&(0x7f000000a000)) 19:16:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 6: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 6: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 4: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 4: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:24 executing program 4: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0xc1004110, &(0x7f0000000000)) 19:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x101002, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x600210) r1 = memfd_create(&(0x7f0000000140)="000000008c00000000000000000000", 0x0) pwritev(r1, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) sendfile(r0, r1, &(0x7f00000ddff8), 0x102002700) 19:16:26 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 3: r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100), 0x0, 0x0, 0xfffffffffffffffd) keyctl$setperm(0x5, r0, 0x1000e) keyctl$describe(0x6, r0, &(0x7f0000000200)=""/125, 0x7d) 19:16:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r5 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0), &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) r6 = memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r4, 0x8) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) keyctl$get_security(0x11, r5, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 19:16:27 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:27 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(0xffffffffffffffff, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "f2786cce0fad21c4ce22cf1aed03b5ee77000000000000000000023ae9bf4041000ae3f4eb7505000000bb02107e7060799f0d8813c9caadc9e163c77b492492", "c3ad24a5ccb7412c2ab68f4429c8d2dd6c39de29daf4692562dce4423008719f30a13fcc8346eb3b962f8a512471d87c1e0bea3523941df7054fdd81130cdc2e", "22481815e3f3c8f7cb5d417c992df1e792cb400c906176bce6107e55707b7802"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) write(r1, &(0x7f0000000140), 0x28d) 19:16:28 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r5 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0), &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) r6 = memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r4, 0x8) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) keyctl$get_security(0x11, r5, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 19:16:28 executing program 1: r0 = socket$kcm(0x2, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240), 0x0, &(0x7f00000008c0)=ANY=[]}, 0x20040011) 19:16:28 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 1: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r5 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0), &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) r6 = memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r4, 0x8) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) keyctl$get_security(0x11, r5, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 19:16:28 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:28 executing program 5: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 5: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 5: mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:29 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:30 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00syz1\x00', 0x200002, 0x0) bpf$BPF_PROG_ATTACH(0x9, &(0x7f0000000640)={r0, 0xffffffffffffffff, 0xa}, 0x10) 19:16:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:30 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = inotify_init() r1 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x6, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0x400) dup2(r1, r0) 19:16:39 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r5 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0), &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) r6 = memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r4, 0x8) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) keyctl$get_security(0x11, r5, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 19:16:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 0: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x1000000800, 0x0, 0x3, 0x1}, 0x20) 19:16:39 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='cpuset.cpu_exclusive\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000180)=0x4, 0x12) 19:16:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:39 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="0a26c8079a613c6e715070") syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0xffffff86, 0x2}]}}, @icmp=@timestamp_reply}}}}, &(0x7f0000000100)) 19:16:39 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:16:40 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000180)=0x40000000000074, 0x315) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='lp\x00', 0x3) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000a88f88), 0x2f0c, 0x20008001, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) 19:16:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:40 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000100)=0xc) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0xffffffffffffff8e) r1 = memfd_create(&(0x7f0000000400)="e83779d80efa45bb7f48bebc95870bd0cd39bd2830ee47afe7b33fc778bde252c50d2e", 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x1) r3 = dup2(r2, r1) futex(&(0x7f0000000500)=0x2, 0x0, 0x0, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600), 0x2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, "7175657565310000000000000000313b0000000000000000000000000000000000000000060000000000ccbf7ddd00"}) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000580), 0x4) syz_genetlink_get_family_id$team(&(0x7f0000000240)='team\x00') r5 = add_key$user(&(0x7f0000001480)='user\x00', &(0x7f00000014c0), &(0x7f00000018c0)="a3be8ede202032c179a0ba7889a4a4316d9e85d76b6ab4168f24f28e08a5673e673f1335ed5a7f3dc0912aa7ffd1c8e1adbb29caa06fef8c5eaac49567fd3a35124ce9772c263748a0cbca9fe1a2ed13e5f146ffc298462316ef99d7d70aa8d849e8650193910b3d0d06d5b1618a0973eee186e9", 0x74, 0xfffffffffffffffd) r6 = memfd_create(&(0x7f0000000440)='\x00', 0x2) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000180), 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue1\x00'}) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000280), &(0x7f00000003c0)=0x68) r7 = fcntl$getown(r6, 0x9) perf_event_open(&(0x7f0000000680)={0x0, 0x70, 0x81, 0x4eca, 0x4f9, 0x5, 0x0, 0xb475, 0x43, 0x4, 0x7ff, 0xff, 0x5, 0x80000000, 0xffffffffffff66e7, 0x10001, 0x0, 0x3, 0x7ff, 0x1000, 0xffffffffffffce43, 0x2, 0xffffffffffffd230, 0x0, 0xfffffffffffffffb, 0x3, 0x4, 0x5, 0x9, 0x6, 0x8001, 0x8001, 0x7, 0x81, 0x3, 0x3, 0xd4, 0x3, 0x0, 0x7f, 0x0, @perf_bp={&(0x7f0000000640), 0xf}, 0x20000, 0x100000000, 0x6, 0x7, 0x2, 0x7, 0x8}, r7, 0xb, r4, 0x8) write$sndseq(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000300)={0x3f, @multicast1, 0x4e23, 0x3, 'sh\x00', 0x8, 0x80000001, 0x11}, 0x2c) keyctl$get_security(0x11, r5, &(0x7f0000000340)=""/120, 0x78) mmap(&(0x7f0000016000/0x4000)=nil, 0x4000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_open_dev$sndtimer(&(0x7f0000f85ff1)='/dev/snd/timer\x00', 0x0, 0x0) 19:16:50 