.733864][T19568] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xefffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 3 (fault-call:2 fault-nth:67): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.741842][T19568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1096.749834][T19568] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.823558][T19585] FAULT_INJECTION: forcing a failure. [ 1096.823558][T19585] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1096.836852][T19585] CPU: 0 PID: 19585 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1096.846673][T19585] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1096.856738][T19585] Call Trace: [ 1096.860018][T19585] dump_stack+0x137/0x19d [ 1096.864362][T19585] should_fail+0x23c/0x250 [ 1096.868800][T19585] __alloc_pages+0xe7/0x310 [ 1096.873324][T19585] alloc_pages+0x21d/0x310 [ 1096.877737][T19585] get_zeroed_page+0x13/0x40 [ 1096.882328][T19585] mon_bin_ioctl+0x40a/0x8b0 [ 1096.886986][T19585] ? mon_bin_poll+0xd0/0xd0 [ 1096.891493][T19585] __se_sys_ioctl+0xcb/0x140 [ 1096.896140][T19585] __x64_sys_ioctl+0x3f/0x50 [ 1096.900938][T19585] do_syscall_64+0x4a/0x90 [ 1096.905363][T19585] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1096.911293][T19585] RIP: 0033:0x4665f9 [ 1096.915184][T19585] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1096.934816][T19585] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1096.943249][T19585] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1096.951230][T19585] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1096.959211][T19585] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xf6ffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1096.967246][T19585] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1096.975271][T19585] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 3 (fault-call:2 fault-nth:68): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1097.083369][T19611] FAULT_INJECTION: forcing a failure. [ 1097.083369][T19611] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.096726][T19611] CPU: 0 PID: 19611 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1097.106546][T19611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.116699][T19611] Call Trace: [ 1097.120259][T19611] dump_stack+0x137/0x19d [ 1097.124608][T19611] should_fail+0x23c/0x250 [ 1097.129093][T19611] __alloc_pages+0xe7/0x310 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xfeffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.133770][T19611] alloc_pages+0x21d/0x310 [ 1097.138202][T19611] get_zeroed_page+0x13/0x40 [ 1097.142800][T19611] mon_bin_ioctl+0x40a/0x8b0 [ 1097.147404][T19611] ? mon_bin_poll+0xd0/0xd0 [ 1097.151957][T19611] __se_sys_ioctl+0xcb/0x140 [ 1097.156687][T19611] __x64_sys_ioctl+0x3f/0x50 [ 1097.161316][T19611] do_syscall_64+0x4a/0x90 [ 1097.165754][T19611] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.171667][T19611] RIP: 0033:0x4665f9 15:50:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.175568][T19611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.195181][T19611] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1097.203606][T19611] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1097.211585][T19611] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1097.219630][T19611] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff01000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.227612][T19611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1097.235591][T19611] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:56 executing program 3 (fault-call:2 fault-nth:69): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.324834][T19637] FAULT_INJECTION: forcing a failure. [ 1097.324834][T19637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.338432][T19637] CPU: 1 PID: 19637 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1097.348369][T19637] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.368350][T19637] Call Trace: [ 1097.371635][T19637] dump_stack+0x137/0x19d [ 1097.376045][T19637] should_fail+0x23c/0x250 [ 1097.380475][T19637] __alloc_pages+0xe7/0x310 [ 1097.384994][T19637] alloc_pages+0x21d/0x310 [ 1097.389427][T19637] get_zeroed_page+0x13/0x40 [ 1097.394245][T19637] mon_bin_ioctl+0x40a/0x8b0 [ 1097.398894][T19637] ? mon_bin_poll+0xd0/0xd0 [ 1097.403493][T19637] __se_sys_ioctl+0xcb/0x140 [ 1097.408103][T19637] __x64_sys_ioctl+0x3f/0x50 [ 1097.412730][T19637] do_syscall_64+0x4a/0x90 [ 1097.417164][T19637] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.423097][T19637] RIP: 0033:0x4665f9 [ 1097.426998][T19637] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.446661][T19637] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1097.455358][T19637] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1097.463338][T19637] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xff07000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:56 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffff7f00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.471432][T19637] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1097.479442][T19637] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1097.487592][T19637] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:56 executing program 3 (fault-call:2 fault-nth:70): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.568414][T19654] FAULT_INJECTION: forcing a failure. [ 1097.568414][T19654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.581694][T19654] CPU: 0 PID: 19654 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1097.592528][T19654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.602585][T19654] Call Trace: [ 1097.605894][T19654] dump_stack+0x137/0x19d [ 1097.610231][T19654] should_fail+0x23c/0x250 15:50:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.614648][T19654] __alloc_pages+0xe7/0x310 [ 1097.619237][T19654] alloc_pages+0x21d/0x310 [ 1097.623687][T19654] get_zeroed_page+0x13/0x40 [ 1097.628277][T19654] mon_bin_ioctl+0x40a/0x8b0 [ 1097.632882][T19654] ? mon_bin_poll+0xd0/0xd0 [ 1097.637392][T19654] __se_sys_ioctl+0xcb/0x140 [ 1097.642951][T19654] __x64_sys_ioctl+0x3f/0x50 [ 1097.647564][T19654] do_syscall_64+0x4a/0x90 [ 1097.651993][T19654] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.657932][T19654] RIP: 0033:0x4665f9 [ 1097.661836][T19654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.681639][T19654] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1097.690153][T19654] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1097.698131][T19654] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1097.706198][T19654] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffff00000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffffffffffef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.714180][T19654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1097.722266][T19654] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 3 (fault-call:2 fault-nth:71): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.840077][T19675] FAULT_INJECTION: forcing a failure. [ 1097.840077][T19675] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1097.853360][T19675] CPU: 0 PID: 19675 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1097.863172][T19675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1097.873461][T19675] Call Trace: [ 1097.876755][T19675] dump_stack+0x137/0x19d [ 1097.881086][T19675] should_fail+0x23c/0x250 [ 1097.885501][T19675] __alloc_pages+0xe7/0x310 [ 1097.890357][T19675] alloc_pages+0x21d/0x310 [ 1097.894779][T19675] get_zeroed_page+0x13/0x40 [ 1097.899371][T19675] mon_bin_ioctl+0x40a/0x8b0 [ 1097.903976][T19675] ? mon_bin_poll+0xd0/0xd0 [ 1097.908492][T19675] __se_sys_ioctl+0xcb/0x140 [ 1097.913135][T19675] __x64_sys_ioctl+0x3f/0x50 [ 1097.917789][T19675] do_syscall_64+0x4a/0x90 [ 1097.922216][T19675] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1097.928121][T19675] RIP: 0033:0x4665f9 [ 1097.932012][T19675] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1097.951638][T19675] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1097.960056][T19675] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1097.968127][T19675] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1097.976122][T19675] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1097.984102][T19675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1097.992101][T19675] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 3 (fault-call:2 fault-nth:72): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1098.143142][T19711] FAULT_INJECTION: forcing a failure. [ 1098.143142][T19711] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.156599][T19711] CPU: 0 PID: 19711 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1098.166414][T19711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.177264][T19711] Call Trace: [ 1098.180619][T19711] dump_stack+0x137/0x19d [ 1098.185019][T19711] should_fail+0x23c/0x250 [ 1098.189548][T19711] __alloc_pages+0xe7/0x310 [ 1098.194060][T19711] alloc_pages+0x21d/0x310 [ 1098.198483][T19711] get_zeroed_page+0x13/0x40 [ 1098.203079][T19711] mon_bin_ioctl+0x40a/0x8b0 [ 1098.207707][T19711] ? mon_bin_poll+0xd0/0xd0 [ 1098.212225][T19711] __se_sys_ioctl+0xcb/0x140 [ 1098.216905][T19711] __x64_sys_ioctl+0x3f/0x50 [ 1098.221534][T19711] do_syscall_64+0x4a/0x90 [ 1098.225958][T19711] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.231863][T19711] RIP: 0033:0x4665f9 [ 1098.235761][T19711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.256347][T19711] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1098.265056][T19711] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1098.275567][T19711] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:50:57 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 3 (fault-call:2 fault-nth:73): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1098.286244][T19711] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.296653][T19711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1098.307562][T19711] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:57 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1098.415288][T19725] FAULT_INJECTION: forcing a failure. [ 1098.415288][T19725] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.448250][T19725] CPU: 1 PID: 19725 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1098.467417][T19725] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.496017][T19725] Call Trace: [ 1098.502846][T19725] dump_stack+0x137/0x19d [ 1098.507765][T19725] should_fail+0x23c/0x250 [ 1098.514189][T19725] __alloc_pages+0xe7/0x310 [ 1098.519793][T19725] alloc_pages+0x21d/0x310 [ 1098.525817][T19725] get_zeroed_page+0x13/0x40 [ 1098.534890][T19725] mon_bin_ioctl+0x40a/0x8b0 [ 1098.541077][T19725] ? mon_bin_poll+0xd0/0xd0 [ 1098.546352][T19725] __se_sys_ioctl+0xcb/0x140 [ 1098.551422][T19725] __x64_sys_ioctl+0x3f/0x50 [ 1098.556224][T19725] do_syscall_64+0x4a/0x90 [ 1098.561368][T19725] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1098.567372][T19725] RIP: 0033:0x4665f9 [ 1098.571376][T19725] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1098.593038][T19725] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1098.604039][T19725] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1098.617957][T19725] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1098.629731][T19725] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1098.639682][T19725] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1098.651925][T19725] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x10000010000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 3 (fault-call:2 fault-nth:74): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1098.936845][T19777] FAULT_INJECTION: forcing a failure. [ 1098.936845][T19777] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1098.958143][T19777] CPU: 1 PID: 19777 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1098.973583][T19777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1098.989810][T19777] Call Trace: [ 1098.994701][T19777] dump_stack+0x137/0x19d [ 1099.002489][T19777] should_fail+0x23c/0x250 [ 1099.007871][T19777] __alloc_pages+0xe7/0x310 [ 1099.013683][T19777] alloc_pages+0x21d/0x310 [ 1099.020860][T19777] get_zeroed_page+0x13/0x40 [ 1099.029341][T19777] mon_bin_ioctl+0x40a/0x8b0 [ 1099.035936][T19777] ? mon_bin_poll+0xd0/0xd0 [ 1099.040635][T19777] __se_sys_ioctl+0xcb/0x140 [ 1099.045255][T19777] __x64_sys_ioctl+0x3f/0x50 [ 1099.049897][T19777] do_syscall_64+0x4a/0x90 [ 1099.054327][T19777] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.060236][T19777] RIP: 0033:0x4665f9 [ 1099.064817][T19777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.084895][T19777] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.094255][T19777] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1099.102930][T19777] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1099.110909][T19777] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1099.118977][T19777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1099.126956][T19777] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 3 (fault-call:2 fault-nth:75): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:58 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x16c000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1099.464285][T19823] FAULT_INJECTION: forcing a failure. [ 1099.464285][T19823] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1099.477579][T19823] CPU: 1 PID: 19823 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1099.487396][T19823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.497485][T19823] Call Trace: [ 1099.500865][T19823] dump_stack+0x137/0x19d [ 1099.505204][T19823] should_fail+0x23c/0x250 [ 1099.509669][T19823] __alloc_pages+0xe7/0x310 [ 1099.514173][T19823] alloc_pages+0x21d/0x310 [ 1099.518670][T19823] get_zeroed_page+0x13/0x40 [ 1099.523272][T19823] mon_bin_ioctl+0x40a/0x8b0 [ 1099.527873][T19823] ? mon_bin_poll+0xd0/0xd0 [ 1099.532434][T19823] __se_sys_ioctl+0xcb/0x140 [ 1099.537061][T19823] __x64_sys_ioctl+0x3f/0x50 [ 1099.541663][T19823] do_syscall_64+0x4a/0x90 [ 1099.546111][T19823] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.552021][T19823] RIP: 0033:0x4665f9 [ 1099.555979][T19823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.576026][T19823] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.584450][T19823] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1099.592427][T19823] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1099.600489][T19823] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 3 (fault-call:2 fault-nth:76): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1099.608541][T19823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1099.616518][T19823] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1099.724864][T19835] FAULT_INJECTION: forcing a failure. [ 1099.724864][T19835] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1099.738192][T19835] CPU: 1 PID: 19835 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1099.748003][T19835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1099.758188][T19835] Call Trace: [ 1099.761477][T19835] dump_stack+0x137/0x19d [ 1099.765839][T19835] should_fail+0x23c/0x250 [ 1099.770285][T19835] __alloc_pages+0xe7/0x310 [ 1099.774796][T19835] alloc_pages+0x21d/0x310 [ 1099.779226][T19835] get_zeroed_page+0x13/0x40 [ 1099.783819][T19835] mon_bin_ioctl+0x40a/0x8b0 [ 1099.788488][T19835] ? mon_bin_poll+0xd0/0xd0 [ 1099.793075][T19835] __se_sys_ioctl+0xcb/0x140 [ 1099.797777][T19835] __x64_sys_ioctl+0x3f/0x50 [ 1099.802380][T19835] do_syscall_64+0x4a/0x90 [ 1099.806808][T19835] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1099.812724][T19835] RIP: 0033:0x4665f9 [ 1099.816718][T19835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1099.836422][T19835] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1099.844864][T19835] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1099.852896][T19835] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1099.860876][T19835] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1099.868853][T19835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1099.876849][T19835] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:59 executing program 3 (fault-call:2 fault-nth:77): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1099.983453][T19863] FAULT_INJECTION: forcing a failure. [ 1099.983453][T19863] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1099.996745][T19863] CPU: 1 PID: 19863 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1100.006576][T19863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.016642][T19863] Call Trace: [ 1100.020013][T19863] dump_stack+0x137/0x19d [ 1100.024386][T19863] should_fail+0x23c/0x250 [ 1100.028811][T19863] __alloc_pages+0xe7/0x310 [ 1100.033313][T19863] alloc_pages+0x21d/0x310 [ 1100.037736][T19863] get_zeroed_page+0x13/0x40 [ 1100.042410][T19863] mon_bin_ioctl+0x40a/0x8b0 [ 1100.047020][T19863] ? mon_bin_poll+0xd0/0xd0 [ 1100.051547][T19863] __se_sys_ioctl+0xcb/0x140 [ 1100.056142][T19863] __x64_sys_ioctl+0x3f/0x50 [ 1100.060735][T19863] do_syscall_64+0x4a/0x90 [ 1100.065242][T19863] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.071223][T19863] RIP: 0033:0x4665f9 [ 1100.075117][T19863] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.094905][T19863] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.103571][T19863] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1100.111549][T19863] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1100.119531][T19863] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:50:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1100.128382][T19863] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1100.136362][T19863] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1100.295047][T19893] ================================================================== [ 1100.303171][T19893] BUG: KCSAN: data-race in exit_signals / task_dump_owner [ 1100.310288][T19893] [ 1100.312608][T19893] write to 0xffff88812d5a60ac of 4 bytes by task 19889 on cpu 1: [ 1100.320323][T19893] exit_signals+0xe1/0x4a0 [ 1100.324756][T19893] do_exit+0x194/0x1560 [ 1100.328919][T19893] do_group_exit+0x19b/0x1a0 [ 1100.333513][T19893] __do_sys_exit_group+0xb/0x10 [ 1100.338367][T19893] __se_sys_exit_group+0x5/0x10 [ 1100.343228][T19893] __x64_sys_exit_group+0x16/0x20 [ 1100.348259][T19893] do_syscall_64+0x4a/0x90 [ 1100.352707][T19893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.358624][T19893] [ 1100.360947][T19893] read to 0xffff88812d5a60ac of 4 bytes by task 19893 on cpu 0: [ 1100.368589][T19893] task_dump_owner+0x2b/0x1d0 [ 1100.373273][T19893] pid_revalidate+0x69/0x110 [ 1100.377861][T19893] lookup_fast+0x1fd/0x350 [ 1100.382279][T19893] walk_component+0x5c/0x350 [ 1100.386876][T19893] link_path_walk+0x4ba/0x780 [ 1100.391552][T19893] path_lookupat+0x7b/0x570 [ 1100.396142][T19893] filename_lookup+0xff/0x390 [ 1100.400992][T19893] kern_path+0x2e/0x40 [ 1100.405062][T19893] create_local_trace_uprobe+0x3f/0x3c0 [ 1100.410619][T19893] perf_uprobe_init+0xbe/0x140 [ 1100.415409][T19893] perf_uprobe_event_init+0xde/0x140 [ 1100.420702][T19893] perf_try_init_event+0x21a/0x400 [ 1100.425998][T19893] perf_event_alloc+0xa60/0x1790 [ 1100.430945][T19893] __se_sys_perf_event_open+0x5c7/0x2740 [ 1100.436592][T19893] __x64_sys_perf_event_open+0x63/0x70 15:50:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1100.442067][T19893] do_syscall_64+0x4a/0x90 [ 1100.446489][T19893] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.452521][T19893] [ 1100.454861][T19893] Reported by Kernel Concurrency Sanitizer on: [ 1100.461006][T19893] CPU: 0 PID: 19893 Comm: syz-executor.5 Tainted: G W 5.12.0-syzkaller #0 [ 1100.470819][T19893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.480891][T19893] ================================================================== 15:50:59 executing program 3 (fault-call:2 fault-nth:78): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:50:59 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x10}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:50:59 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1100.618719][T19917] FAULT_INJECTION: forcing a failure. [ 1100.618719][T19917] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1100.632192][T19917] CPU: 1 PID: 19917 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1100.642031][T19917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.652575][T19917] Call Trace: [ 1100.655867][T19917] dump_stack+0x137/0x19d [ 1100.660252][T19917] should_fail+0x23c/0x250 [ 1100.665194][T19917] __alloc_pages+0xe7/0x310 [ 1100.669699][T19917] alloc_pages+0x21d/0x310 [ 1100.674426][T19917] get_zeroed_page+0x13/0x40 [ 1100.679016][T19917] mon_bin_ioctl+0x40a/0x8b0 [ 1100.686222][T19917] ? mon_bin_poll+0xd0/0xd0 [ 1100.690932][T19917] __se_sys_ioctl+0xcb/0x140 [ 1100.695576][T19917] __x64_sys_ioctl+0x3f/0x50 [ 1100.700477][T19917] do_syscall_64+0x4a/0x90 [ 1100.705164][T19917] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1100.712786][T19917] RIP: 0033:0x4665f9 [ 1100.716683][T19917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1100.739758][T19917] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1100.748291][T19917] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1100.756306][T19917] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 15:51:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x11}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1100.764401][T19917] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.772379][T19917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1100.781056][T19917] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 3 (fault-call:2 fault-nth:79): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x27}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1101.028310][T19967] FAULT_INJECTION: forcing a failure. [ 1101.028310][T19967] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1101.045216][T19967] CPU: 0 PID: 19967 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1101.055038][T19967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.065848][T19967] Call Trace: [ 1101.070180][T19967] dump_stack+0x137/0x19d [ 1101.074928][T19967] should_fail+0x23c/0x250 [ 1101.080051][T19967] __alloc_pages+0xe7/0x310 [ 1101.084578][T19967] alloc_pages+0x21d/0x310 [ 1101.089140][T19967] get_zeroed_page+0x13/0x40 [ 1101.093748][T19967] mon_bin_ioctl+0x40a/0x8b0 [ 1101.098424][T19967] ? mon_bin_poll+0xd0/0xd0 [ 1101.103664][T19967] __se_sys_ioctl+0xcb/0x140 [ 1101.108296][T19967] __x64_sys_ioctl+0x3f/0x50 [ 1101.112922][T19967] do_syscall_64+0x4a/0x90 [ 1101.117354][T19967] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.123260][T19967] RIP: 0033:0x4665f9 [ 