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0x2289, &(0x7f0000000000)) 19:16:50 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:16:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 1: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000800)) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000280), 0x4) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, &(0x7f0000000080), 0xffffffffffffffc3) socket(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000740)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000380)=0x90) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000e00)=ANY=[], &(0x7f00000000c0)) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000b40), 0xfc08) r0 = socket$inet6(0xa, 0x202000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x1000000800, 0x0, 0x3, 0x1}, 0x20) 19:16:50 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:50 executing program 1: socket$inet6(0xa, 0x1000000000004, 0x6) r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x1c, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f0000000b80)=""/153}, 0x48) add_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000800)="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", 0x178, 0xfffffffffffffff8) r1 = socket$inet6(0xa, 0x202000000802, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000180)=0x201, 0x7ffffffe) 19:16:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:51 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:16:51 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:01 executing program 3: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='tmpfs\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 19:17:01 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:01 executing program 1: socket$inet6(0xa, 0x1000000000004, 0x6) r0 = perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x0, 0x1c, &(0x7f0000000140)=ANY=[@ANYRESOCT=r0, @ANYRES16=r0], &(0x7f0000e6bffc)='GPL\x00', 0x1, 0x99, &(0x7f0000000b80)=""/153}, 0x48) add_key(&(0x7f0000000640)='cifs.spnego\x00', &(0x7f0000000600)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000800)="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", 0x178, 0xfffffffffffffff8) r1 = socket$inet6(0xa, 0x202000000802, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000180)=0x201, 0x7ffffffe) 19:17:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000006c0)={'sit0\x00'}) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000200), 0x10) socketpair$inet(0x2, 0x0, 0x0, &(0x7f0000000240)) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0xc0fe}, 0xc, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x20, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) 19:17:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) 19:17:01 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) 19:17:02 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:02 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 7: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000001400)=0x11) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) set_robust_list(&(0x7f0000000300)={&(0x7f0000000240)={&(0x7f00000001c0)}, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)}}, 0x18) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, &(0x7f0000000140)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'bpq0\x00'}) 19:17:02 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:02 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 19:17:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:02 executing program 3: pipe2$9p(&(0x7f0000000000), 0x0) write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000100)={0x14}, 0x14) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) close(0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, &(0x7f0000000200)) tkill(r0, 0x1000000000015) 19:17:02 executing program 7: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="7a0af8ff75252400bfa100000000000007010000f8ffffffb702000004000000bf130000000000008500000006000000b7000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x8000a0, 0xe, 0x85, &(0x7f0000000180)="0000027400f000000000000039e4", &(0x7f0000000340)=""/133, 0xf0ffffa0010000}, 0x28) 19:17:02 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f00000001c0)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x4) 19:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:03 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:03 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:04 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:04 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) ioctl$BLKROTATIONAL(0xffffffffffffffff, 0x127e, &(0x7f0000000240)) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:05 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:05 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:05 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:05 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:06 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:06 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:06 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:08 executing program 0: socket$packet(0x11, 0x23, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:08 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 2: socket$packet(0x11, 0x23, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:09 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 2: socket$packet(0x11, 0x23, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 2: socket$packet(0x11, 0x23, 0x300) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:11 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:11 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:12 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:13 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:13 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:13 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:13 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:14 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:14 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:14 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:15 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:15 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:15 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 6: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:15 executing program 1: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:15 executing program 7: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:15 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:16 executing program 6: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 1: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:16 executing program 6: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 1: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:16 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 0: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:17 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:17 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:18 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 5: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:18 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 