1101.127157][T19967] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.146802][T19967] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1101.155228][T19967] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1101.163210][T19967] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1101.171267][T19967] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a010000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x48}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1101.179245][T19967] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1101.187250][T19967] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:00 executing program 3 (fault-call:2 fault-nth:80): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1101.277042][T19984] FAULT_INJECTION: forcing a failure. [ 1101.277042][T19984] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1101.290384][T19984] CPU: 1 PID: 19984 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1101.301430][T19984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.311492][T19984] Call Trace: [ 1101.314773][T19984] dump_stack+0x137/0x19d [ 1101.319136][T19984] should_fail+0x23c/0x250 [ 1101.323603][T19984] __alloc_pages+0xe7/0x310 [ 1101.328139][T19984] alloc_pages+0x21d/0x310 [ 1101.332617][T19984] get_zeroed_page+0x13/0x40 [ 1101.337204][T19984] mon_bin_ioctl+0x40a/0x8b0 [ 1101.341847][T19984] ? mon_bin_poll+0xd0/0xd0 [ 1101.346359][T19984] __se_sys_ioctl+0xcb/0x140 [ 1101.350959][T19984] __x64_sys_ioctl+0x3f/0x50 [ 1101.355558][T19984] do_syscall_64+0x4a/0x90 [ 1101.359983][T19984] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.365970][T19984] RIP: 0033:0x4665f9 [ 1101.369863][T19984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.389907][T19984] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1101.398341][T19984] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1101.406459][T19984] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1101.414812][T19984] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1101.422787][T19984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1101.430818][T19984] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:00 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 3 (fault-call:2 fault-nth:81): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:00 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x4c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1101.537674][T20000] FAULT_INJECTION: forcing a failure. [ 1101.537674][T20000] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1101.550944][T20000] CPU: 0 PID: 20000 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1101.560772][T20000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1101.570902][T20000] Call Trace: [ 1101.574195][T20000] dump_stack+0x137/0x19d [ 1101.578529][T20000] should_fail+0x23c/0x250 [ 1101.583069][T20000] __alloc_pages+0xe7/0x310 [ 1101.587576][T20000] alloc_pages+0x21d/0x310 [ 1101.592034][T20000] get_zeroed_page+0x13/0x40 [ 1101.596624][T20000] mon_bin_ioctl+0x40a/0x8b0 [ 1101.601389][T20000] ? mon_bin_poll+0xd0/0xd0 [ 1101.605922][T20000] __se_sys_ioctl+0xcb/0x140 [ 1101.610584][T20000] __x64_sys_ioctl+0x3f/0x50 [ 1101.615177][T20000] do_syscall_64+0x4a/0x90 [ 1101.619595][T20000] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1101.625574][T20000] RIP: 0033:0x4665f9 [ 1101.629461][T20000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1101.650022][T20000] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1101.658463][T20000] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1101.666438][T20000] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1101.674518][T20000] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x68}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1101.682489][T20000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1101.690464][T20000] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x6c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 3 (fault-call:2 fault-nth:82): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x74}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.008842][T20054] FAULT_INJECTION: forcing a failure. [ 1102.008842][T20054] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.022705][T20054] CPU: 0 PID: 20054 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1102.032575][T20054] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.042755][T20054] Call Trace: [ 1102.046070][T20054] dump_stack+0x137/0x19d [ 1102.050611][T20054] should_fail+0x23c/0x250 [ 1102.055046][T20054] __alloc_pages+0xe7/0x310 [ 1102.060208][T20054] alloc_pages+0x21d/0x310 [ 1102.064632][T20054] get_zeroed_page+0x13/0x40 [ 1102.069264][T20054] mon_bin_ioctl+0x40a/0x8b0 [ 1102.073879][T20054] ? mon_bin_poll+0xd0/0xd0 [ 1102.078399][T20054] __se_sys_ioctl+0xcb/0x140 [ 1102.083001][T20054] __x64_sys_ioctl+0x3f/0x50 [ 1102.087674][T20054] do_syscall_64+0x4a/0x90 [ 1102.092423][T20054] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.098366][T20054] RIP: 0033:0x4665f9 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.102290][T20054] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.121899][T20054] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1102.130338][T20054] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1102.138324][T20054] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1102.146304][T20054] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.154288][T20054] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1102.162402][T20054] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xffff8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb4020000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 3 (fault-call:2 fault-nth:83): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:01 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r1, 0x11, 0x0, 0x100007e00) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r0) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000300)={{r1}, 0x7, 0xb9, 0x6}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @remote}, 0x10) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r3, &(0x7f0000000080)=[{&(0x7f0000000100)=""/242, 0xf2}, {&(0x7f0000000000)=""/1, 0x1}, {&(0x7f0000000200)=""/167, 0xa7}], 0x3) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000300)={@local}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, &(0x7f0000000440)={@local, @mcast1, @mcast2}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001140)=ANY=[@ANYRES64=r4, @ANYBLOB="57841ca291ba5a59451b16a5fa45bec5ab864c9151ed0b54bd3945e92f6c7509e65dc6f9b13f9abbf7a5bf90cf8e1baeabf05494fa01cd9490926600d3edee15869da3e8e812dca03518de25162f7f147c43134ed6be34935660e8b4a78c26d0a60000000000"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005b540)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0xd9, "e5d9651b4474d7"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000047d40)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000047f40)={0xab, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {0x0, r6}], 0x80, "21d41b5d5ed114"}) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xef}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0xf00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.317865][T20088] FAULT_INJECTION: forcing a failure. [ 1102.317865][T20088] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.332341][T20088] CPU: 0 PID: 20088 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1102.332371][T20088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xf0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.332422][T20088] Call Trace: [ 1102.332431][T20088] dump_stack+0x137/0x19d [ 1102.332463][T20088] should_fail+0x23c/0x250 [ 1102.332483][T20088] __alloc_pages+0xe7/0x310 [ 1102.332502][T20088] alloc_pages+0x21d/0x310 15:51:01 executing program 3 (fault-call:2 fault-nth:84): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:01 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.332521][T20088] get_zeroed_page+0x13/0x40 [ 1102.332539][T20088] mon_bin_ioctl+0x40a/0x8b0 15:51:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:01 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x14a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.332564][T20088] ? mon_bin_poll+0xd0/0xd0 [ 1102.332606][T20088] __se_sys_ioctl+0xcb/0x140 [ 1102.332629][T20088] __x64_sys_ioctl+0x3f/0x50 [ 1102.332650][T20088] do_syscall_64+0x4a/0x90 [ 1102.332670][T20088] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.332693][T20088] RIP: 0033:0x4665f9 [ 1102.332706][T20088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.332724][T20088] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1102.332778][T20088] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1102.332791][T20088] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1102.332803][T20088] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.332816][T20088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1102.332828][T20088] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1102.502035][T20123] FAULT_INJECTION: forcing a failure. [ 1102.502035][T20123] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.502062][T20123] CPU: 0 PID: 20123 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1102.502081][T20123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.502091][T20123] Call Trace: [ 1102.502099][T20123] dump_stack+0x137/0x19d [ 1102.502124][T20123] should_fail+0x23c/0x250 [ 1102.502145][T20123] __alloc_pages+0xe7/0x310 [ 1102.502178][T20123] alloc_pages+0x21d/0x310 [ 1102.502196][T20123] get_zeroed_page+0x13/0x40 [ 1102.502213][T20123] mon_bin_ioctl+0x40a/0x8b0 [ 1102.502238][T20123] ? mon_bin_poll+0xd0/0xd0 [ 1102.502261][T20123] __se_sys_ioctl+0xcb/0x140 [ 1102.502303][T20123] __x64_sys_ioctl+0x3f/0x50 [ 1102.502322][T20123] do_syscall_64+0x4a/0x90 [ 1102.502352][T20123] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.502379][T20123] RIP: 0033:0x4665f9 [ 1102.502392][T20123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.502452][T20123] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1102.502473][T20123] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1102.502486][T20123] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1102.502499][T20123] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.502512][T20123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 15:51:02 executing program 0: set_mempolicy(0x3, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r0, @ANYBLOB=',access=user,cache=fscache,access=user,context=system_u,obj_type=],subj_user=/dev/vcs#\x00,appraise_type=imasig,context=user_u,euid=', @ANYRESDEC=r2, @ANYBLOB=',pcr=0029,appraise,permit_directio,\x00:Iz+']) 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x16c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 3 (fault-call:2 fault-nth:85): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.502525][T20123] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x1b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.836677][T20148] FAULT_INJECTION: forcing a failure. [ 1102.836677][T20148] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1102.849996][T20148] CPU: 1 PID: 20148 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1102.859823][T20148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1102.869916][T20148] Call Trace: [ 1102.869929][T20148] dump_stack+0x137/0x19d [ 1102.869955][T20148] should_fail+0x23c/0x250 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1102.870021][T20148] __alloc_pages+0xe7/0x310 [ 1102.870038][T20148] alloc_pages+0x21d/0x310 [ 1102.870054][T20148] get_zeroed_page+0x13/0x40 [ 1102.870073][T20148] mon_bin_ioctl+0x40a/0x8b0 [ 1102.870098][T20148] ? mon_bin_poll+0xd0/0xd0 [ 1102.870120][T20148] __se_sys_ioctl+0xcb/0x140 [ 1102.870142][T20148] __x64_sys_ioctl+0x3f/0x50 [ 1102.870181][T20148] do_syscall_64+0x4a/0x90 [ 1102.870200][T20148] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1102.870221][T20148] RIP: 0033:0x4665f9 [ 1102.870235][T20148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1102.870253][T20148] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1102.870273][T20148] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 15:51:02 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x292}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 3 (fault-call:2 fault-nth:86): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x2700000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/239, 0x43}], 0x1) [ 1102.870287][T20148] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1102.870300][T20148] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1102.870312][T20148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1102.870368][T20148] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x2b4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 3 (fault-call:2 fault-nth:87): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1103.154636][T20196] FAULT_INJECTION: forcing a failure. [ 1103.154636][T20196] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1103.167924][T20196] CPU: 0 PID: 20196 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1103.178107][T20196] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x300}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1103.178121][T20196] Call Trace: [ 1103.178128][T20196] dump_stack+0x137/0x19d 15:51:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 3 (fault-call:2 fault-nth:88): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1103.178152][T20196] should_fail+0x23c/0x250 [ 1103.178171][T20196] __alloc_pages+0xe7/0x310 [ 1103.178189][T20196] alloc_pages+0x21d/0x310 [ 1103.178209][T20196] get_zeroed_page+0x13/0x40 15:51:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:02 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x500}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1103.178263][T20196] mon_bin_ioctl+0x40a/0x8b0 [ 1103.178286][T20196] ? mon_bin_poll+0xd0/0xd0 [ 1103.178307][T20196] __se_sys_ioctl+0xcb/0x140 [ 1103.178353][T20196] __x64_sys_ioctl+0x3f/0x50 [ 1103.178405][T20196] do_syscall_64+0x4a/0x90 [ 1103.178428][T20196] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.178452][T20196] RIP: 0033:0x4665f9 [ 1103.178466][T20196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.178538][T20196] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1103.178556][T20196] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1103.178569][T20196] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1103.178580][T20196] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.178591][T20196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1103.178603][T20196] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1103.236003][T20215] FAULT_INJECTION: forcing a failure. [ 1103.236003][T20215] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1103.236028][T20215] CPU: 1 PID: 20215 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1103.236047][T20215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.236057][T20215] Call Trace: [ 1103.236065][T20215] dump_stack+0x137/0x19d [ 1103.236101][T20215] should_fail+0x23c/0x250 [ 1103.236187][T20215] __alloc_pages+0xe7/0x310 [ 1103.236211][T20215] alloc_pages+0x21d/0x310 [ 1103.236228][T20215] get_zeroed_page+0x13/0x40 [ 1103.236244][T20215] mon_bin_ioctl+0x40a/0x8b0 [ 1103.236266][T20215] ? kcsan_setup_watchpoint+0x26e/0x470 [ 1103.236330][T20215] ? mon_bin_poll+0xd0/0xd0 [ 1103.236352][T20215] ? mon_bin_poll+0xd0/0xd0 [ 1103.236434][T20215] __se_sys_ioctl+0xcb/0x140 [ 1103.236453][T20215] __x64_sys_ioctl+0x3f/0x50 [ 1103.236483][T20215] do_syscall_64+0x4a/0x90 [ 1103.236507][T20215] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.236598][T20215] RIP: 0033:0x4665f9 [ 1103.236612][T20215] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.236630][T20215] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1103.236651][T20215] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1103.236663][T20215] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1103.236676][T20215] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.236689][T20215] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1103.236702][T20215] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1103.323630][T20229] FAULT_INJECTION: forcing a failure. [ 1103.323630][T20229] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1103.323656][T20229] CPU: 0 PID: 20229 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1103.323677][T20229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.323694][T20229] Call Trace: [ 1103.323702][T20229] dump_stack+0x137/0x19d [ 1103.323727][T20229] should_fail+0x23c/0x250 [ 1103.323747][T20229] __alloc_pages+0xe7/0x310 [ 1103.323766][T20229] alloc_pages+0x21d/0x310 [ 1103.323794][T20229] get_zeroed_page+0x13/0x40 [ 1103.323810][T20229] mon_bin_ioctl+0x40a/0x8b0 [ 1103.323864][T20229] ? mon_bin_poll+0xd0/0xd0 [ 1103.323896][T20229] __se_sys_ioctl+0xcb/0x140 [ 1103.323919][T20229] __x64_sys_ioctl+0x3f/0x50 [ 1103.324010][T20229] do_syscall_64+0x4a/0x90 [ 1103.324031][T20229] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.324060][T20229] RIP: 0033:0x4665f9 [ 1103.324073][T20229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:51:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x1, &(0x7f0000000080)=0x56b, 0x1000) set_mempolicy(0x1, &(0x7f0000000000)=0xc1bf, 0x9) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:51:03 executing program 3 (fault-call:2 fault-nth:89): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x600}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1103.324157][T20229] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1103.324179][T20229] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1103.324192][T20229] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1103.324203][T20229] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1103.324215][T20229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1103.324227][T20229] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:03 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) r3 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r3, 0x11, 0x0, 0x100007e00) sendfile(r0, r3, &(0x7f0000000200)=0x6, 0x3) r4 = openat(0xffffffffffffffff, &(0x7f00000002c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r4, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) ioctl$TIOCGRS485(r4, 0x542e, &(0x7f0000000240)) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000bc0)=0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000c00)={0x0, 0x0, 0x0}, &(0x7f0000000c40)=0xc) r7 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r7, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r7) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000cc0)=[{&(0x7f0000000300)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000700)=[{&(0x7f0000000380)="4cd5123a161547883ab68174dc7eb7dae3e230b14e3fd4624272ada96916d7f941ec11aac9fd8bdd403834912944da339437eccee91a7a725a831c160c25a9087652692e8163011e289b98582bd07b942f65db3fe3d39fd3453ed32ea062b6e437ab788c41bd2d62e102dff1a3d54c84603663205b63e6f40f3c65d3c2c76c2c533d75569ca9db95d4b37a2939202afc4d5c4166a6c694750358d89213d61a67", 0xa0}, {&(0x7f0000000440)="9f22b3a345022bf7111ed58281beeb9a7045cc14e80df99ad44db78b1645129521e195150b92bb5ec87d2b4bd049ed750ecca498b0a67688fa2ef382e314a446cb67c55f659b34f8ae41511b6af041dd88c6e1bdc488e72e065b304db0b38589d0f7a0a69c29dfeebcfc946d07333fb3bf9e3160e054e63c43c8e4b66d1f261f7b831cfd2c1eaa152d87c04d2daf5c4f8dd9462259e2d8d879139e74d168a8dbc21731341c70d3059298ce7454935ed9635181c2cde293be7b335fe9bf6b20060989d7d3dafcd1d7dc257f2c82b107027cab623bb76aa14c810dfa5d9d87bfc03fff2d65", 0xe4}, {&(0x7f0000000540)="bf1c001402764442e8ae603393c29cfbb73061db8d22e97c72602d9f1d3faa62e567ab3d8158c378735888ad2e0b0acbb8de8a0b640e3290c35302d8e752d0929103091a40841674c40abd87827402ad14d9a448e00637d8fa1f815a5bed3242b6a5477e7ea2806db61135138aa5c8a89b05b0f93c25a64e9d8393245e15f9dfaaf9c311e28ba878e2a89b131f1565b7ea781e19943cf4b0417c058b", 0x9c}, {&(0x7f0000000280)="257739150ab7023ed49f17", 0xb}, {&(0x7f0000000600)="546549f9f5423dc077779745e5bc84113256370f5f5ce3216512ce435719c9cebf87930b39d2186fc029a599f0789809fc8464079afaea3acca29bd255485e3a154caa7a41f3fd796e6fc3b1cc7a363f7cf09e3375c5e72ef2d5748eaa5a799fbfdba2b2cc41a91d79c9ae7169116152bb5d3554e201dc6fbc87c5bc5633cd73637e7e9186c96222b9033c", 0x8b}, {&(0x7f00000006c0)="b60f100deabc5bb4d690c44496b01fb6e9cdf78f3665", 0x16}], 0x6, 0x0, 0x0, 0x40}, {&(0x7f0000000780)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000000b40)=[{&(0x7f0000000800)="a1e516cf5e450ad4ca7c62e60c51640dd8c5d8588cd0c0b9badb327bfb1140bee250a80d6c0e94b4f7b04e27279d3e99c43db01fb2d1c47f68a46ae9de2a", 0x3e}, {&(0x7f0000000840)="219d3c6db29320a52c98edcba784", 0xe}, {&(0x7f0000000880)="2fd927885df83b465ea8b0b8541f0bc779499919843e6a90aa94d5ea9c9f3af8c066f89e764f07cd3f20a2ffdd653721d9785de3c1a7cf7eb05859f2c1165671468b59c062d70202412a28cabf518b129c8f2254c91846133ab9969bb136a6db8e961093e1354b9bb5feb0d8a311c2ead42f344e1bb08741ea9cdbdd8ece462d06a77034565bb705f6e4d4c006b8af16526e79b15a6bc9561174178405d5af4d1c4054934e526668cded8bd6aa3a2b95465bb952dfac372986f12eaad5d96c4003567ac02b717f08febaa985c4bd9686f3e36258899e44c54041ad8bd5", 0xdd}, {&(0x7f0000000980)="38fbddff9f97be12f1d33e9c6248574bbf242160e69d24b0847020b7258840697d8b6eaf68396824ab3b6d395e96d41967d4a2cf2463a83583844ffe55d8b32f258e4279c37e017b72363d4dcd443a4e18d6ccaf88ef6d21627c145341596ac3e81583835afbbdda35b3962d92d8e6cafd9af0a3b957193fc2b8a1bf0fa40d0f24cee6596428752a359fcb65df084f70aa4d1ea39e1a07640a76275571938a5bf4d0b49956b6ab727cb73e76afe317a4671cf41aae974eb47e6454", 0xbb}, {&(0x7f0000000a40)="32e655ce5e18e4cf31b184044a8b13b02f29ecdc1cf7461b93108546b63948144c8de702b9eea6c1ad14994379f3662b0c3ab466d4f952b23be22ab7bee68979d44d9503f14c14e5521b550486433cf54baa882f8a1465f26234598595ca67c4fbf168164d9d363496f3f5b1d499f6c66e5639dbd1798333b6ca0ab88cd247365bad71f4a56288de3fdbb07e9590bd38295c3d919cd62ebb2f50a39ad37be79181ea6ecaa7902ff093d70b41a67e12507b07ff55c717a4ff2756c8015a1acd98b615a424224e9bf59e78e77270f5de1a6c87", 0xd2}], 0x5, &(0x7f0000000c80)=[@cred={{0x1c, 0x1, 0x2, {0x0, r5, r6}}}, @rights={{0x20, 0x1, 0x1, [r7, r4, r0, r1]}}], 0x40, 0x4000002}], 0x2, 0x4000) r8 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r8, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) [ 1103.880975][T20263] FAULT_INJECTION: forcing a failure. [ 1103.880975][T20263] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1103.894414][T20263] CPU: 0 PID: 20263 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1103.904264][T20263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1103.914310][T20263] Call Trace: [ 1103.917616][T20263] dump_stack+0x137/0x19d [ 1103.921955][T20263] should_fail+0x23c/0x250 [ 1103.926487][T20263] __alloc_pages+0xe7/0x310 15:51:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/38, 0x26}], 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)) [ 1103.931138][T20263] alloc_pages+0x21d/0x310 [ 