3: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 4: pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:21 executing program 4: pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 2: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 4: pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:22 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:22 executing program 2: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 2: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 4: socket$packet(0x11, 0x0, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:23 executing program 4: socket$packet(0x11, 0x0, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:24 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r0, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 4: socket$packet(0x11, 0x0, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:24 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:24 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) getresuid(&(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000340)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:25 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:25 executing program 7: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x0) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:25 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) getresuid(&(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) getresuid(&(0x7f00000002c0), &(0x7f0000000580), &(0x7f0000000340)) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:26 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:27 executing program 0: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000900)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 5 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 0: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:27 executing program 2 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 288.789347] FAULT_INJECTION: forcing a failure. [ 288.789347] name failslab, interval 1, probability 0, space 0, times 1 [ 288.800765] CPU: 0 PID: 9475 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 288.807996] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.817394] Call Trace: [ 288.820061] dump_stack+0x14b/0x190 [ 288.823755] should_fail+0xa98/0xaa0 [ 288.827532] __should_failslab+0x278/0x2a0 [ 288.831818] should_failslab+0x29/0x70 [ 288.835769] __kmalloc_track_caller+0x1f4/0xc60 [ 288.840533] ? ksys_mount+0xc4/0x3d0 [ 288.844349] ? strnlen_user+0x371/0x470 [ 288.848396] strndup_user+0x154/0x360 [ 288.852296] ksys_mount+0xc4/0x3d0 [ 288.855924] ? fput+0x257/0x2e0 [ 288.859303] __x64_sys_mount+0x157/0x1c0 [ 288.863419] ? ksys_mount+0x3d0/0x3d0 [ 288.867283] do_syscall_64+0x15b/0x220 [ 288.871246] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 288.876492] RIP: 0033:0x457089 [ 288.879753] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 288.898708] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 288.906482] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 288.914136] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 288.921451] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 288.928761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 288.936070] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 288.958806] FAULT_INJECTION: forcing a failure. [ 288.958806] name failslab, interval 1, probability 0, space 0, times 0 [ 288.970276] CPU: 0 PID: 9478 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 288.977499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 288.986884] Call Trace: [ 288.989540] dump_stack+0x14b/0x190 [ 288.993236] should_fail+0xa98/0xaa0 [ 288.997036] __should_failslab+0x278/0x2a0 [ 289.001326] should_failslab+0x29/0x70 [ 289.005284] __kmalloc_track_caller+0x1f4/0xc60 [ 289.010041] ? ksys_mount+0xc4/0x3d0 [ 289.013884] ? strnlen_user+0x371/0x470 [ 289.018393] strndup_user+0x154/0x360 [ 289.022293] ksys_mount+0xc4/0x3d0 [ 289.025913] ? fput+0x257/0x2e0 [ 289.029290] __x64_sys_mount+0x157/0x1c0 [ 289.033401] ? ksys_mount+0x3d0/0x3d0 [ 289.037261] do_syscall_64+0x15b/0x220 [ 289.041205] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.046452] RIP: 0033:0x457089 [ 289.049688] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.068664] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.076439] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 289.083756] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 19:17:28 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:28 executing program 6 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:28 executing program 0: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 289.091071] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 289.098383] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 289.105689] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 19:17:28 executing program 1 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:28 executing program 7 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:28 executing program 3 (fault-call:3 fault-nth:0): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 289.412015] FAULT_INJECTION: forcing a failure. [ 289.412015] name failslab, interval 1, probability 0, space 0, times 0 [ 289.418661] FAULT_INJECTION: forcing a failure. [ 289.418661] name failslab, interval 1, probability 0, space 0, times 0 [ 289.423513] CPU: 1 PID: 9496 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 289.441810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.451185] Call Trace: [ 289.453836] dump_stack+0x14b/0x190 [ 289.457508] should_fail+0xa98/0xaa0 [ 289.461286] __should_failslab+0x278/0x2a0 [ 289.465563] should_failslab+0x29/0x70 [ 289.469494] __kmalloc_track_caller+0x1f4/0xc60 [ 289.474239] ? ksys_mount+0xc4/0x3d0 [ 289.478025] ? strnlen_user+0x371/0x470 [ 289.482065] strndup_user+0x154/0x360 [ 289.485934] ksys_mount+0xc4/0x3d0 [ 289.489543] ? fput+0x257/0x2e0 [ 289.492886] __x64_sys_mount+0x157/0x1c0 [ 289.496982] ? ksys_mount+0x3d0/0x3d0 [ 289.500817] do_syscall_64+0x15b/0x220 [ 289.504759] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.509981] RIP: 0033:0x457089 [ 289.513207] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.532176] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.539938] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 289.547410] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 289.554730] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 289.562039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 289.569335] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 289.576655] CPU: 0 PID: 9497 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 289.583886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.593282] Call Trace: [ 289.595944] dump_stack+0x14b/0x190 [ 289.599625] should_fail+0xa98/0xaa0 [ 289.603402] __should_failslab+0x278/0x2a0 [ 289.607685] should_failslab+0x29/0x70 [ 289.611619] __kmalloc_track_caller+0x1f4/0xc60 [ 289.616363] ? ksys_mount+0xc4/0x3d0 [ 289.620161] ? strnlen_user+0x371/0x470 [ 289.624189] strndup_user+0x154/0x360 [ 289.628074] ksys_mount+0xc4/0x3d0 [ 289.631697] ? fput+0x257/0x2e0 [ 289.635055] __x64_sys_mount+0x157/0x1c0 [ 289.639169] ? ksys_mount+0x3d0/0x3d0 [ 289.643015] do_syscall_64+0x15b/0x220 [ 289.646955] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.652176] RIP: 0033:0x457089 19:17:28 executing program 5 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 289.655418] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.674366] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.682129] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 289.686120] FAULT_INJECTION: forcing a failure. [ 289.686120] name failslab, interval 1, probability 0, space 0, times 0 [ 289.689432] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 289.689453] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 289.689471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 289.689519] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 289.729857] CPU: 1 PID: 9499 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 289.737087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.746475] Call Trace: [ 289.749124] dump_stack+0x14b/0x190 [ 289.752807] should_fail+0xa98/0xaa0 [ 289.756580] __should_failslab+0x278/0x2a0 [ 289.760870] should_failslab+0x29/0x70 [ 289.764804] __kmalloc_track_caller+0x1f4/0xc60 [ 289.769541] ? ksys_mount+0xc4/0x3d0 [ 289.773329] ? strnlen_user+0x371/0x470 [ 289.777357] strndup_user+0x154/0x360 [ 289.781243] ksys_mount+0xc4/0x3d0 [ 289.784866] ? fput+0x257/0x2e0 [ 289.788219] __x64_sys_mount+0x157/0x1c0 [ 289.792337] ? ksys_mount+0x3d0/0x3d0 [ 289.796180] do_syscall_64+0x15b/0x220 [ 289.800133] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.805344] RIP: 0033:0x457089 [ 289.808565] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.827512] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.835275] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 [ 289.842564] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 289.849866] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 19:17:28 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:28 executing program 2 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 289.857169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 289.864469] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 289.878405] FAULT_INJECTION: forcing a failure. [ 289.878405] name failslab, interval 1, probability 0, space 0, times 0 [ 289.889842] CPU: 0 PID: 9500 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 289.897066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 289.906462] Call Trace: [ 289.909115] dump_stack+0x14b/0x190 [ 289.912802] should_fail+0xa98/0xaa0 [ 289.916584] __should_failslab+0x278/0x2a0 [ 289.920873] should_failslab+0x29/0x70 [ 289.924863] __kmalloc_track_caller+0x1f4/0xc60 [ 289.929613] ? ksys_mount+0xc4/0x3d0 [ 289.933416] ? strnlen_user+0x371/0x470 [ 289.937457] strndup_user+0x154/0x360 [ 289.941352] ksys_mount+0xc4/0x3d0 [ 289.944979] ? fput+0x257/0x2e0 [ 289.948351] __x64_sys_mount+0x157/0x1c0 [ 289.952472] ? ksys_mount+0x3d0/0x3d0 [ 289.956324] do_syscall_64+0x15b/0x220 [ 289.960291] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 289.965522] RIP: 0033:0x457089 [ 289.968775] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 289.987734] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 289.995519] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 290.002849] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 290.010165] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 290.017921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 290.025237] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 290.042288] FAULT_INJECTION: forcing a failure. [ 290.042288] name failslab, interval 1, probability 0, space 0, times 0 [ 290.053685] CPU: 0 PID: 9507 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 19:17:29 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 290.060922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.070319] Call Trace: [ 290.072981] dump_stack+0x14b/0x190 [ 290.076678] should_fail+0xa98/0xaa0 [ 290.080491] __should_failslab+0x278/0x2a0 [ 290.084785] should_failslab+0x29/0x70 [ 290.088724] __kmalloc_track_caller+0x1f4/0xc60 [ 290.093488] ? ksys_mount+0x193/0x3d0 [ 290.097377] ? strnlen_user+0x371/0x470 [ 290.101414] strndup_user+0x154/0x360 [ 290.105320] ksys_mount+0x193/0x3d0 [ 290.109033] ? fput+0x257/0x2e0 [ 290.112392] __x64_sys_mount+0x157/0x1c0 [ 290.116511] ? ksys_mount+0x3d0/0x3d0 [ 290.120366] do_syscall_64+0x15b/0x220 [ 290.124660] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.129903] RIP: 0033:0x457089 [ 290.133150] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.152112] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.159893] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 290.167210] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 290.174552] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 290.181865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 290.189179] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 [ 290.197385] FAULT_INJECTION: forcing a failure. [ 290.197385] name failslab, interval 1, probability 0, space 0, times 0 [ 290.208741] CPU: 0 PID: 9508 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 290.215964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.225354] Call Trace: [ 290.228017] dump_stack+0x14b/0x190 [ 290.231718] should_fail+0xa98/0xaa0 [ 290.235518] __should_failslab+0x278/0x2a0 [ 290.239831] should_failslab+0x29/0x70 [ 290.243788] __kmalloc_track_caller+0x1f4/0xc60 [ 290.248562] ? ksys_mount+0x193/0x3d0 [ 290.252479] ? strnlen_user+0x371/0x470 [ 290.256532] strndup_user+0x154/0x360 [ 290.260446] ksys_mount+0x193/0x3d0 [ 290.264172] ? fput+0x257/0x2e0 [ 290.267562] __x64_sys_mount+0x157/0x1c0 [ 290.271697] ? ksys_mount+0x3d0/0x3d0 [ 290.275566] do_syscall_64+0x15b/0x220 [ 290.279546] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.284802] RIP: 0033:0x457089 [ 290.288058] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.307041] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.314863] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 290.322201] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 290.329552] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 290.336965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 290.344305] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 19:17:29 executing program 1 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:29 executing program 6 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:29 executing program 7 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:29 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:29 executing program 3 (fault-call:3 fault-nth:1): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 290.690180] FAULT_INJECTION: forcing a failure. [ 290.690180] name failslab, interval 1, probability 0, space 0, times 0 [ 290.701635] CPU: 1 PID: 9528 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 290.708871] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.718266] Call Trace: [ 290.720926] dump_stack+0x14b/0x190 [ 290.724612] should_fail+0xa98/0xaa0 [ 290.728400] __should_failslab+0x278/0x2a0 [ 290.732693] should_failslab+0x29/0x70 [ 290.736642] __kmalloc_track_caller+0x1f4/0xc60 [ 290.741391] ? ksys_mount+0x193/0x3d0 [ 290.745293] ? strnlen_user+0x371/0x470 [ 290.749331] strndup_user+0x154/0x360 [ 290.753208] ksys_mount+0x193/0x3d0 [ 290.756944] ? fput+0x257/0x2e0 [ 290.760314] __x64_sys_mount+0x157/0x1c0 [ 290.764432] ? ksys_mount+0x3d0/0x3d0 [ 290.768291] do_syscall_64+0x15b/0x220 [ 290.772265] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.777494] RIP: 0033:0x457089 [ 290.780763] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.783050] FAULT_INJECTION: forcing a failure. [ 290.783050] name failslab, interval 1, probability 0, space 0, times 0 [ 290.799876] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.799916] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 290.799939] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 290.799960] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 290.799980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 290.800002] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 [ 290.828282] FAULT_INJECTION: forcing a failure. [ 290.828282] name failslab, interval 1, probability 0, space 0, times 0 [ 290.834325] CPU: 0 PID: 9531 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 290.874480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 290.883851] Call Trace: [ 290.886488] dump_stack+0x14b/0x190 [ 290.890171] should_fail+0xa98/0xaa0 [ 290.893956] __should_failslab+0x278/0x2a0 [ 290.898240] should_failslab+0x29/0x70 [ 290.902171] __kmalloc_track_caller+0x1f4/0xc60 [ 290.906903] ? ksys_mount+0x193/0x3d0 [ 290.910770] ? strnlen_user+0x371/0x470 [ 290.914792] strndup_user+0x154/0x360 [ 290.918664] ksys_mount+0x193/0x3d0 [ 290.922355] ? fput+0x257/0x2e0 [ 290.925691] __x64_sys_mount+0x157/0x1c0 [ 290.929820] ? ksys_mount+0x3d0/0x3d0 [ 290.935505] do_syscall_64+0x15b/0x220 [ 290.939439] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 290.944685] RIP: 0033:0x457089 [ 290.947913] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 290.966842] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 290.974584] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 [ 290.981879] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 290.989171] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 290.996465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 291.003760] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 [ 291.011092] CPU: 1 PID: 9532 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 291.018496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.027889] Call Trace: [ 291.030532] dump_stack+0x14b/0x190 [ 291.034209] should_fail+0xa98/0xaa0 [ 291.037992] __should_failslab+0x278/0x2a0 [ 291.042296] should_failslab+0x29/0x70 [ 291.046236] __kmalloc_track_caller+0x1f4/0xc60 [ 291.050975] ? ksys_mount+0x193/0x3d0 [ 291.054851] ? strnlen_user+0x371/0x470 [ 291.058897] strndup_user+0x154/0x360 [ 291.062775] ksys_mount+0x193/0x3d0 [ 291.066483] ? fput+0x257/0x2e0 [ 291.069837] __x64_sys_mount+0x157/0x1c0 [ 291.073945] ? ksys_mount+0x3d0/0x3d0 [ 291.077793] do_syscall_64+0x15b/0x220 [ 291.081737] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.086970] RIP: 0033:0x457089 [ 291.090208] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.109165] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.116896] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 291.124660] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 291.131972] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 291.139304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 291.146608] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 [ 291.162019] FAULT_INJECTION: forcing a failure. [ 291.162019] name failslab, interval 1, probability 0, space 0, times 0 [ 291.173393] CPU: 1 PID: 9533 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 291.180617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.189997] Call Trace: [ 291.192656] dump_stack+0x14b/0x190 [ 291.196341] should_fail+0xa98/0xaa0 [ 291.200096] __should_failslab+0x278/0x2a0 [ 291.204370] should_failslab+0x29/0x70 [ 291.208311] __kmalloc_track_caller+0x1f4/0xc60 [ 291.213059] ? ksys_mount+0x193/0x3d0 [ 291.216945] ? strnlen_user+0x371/0x470 [ 291.220991] strndup_user+0x154/0x360 [ 291.224866] ksys_mount+0x193/0x3d0 [ 291.228595] ? fput+0x257/0x2e0 [ 291.231959] __x64_sys_mount+0x157/0x1c0 [ 291.236079] ? ksys_mount+0x3d0/0x3d0 [ 291.239923] do_syscall_64+0x15b/0x220 [ 291.243867] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.249095] RIP: 0033:0x457089 [ 291.252341] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.271283] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.279044] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 19:17:30 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 291.286355] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 291.293661] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 291.300968] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 291.308282] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000001 19:17:30 executing program 2 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:30 executing program 5 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:30 executing program 1 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:30 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:30 executing program 7 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:30 executing program 6 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 291.623292] FAULT_INJECTION: forcing a failure. [ 291.623292] name failslab, interval 1, probability 0, space 0, times 0 [ 291.634687] CPU: 1 PID: 9548 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 291.641921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.651303] Call Trace: [ 291.653975] dump_stack+0x14b/0x190 [ 291.657686] should_fail+0xa98/0xaa0 [ 291.661476] __should_failslab+0x278/0x2a0 [ 291.665777] should_failslab+0x29/0x70 [ 291.669734] __kmalloc+0xbe/0x350 [ 291.673283] ? copy_mount_options+0x54/0x650 [ 291.677737] ? copy_mount_options+0xad/0x650 [ 291.682203] copy_mount_options+0xad/0x650 [ 291.686502] ? strndup_user+0x332/0x360 [ 291.690558] ksys_mount+0x251/0x3d0 [ 291.694285] __x64_sys_mount+0x157/0x1c0 [ 291.698401] ? ksys_mount+0x3d0/0x3d0 [ 291.702264] do_syscall_64+0x15b/0x220 [ 291.706218] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.711489] RIP: 0033:0x457089 [ 291.714731] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.733678] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.741454] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 291.748770] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 291.756080] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 291.763387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 291.770695] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 [ 291.778942] FAULT_INJECTION: forcing a failure. [ 291.778942] name failslab, interval 1, probability 0, space 0, times 0 [ 291.790283] CPU: 1 PID: 9549 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 291.797514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.806904] Call Trace: [ 291.809561] dump_stack+0x14b/0x190 [ 291.813289] should_fail+0xa98/0xaa0 [ 291.817076] __should_failslab+0x278/0x2a0 [ 291.821367] should_failslab+0x29/0x70 [ 291.825324] __kmalloc+0xbe/0x350 [ 291.828853] ? copy_mount_options+0x54/0x650 [ 291.833312] ? copy_mount_options+0xad/0x650 [ 291.837791] copy_mount_options+0xad/0x650 [ 291.842080] ? strndup_user+0x332/0x360 [ 291.846130] ksys_mount+0x251/0x3d0 [ 291.849847] __x64_sys_mount+0x157/0x1c0 [ 291.853964] ? ksys_mount+0x3d0/0x3d0 [ 291.857833] do_syscall_64+0x15b/0x220 [ 291.861788] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 291.867021] RIP: 0033:0x457089 [ 291.870275] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 291.889236] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 291.895166] FAULT_INJECTION: forcing a failure. [ 291.895166] name failslab, interval 1, probability 0, space 0, times 0 [ 291.896999] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 291.897023] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 19:17:30 executing program 3 (fault-call:3 fault-nth:2): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 291.897045] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 291.897065] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 291.897115] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 [ 291.944688] CPU: 0 PID: 9557 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 291.951907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.961290] Call Trace: [ 291.963936] dump_stack+0x14b/0x190 [ 291.967641] should_fail+0xa98/0xaa0 19:17:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 291.971424] __should_failslab+0x278/0x2a0 [ 291.975738] should_failslab+0x29/0x70 [ 291.979692] __kmalloc+0xbe/0x350 [ 291.983213] ? copy_mount_options+0x54/0x650 [ 291.987699] ? copy_mount_options+0xad/0x650 [ 291.992168] copy_mount_options+0xad/0x650 [ 291.996433] ? strndup_user+0x332/0x360 [ 292.000526] ksys_mount+0x251/0x3d0 [ 292.004281] __x64_sys_mount+0x157/0x1c0 [ 292.008388] ? ksys_mount+0x3d0/0x3d0 [ 292.012286] do_syscall_64+0x15b/0x220 [ 292.016233] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 292.021460] RIP: 0033:0x457089 [ 292.024685] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.043613] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.051364] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 [ 292.058658] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 292.065959] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 292.073300] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 292.080599] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 [ 292.089823] FAULT_INJECTION: forcing a failure. [ 292.089823] name failslab, interval 1, probability 0, space 0, times 0 [ 292.101145] CPU: 0 PID: 9559 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 292.108372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.117768] Call Trace: [ 292.120435] dump_stack+0x14b/0x190 [ 292.124244] should_fail+0xa98/0xaa0 [ 292.128033] __should_failslab+0x278/0x2a0 [ 292.132335] should_failslab+0x29/0x70 [ 292.136319] __kmalloc+0xbe/0x350 [ 292.139839] ? copy_mount_options+0x54/0x650 [ 292.144309] ? copy_mount_options+0xad/0x650 [ 292.148788] copy_mount_options+0xad/0x650 [ 292.153074] ? strndup_user+0x332/0x360 [ 292.157124] ksys_mount+0x251/0x3d0 [ 292.160883] __x64_sys_mount+0x157/0x1c0 [ 292.164998] ? ksys_mount+0x3d0/0x3d0 [ 292.168845] do_syscall_64+0x15b/0x220 [ 292.172799] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 292.178114] RIP: 0033:0x457089 [ 292.181356] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.200306] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.208085] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 292.215392] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 292.222693] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 292.230100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 292.237421] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 [ 292.251265] FAULT_INJECTION: forcing a failure. [ 292.251265] name failslab, interval 1, probability 0, space 0, times 0 [ 292.262561] CPU: 0 PID: 9560 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 292.269795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.279169] Call Trace: [ 292.281816] dump_stack+0x14b/0x190 [ 292.285523] should_fail+0xa98/0xaa0 [ 292.289309] __should_failslab+0x278/0x2a0 [ 292.293612] should_failslab+0x29/0x70 [ 292.297563] __kmalloc+0xbe/0x350 [ 292.301083] ? copy_mount_options+0x54/0x650 [ 292.305533] ? copy_mount_options+0xad/0x650 [ 292.309981] copy_mount_options+0xad/0x650 [ 292.314307] ? strndup_user+0x332/0x360 [ 292.318360] ksys_mount+0x251/0x3d0 [ 292.322061] __x64_sys_mount+0x157/0x1c0 [ 292.326172] ? ksys_mount+0x3d0/0x3d0 [ 292.330021] do_syscall_64+0x15b/0x220 [ 292.333966] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 292.339190] RIP: 0033:0x457089 [ 292.342435] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.361382] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.369147] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 292.376470] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 292.383789] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 292.391091] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 292.398390] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 19:17:31 executing program 2 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:31 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:31 executing program 5 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:31 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:31 executing program 6 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:31 executing program 7 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 292.706293] FAULT_INJECTION: forcing a failure. [ 292.706293] name failslab, interval 1, probability 0, space 0, times 0 [ 292.717794] CPU: 1 PID: 9576 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 292.725028] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.734416] Call Trace: [ 292.737064] dump_stack+0x14b/0x190 [ 292.740768] should_fail+0xa98/0xaa0 [ 292.744549] __should_failslab+0x278/0x2a0 [ 292.748844] should_failslab+0x29/0x70 [ 292.752782] kmem_cache_alloc+0x127/0xb20 [ 292.756981] ? __msan_poison_alloca+0x173/0x1f0 [ 292.761694] ? getname_flags+0x127/0xaa0 [ 292.765870] ? kmsan_set_origin_inline+0x6b/0x120 [ 292.770787] getname_flags+0x127/0xaa0 [ 292.774772] ? kmsan_set_origin_inline+0x6b/0x120 [ 292.779666] user_path_at_empty+0xbb/0x140 [ 292.783951] do_mount+0x27f/0x56b0 [ 292.787629] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 292.793170] ksys_mount+0x32e/0x3d0 [ 292.796927] __x64_sys_mount+0x157/0x1c0 [ 292.801087] ? ksys_mount+0x3d0/0x3d0 [ 292.804931] do_syscall_64+0x15b/0x220 [ 292.808876] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 292.814109] RIP: 0033:0x457089 [ 292.817345] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.836286] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 292.844045] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 292.851347] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 292.858655] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 292.865950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 292.873270] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 [ 292.882602] FAULT_INJECTION: forcing a failure. [ 