1103.935570][T20263] get_zeroed_page+0x13/0x40 [ 1103.940285][T20263] mon_bin_ioctl+0x40a/0x8b0 [ 1103.945170][T20263] ? mon_bin_poll+0xd0/0xd0 [ 1103.945221][T20263] __se_sys_ioctl+0xcb/0x140 [ 1103.954777][T20263] __x64_sys_ioctl+0x3f/0x50 [ 1103.959415][T20263] do_syscall_64+0x4a/0x90 [ 1103.963929][T20263] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1103.970088][T20263] RIP: 0033:0x4665f9 [ 1103.974074][T20263] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1103.993851][T20263] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1104.002725][T20263] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1104.002741][T20263] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1104.020251][T20263] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:03 executing program 0: r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x15, &(0x7f0000000300)) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000200)={0x48, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {{}, {@void, @void, @val={0xc, 0x99, {0x6, 0x80}}}}, [@NL80211_ATTR_WIPHY={0x8, 0x1, 0x72}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x30}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x64}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x28}]}, 0x48}, 0x1, 0x0, 0x0, 0x4040}, 0x20000800) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r1, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:51:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 3 (fault-call:2 fault-nth:90): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1104.020269][T20263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1104.020282][T20263] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x700}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:51:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.123566][T20295] FAULT_INJECTION: forcing a failure. [ 1104.123566][T20295] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1104.138530][T20295] CPU: 0 PID: 20295 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1104.148468][T20295] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.158539][T20295] Call Trace: [ 1104.161847][T20295] dump_stack+0x137/0x19d [ 1104.166177][T20295] should_fail+0x23c/0x250 [ 1104.170637][T20295] __alloc_pages+0xe7/0x310 [ 1104.175153][T20295] alloc_pages+0x21d/0x310 [ 1104.180158][T20295] get_zeroed_page+0x13/0x40 [ 1104.184762][T20295] mon_bin_ioctl+0x40a/0x8b0 [ 1104.189489][T20295] ? mon_bin_poll+0xd0/0xd0 [ 1104.194095][T20295] __se_sys_ioctl+0xcb/0x140 [ 1104.194157][T20295] __x64_sys_ioctl+0x3f/0x50 [ 1104.194177][T20295] do_syscall_64+0x4a/0x90 [ 1104.194198][T20295] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.213761][T20295] RIP: 0033:0x4665f9 15:51:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000200)="95ae206c3dff8a8b330dedd486c0f40636825f8f22ef54a349d41c3d006589cc9aa14dc11a480c36886b5a010f2735e5fb90786256498139f9be6ae51b09e62ca5ac04ea4aae391f202a0232ff9ebe3a65a6522e67739a8bfefdc82de846c91ef730c7e4cba63129f82cbf873c400c95e5c56b7aa3c2ba8921e34f8621168517e1365a", 0x83}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="d88bd784aeaad250eaa2e9230d8bcad227e3e4bc4ca2f5730e37c1a2b05b08ab2318fadff77de8ce2792aa9cc32ac7e834435c90b2ca9cc8c704a4685b8cd6c43a9cfc0ad7c35e05499b6e5484285d505f59", 0x52}, {&(0x7f0000001700)="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", 0x1000}], 0x4) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) [ 1104.217709][T20295] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.237767][T20295] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1104.246199][T20295] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1104.254254][T20295] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1104.262288][T20295] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) set_mempolicy(0x4000, &(0x7f0000000000)=0x80000001, 0x3d3) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x400003, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) 15:51:03 executing program 3 (fault-call:2 fault-nth:91): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x900}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.270350][T20295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1104.278338][T20295] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 15:51:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x4c01000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000001000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000280)='\xfaIh\x05\x00K\x99F\x16\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_{T\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfbK\'\x06\r\xf8\x96\"\xe3\xd5\xc2\x818\x1f\xbf\x8c&`A-T\xbb)\x12\xbf\xfa\xc6\xefe\tM\xe6\xe5\xe9[\xdd\x90J\x18\xaa\x91$\x02\xf8\xcb\xa3\xfatw\xb9\x00\xdfA\xa5\x9d\tk\x16\x16T\x8c\x18\xb4\xb0\x7f\x8a:\xbb\x97M+\xbc5\f\xf8\xc0>\x9e\x11\x00'/140, 0x0) pwritev(r2, &(0x7f0000000000)=[{&(0x7f00000001c0)="e9", 0x1}], 0x1, 0x1ff, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r2) io_uring_register$IORING_REGISTER_FILES_UPDATE(r1, 0x6, &(0x7f0000000100)={0x9, 0x0, &(0x7f0000000080)=[r2, 0xffffffffffffffff]}, 0x2) readv(r0, &(0x7f0000000000), 0x0) 15:51:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x10000010000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.383752][T20325] FAULT_INJECTION: forcing a failure. [ 1104.383752][T20325] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1104.397137][T20325] CPU: 1 PID: 20325 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1104.406956][T20325] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.417131][T20325] Call Trace: [ 1104.420434][T20325] dump_stack+0x137/0x19d [ 1104.424772][T20325] should_fail+0x23c/0x250 [ 1104.429288][T20325] __alloc_pages+0xe7/0x310 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xa00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.433802][T20325] alloc_pages+0x21d/0x310 [ 1104.438229][T20325] get_zeroed_page+0x13/0x40 [ 1104.442836][T20325] mon_bin_ioctl+0x40a/0x8b0 [ 1104.447471][T20325] ? mon_bin_poll+0xd0/0xd0 [ 1104.452082][T20325] __se_sys_ioctl+0xcb/0x140 [ 1104.452119][T20325] __x64_sys_ioctl+0x3f/0x50 [ 1104.452141][T20325] do_syscall_64+0x4a/0x90 [ 1104.452164][T20325] entry_SYSCALL_64_after_hwframe+0x44/0xae 15:51:03 executing program 3 (fault-call:2 fault-nth:92): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x20000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xb00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.452191][T20325] RIP: 0033:0x4665f9 [ 1104.452206][T20325] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:51:03 executing program 3 (fault-call:2 fault-nth:93): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xc00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.452223][T20325] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1104.452242][T20325] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1104.452254][T20325] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1104.452265][T20325] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.452277][T20325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1104.452289][T20325] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1104.544542][T20345] FAULT_INJECTION: forcing a failure. [ 1104.544542][T20345] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1104.544608][T20345] CPU: 1 PID: 20345 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1104.544640][T20345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.544651][T20345] Call Trace: [ 1104.544660][T20345] dump_stack+0x137/0x19d [ 1104.544687][T20345] should_fail+0x23c/0x250 [ 1104.544707][T20345] __alloc_pages+0xe7/0x310 [ 1104.544725][T20345] alloc_pages+0x21d/0x310 [ 1104.544752][T20345] get_zeroed_page+0x13/0x40 [ 1104.544769][T20345] mon_bin_ioctl+0x40a/0x8b0 [ 1104.544793][T20345] ? mon_bin_poll+0xd0/0xd0 [ 1104.544885][T20345] __se_sys_ioctl+0xcb/0x140 [ 1104.544908][T20345] __x64_sys_ioctl+0x3f/0x50 [ 1104.544928][T20345] do_syscall_64+0x4a/0x90 [ 1104.544951][T20345] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.545046][T20345] RIP: 0033:0x4665f9 [ 1104.545061][T20345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1104.545080][T20345] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1104.545098][T20345] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1104.545111][T20345] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1104.545174][T20345] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.545187][T20345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1104.545199][T20345] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1104.599926][T20359] FAULT_INJECTION: forcing a failure. [ 1104.599926][T20359] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1104.599955][T20359] CPU: 1 PID: 20359 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1104.600019][T20359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1104.600030][T20359] Call Trace: [ 1104.600038][T20359] dump_stack+0x137/0x19d [ 1104.600064][T20359] should_fail+0x23c/0x250 [ 1104.600093][T20359] __alloc_pages+0xe7/0x310 [ 1104.600113][T20359] alloc_pages+0x21d/0x310 [ 1104.600157][T20359] get_zeroed_page+0x13/0x40 [ 1104.600174][T20359] mon_bin_ioctl+0x40a/0x8b0 [ 1104.600200][T20359] ? mon_bin_poll+0xd0/0xd0 [ 1104.600224][T20359] __se_sys_ioctl+0xcb/0x140 [ 1104.600252][T20359] __x64_sys_ioctl+0x3f/0x50 [ 1104.600272][T20359] do_syscall_64+0x4a/0x90 [ 1104.600294][T20359] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1104.600317][T20359] RIP: 0033:0x4665f9 [ 1104.600329][T20359] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:51:04 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x78899b9, 0x0) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) creat(&(0x7f0000000000)='./file0\x00', 0x44) 15:51:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x40000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:04 executing program 3 (fault-call:2 fault-nth:94): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) 15:51:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xd00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1104.600347][T20359] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1104.600366][T20359] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1104.600378][T20359] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1104.600410][T20359] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1104.600422][T20359] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1104.600435][T20359] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1105.087598][T20390] FAULT_INJECTION: forcing a failure. [ 1105.087598][T20390] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1105.102729][T20390] CPU: 1 PID: 20390 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1105.113181][T20390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.123242][T20390] Call Trace: [ 1105.126597][T20390] dump_stack+0x137/0x19d [ 1105.131091][T20390] should_fail+0x23c/0x250 15:51:04 executing program 0: set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) preadv(r1, &(0x7f0000000600)=[{&(0x7f00000003c0)=""/211, 0xd3}, {&(0x7f00000004c0)}, {&(0x7f0000000500)=""/70, 0x46}, {&(0x7f0000000580)=""/84, 0x54}], 0x4, 0x6, 0x1e3) set_mempolicy(0x0, &(0x7f0000000080)=0x7, 0x3) set_mempolicy(0x1, &(0x7f0000000000)=0x3, 0xce1) readv(r0, &(0x7f00000016c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1) r2 = syz_open_dev$loop(&(0x7f0000000080), 0x3eb, 0x10d882) fallocate(r2, 0x11, 0x0, 0x100007e00) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x90220, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@loose}, {@fscache}, {@uname={'uname', 0x3d, '/dev/vcs#\x00'}}, {@dfltgid={'dfltgid', 0x3d, 0xee01}}], [{@dont_appraise}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vcs#\x00'}}, {@dont_appraise}, {@smackfsdef={'smackfsdef', 0x3d, '-'}}, {@fsname={'fsname', 0x3d, '@\\-'}}, {@euid_gt={'euid>', 0xee00}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}}) 15:51:04 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0xe00}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 15:51:04 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000140)=0x1f, 0x3) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1105.135664][T20390] __alloc_pages+0xe7/0x310 [ 1105.141074][T20390] alloc_pages+0x21d/0x310 [ 1105.145589][T20390] get_zeroed_page+0x13/0x40 [ 1105.150384][T20390] mon_bin_ioctl+0x40a/0x8b0 [ 1105.155449][T20390] ? mon_bin_poll+0xd0/0xd0 [ 1105.160009][T20390] __se_sys_ioctl+0xcb/0x140 [ 1105.164743][T20390] __x64_sys_ioctl+0x3f/0x50 [ 1105.169350][T20390] do_syscall_64+0x4a/0x90 [ 1105.173939][T20390] entry_SYSCALL_64_after_hwframe+0x44/0xae 15:51:04 executing program 3 (fault-call:2 fault-nth:95): set_mempolicy(0x2, &(0x7f0000000040)=0xb1, 0x1ff) r0 = syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x10794d) [ 1105.174002][T20390] RIP: 0033:0x4665f9 [ 1105.174018][T20390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.174036][T20390] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 15:51:04 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x2, &(0x7f0000000040)=0x5, 0x1ff) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x7400}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1105.174057][T20390] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1105.174070][T20390] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1105.174083][T20390] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1105.174097][T20390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1105.174110][T20390] R13: 00007fff926bc1ff R14: 00007fcfc9a5f300 R15: 0000000000022000 [ 1105.226010][T20407] FAULT_INJECTION: forcing a failure. [ 1105.226010][T20407] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1105.321879][T20407] CPU: 0 PID: 20407 Comm: syz-executor.3 Tainted: G W 5.12.0-syzkaller #0 [ 1105.321907][T20407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.321918][T20407] Call Trace: [ 1105.356214][T20407] dump_stack+0x137/0x19d [ 1105.361330][T20407] should_fail+0x23c/0x250 [ 1105.365798][T20407] __alloc_pages+0xe7/0x310 [ 1105.371389][T20407] alloc_pages+0x21d/0x310 [ 1105.376782][T20407] get_zeroed_page+0x13/0x40 [ 1105.383347][T20407] mon_bin_ioctl+0x40a/0x8b0 [ 1105.388884][T20407] ? mon_bin_poll+0xd0/0xd0 [ 1105.394313][T20407] __se_sys_ioctl+0xcb/0x140 [ 1105.401259][T20407] __x64_sys_ioctl+0x3f/0x50 [ 1105.406297][T20407] do_syscall_64+0x4a/0x90 [ 1105.410728][T20407] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1105.417010][T20407] RIP: 0033:0x4665f9 [ 1105.429216][T20407] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.477128][T20407] RSP: 002b:00007fcfc9a5f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1105.498248][T20407] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 00000000004665f9 [ 1105.522060][T20407] RDX: 000000000010794d RSI: 0000000000009204 RDI: 0000000000000003 [ 1105.548334][T20407] RBP: 00007fcfc9a5f1d0 R08: 0000000000000000 R09: 0000000000000000 15:51:04 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x6) sendmsg$sock(r0, &(0x7f0000001840)={&(0x7f0000000380)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @multicast1}, 0x4, 0x0, 0x1}}, 0x80, &(0x7f00000019c0)=[{&(0x7f0000000400)="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