292.882602] name failslab, interval 1, probability 0, space 0, times 0 [ 292.885462] FAULT_INJECTION: forcing a failure. [ 292.885462] name failslab, interval 1, probability 0, space 0, times 0 [ 292.893909] CPU: 1 PID: 9577 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 292.893928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.893941] Call Trace: [ 292.894027] dump_stack+0x14b/0x190 [ 292.928000] should_fail+0xa98/0xaa0 [ 292.931778] __should_failslab+0x278/0x2a0 [ 292.936056] should_failslab+0x29/0x70 [ 292.939978] kmem_cache_alloc+0x127/0xb20 [ 292.944157] ? __msan_poison_alloca+0x173/0x1f0 [ 292.948867] ? getname_flags+0x127/0xaa0 [ 292.952992] ? kmsan_set_origin_inline+0x6b/0x120 [ 292.957871] getname_flags+0x127/0xaa0 [ 292.961842] ? kmsan_set_origin_inline+0x6b/0x120 [ 292.966733] user_path_at_empty+0xbb/0x140 [ 292.971038] do_mount+0x27f/0x56b0 [ 292.974614] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 292.980129] ksys_mount+0x32e/0x3d0 [ 292.983819] __x64_sys_mount+0x157/0x1c0 [ 292.987948] ? ksys_mount+0x3d0/0x3d0 [ 292.991786] do_syscall_64+0x15b/0x220 [ 292.995769] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 293.000988] RIP: 0033:0x457089 [ 293.004211] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.023336] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 293.031079] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 293.038370] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 293.045659] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 293.052951] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 293.060248] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 [ 293.067570] CPU: 0 PID: 9569 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 293.074809] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.084196] Call Trace: [ 293.086884] dump_stack+0x14b/0x190 [ 293.090590] should_fail+0xa98/0xaa0 [ 293.094360] __should_failslab+0x278/0x2a0 [ 293.098641] should_failslab+0x29/0x70 [ 293.102589] __kmalloc+0xbe/0x350 [ 293.106117] ? copy_mount_options+0x54/0x650 [ 293.110553] ? copy_mount_options+0xad/0x650 [ 293.114999] copy_mount_options+0xad/0x650 [ 293.119300] ? strndup_user+0x332/0x360 [ 293.123355] ksys_mount+0x251/0x3d0 [ 293.127058] __x64_sys_mount+0x157/0x1c0 [ 293.131162] ? ksys_mount+0x3d0/0x3d0 [ 293.135006] do_syscall_64+0x15b/0x220 [ 293.138939] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 293.144182] RIP: 0033:0x457089 [ 293.147436] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.159155] FAULT_INJECTION: forcing a failure. [ 293.159155] name failslab, interval 1, probability 0, space 0, times 0 [ 293.166369] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 293.166404] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 293.166425] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 293.166444] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 293.166461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 293.166509] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000002 [ 293.221812] CPU: 1 PID: 9585 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 293.229038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.238416] Call Trace: [ 293.241087] dump_stack+0x14b/0x190 [ 293.244780] should_fail+0xa98/0xaa0 [ 293.248563] __should_failslab+0x278/0x2a0 [ 293.252839] should_failslab+0x29/0x70 19:17:32 executing program 1 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 293.256775] kmem_cache_alloc+0x127/0xb20 [ 293.260967] ? __msan_poison_alloca+0x173/0x1f0 [ 293.265679] ? getname_flags+0x127/0xaa0 [ 293.269834] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.274726] getname_flags+0x127/0xaa0 [ 293.278699] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.283601] user_path_at_empty+0xbb/0x140 [ 293.287884] do_mount+0x27f/0x56b0 [ 293.291471] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 293.296993] ksys_mount+0x32e/0x3d0 [ 293.300705] __x64_sys_mount+0x157/0x1c0 [ 293.304829] ? ksys_mount+0x3d0/0x3d0 [ 293.308669] do_syscall_64+0x15b/0x220 [ 293.312610] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 293.317828] RIP: 0033:0x457089 [ 293.321081] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.340049] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 293.347799] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 19:17:32 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 293.355100] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 293.362397] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 293.369694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 293.376996] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 [ 293.386345] FAULT_INJECTION: forcing a failure. [ 293.386345] name failslab, interval 1, probability 0, space 0, times 0 [ 293.397671] CPU: 1 PID: 9589 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 293.404928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.414323] Call Trace: [ 293.416993] dump_stack+0x14b/0x190 [ 293.420680] should_fail+0xa98/0xaa0 [ 293.424459] __should_failslab+0x278/0x2a0 [ 293.428769] should_failslab+0x29/0x70 [ 293.432713] kmem_cache_alloc+0x127/0xb20 [ 293.436910] ? __msan_poison_alloca+0x173/0x1f0 [ 293.441644] ? getname_flags+0x127/0xaa0 [ 293.445797] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.450705] getname_flags+0x127/0xaa0 [ 293.454695] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.459630] user_path_at_empty+0xbb/0x140 [ 293.463917] do_mount+0x27f/0x56b0 [ 293.467542] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 293.473069] ksys_mount+0x32e/0x3d0 [ 293.476784] __x64_sys_mount+0x157/0x1c0 [ 293.480912] ? ksys_mount+0x3d0/0x3d0 [ 293.484763] do_syscall_64+0x15b/0x220 [ 293.488709] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 293.493940] RIP: 0033:0x457089 [ 293.497187] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.516145] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 293.523913] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 293.531244] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 293.538548] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 293.545847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 19:17:32 executing program 3 (fault-call:3 fault-nth:3): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 293.553144] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 19:17:32 executing program 5 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 293.653490] FAULT_INJECTION: forcing a failure. [ 293.653490] name failslab, interval 1, probability 0, space 0, times 0 [ 293.664903] CPU: 0 PID: 9599 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 293.672126] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 293.681506] Call Trace: [ 293.684153] dump_stack+0x14b/0x190 [ 293.687847] should_fail+0xa98/0xaa0 [ 293.691618] __should_failslab+0x278/0x2a0 [ 293.695900] should_failslab+0x29/0x70 [ 293.699826] kmem_cache_alloc+0x127/0xb20 [ 293.704024] ? __msan_poison_alloca+0x173/0x1f0 [ 293.708760] ? getname_flags+0x127/0xaa0 [ 293.712907] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.717805] getname_flags+0x127/0xaa0 [ 293.721824] ? kmsan_set_origin_inline+0x6b/0x120 [ 293.726741] user_path_at_empty+0xbb/0x140 [ 293.731043] do_mount+0x27f/0x56b0 [ 293.734717] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 293.740272] ksys_mount+0x32e/0x3d0 [ 293.743977] __x64_sys_mount+0x157/0x1c0 [ 293.748107] ? ksys_mount+0x3d0/0x3d0 [ 293.751944] do_syscall_64+0x15b/0x220 [ 293.755895] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 293.761118] RIP: 0033:0x457089 [ 293.764354] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 293.783296] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 293.791055] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 19:17:32 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:32 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:32 executing program 2 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 293.798355] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 293.805656] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 293.812971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 293.820275] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 [ 293.979114] FAULT_INJECTION: forcing a failure. [ 293.979114] name failslab, interval 1, probability 0, space 0, times 0 [ 293.987016] FAULT_INJECTION: forcing a failure. [ 293.987016] name failslab, interval 1, probability 0, space 0, times 0 [ 293.990643] CPU: 1 PID: 9614 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 294.008875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.018252] Call Trace: [ 294.020897] dump_stack+0x14b/0x190 [ 294.024584] should_fail+0xa98/0xaa0 [ 294.028368] __should_failslab+0x278/0x2a0 [ 294.032653] should_failslab+0x29/0x70 [ 294.036597] kmem_cache_alloc+0x127/0xb20 [ 294.040791] ? alloc_vfsmnt+0x73/0xb10 [ 294.044763] alloc_vfsmnt+0x73/0xb10 [ 294.048535] vfs_kern_mount+0xb2/0x8d0 [ 294.052461] do_mount+0xcee/0x56b0 [ 294.056076] ksys_mount+0x32e/0x3d0 [ 294.059776] __x64_sys_mount+0x157/0x1c0 [ 294.063874] ? ksys_mount+0x3d0/0x3d0 [ 294.067706] do_syscall_64+0x15b/0x220 [ 294.071652] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.076881] RIP: 0033:0x457089 [ 294.080114] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.099075] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.106821] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 294.114113] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 294.121407] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 294.129172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 294.136466] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 [ 294.143800] CPU: 0 PID: 9616 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 294.151022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.152352] FAULT_INJECTION: forcing a failure. [ 294.152352] name failslab, interval 1, probability 0, space 0, times 0 [ 294.160398] Call Trace: [ 294.160454] dump_stack+0x14b/0x190 [ 294.160501] should_fail+0xa98/0xaa0 [ 294.160584] __should_failslab+0x278/0x2a0 [ 294.160645] should_failslab+0x29/0x70 [ 294.189888] kmem_cache_alloc+0x127/0xb20 [ 294.194068] ? alloc_vfsmnt+0x73/0xb10 [ 294.198018] alloc_vfsmnt+0x73/0xb10 [ 294.201765] vfs_kern_mount+0xb2/0x8d0 [ 294.205692] do_mount+0xcee/0x56b0 [ 294.209321] ksys_mount+0x32e/0x3d0 [ 294.213015] __x64_sys_mount+0x157/0x1c0 [ 294.217111] ? ksys_mount+0x3d0/0x3d0 [ 294.220951] do_syscall_64+0x15b/0x220 [ 294.224877] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.230088] RIP: 0033:0x457089 [ 294.233337] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.252268] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.260012] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 294.267325] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 294.274620] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 294.281909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 294.289196] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 [ 294.296531] CPU: 1 PID: 9615 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 294.303771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.313179] Call Trace: [ 294.316043] dump_stack+0x14b/0x190 [ 294.319721] should_fail+0xa98/0xaa0 [ 294.323509] __should_failslab+0x278/0x2a0 [ 294.327790] should_failslab+0x29/0x70 [ 294.331716] kmem_cache_alloc+0x127/0xb20 [ 294.335915] ? __msan_poison_alloca+0x173/0x1f0 [ 294.340623] ? getname_flags+0x127/0xaa0 [ 294.344768] ? kmsan_set_origin_inline+0x6b/0x120 [ 294.349683] getname_flags+0x127/0xaa0 [ 294.353643] ? kmsan_set_origin_inline+0x6b/0x120 [ 294.358537] user_path_at_empty+0xbb/0x140 [ 294.362816] do_mount+0x27f/0x56b0 [ 294.366443] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 294.371965] ksys_mount+0x32e/0x3d0 [ 294.375701] __x64_sys_mount+0x157/0x1c0 19:17:33 executing program 7 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 294.379813] ? ksys_mount+0x3d0/0x3d0 [ 294.383648] do_syscall_64+0x15b/0x220 [ 294.387583] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.392813] RIP: 0033:0x457089 [ 294.396045] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.414979] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.422730] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 19:17:33 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:33 executing program 6 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 294.430052] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 294.437354] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 294.444649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 294.451946] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000003 [ 294.598666] FAULT_INJECTION: forcing a failure. [ 294.598666] name failslab, interval 1, probability 0, space 0, times 0 [ 294.610046] CPU: 1 PID: 9629 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 294.617269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.626672] Call Trace: [ 294.629376] dump_stack+0x14b/0x190 [ 294.633065] should_fail+0xa98/0xaa0 [ 294.636870] __should_failslab+0x278/0x2a0 [ 294.641155] should_failslab+0x29/0x70 [ 294.645110] kmem_cache_alloc+0x127/0xb20 [ 294.649302] ? alloc_vfsmnt+0x73/0xb10 [ 294.653275] alloc_vfsmnt+0x73/0xb10 [ 294.657041] vfs_kern_mount+0xb2/0x8d0 [ 294.660984] do_mount+0xcee/0x56b0 [ 294.664615] ksys_mount+0x32e/0x3d0 [ 294.668342] __x64_sys_mount+0x157/0x1c0 [ 294.672466] ? ksys_mount+0x3d0/0x3d0 [ 294.676311] do_syscall_64+0x15b/0x220 [ 294.680263] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.685491] RIP: 0033:0x457089 19:17:33 executing program 1 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 294.688723] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.707677] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.715459] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 [ 294.722767] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 294.730071] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 294.737374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 294.744675] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 [ 294.774292] FAULT_INJECTION: forcing a failure. [ 294.774292] name failslab, interval 1, probability 0, space 0, times 0 [ 294.785719] CPU: 1 PID: 9631 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 294.792943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 294.802323] Call Trace: [ 294.805072] dump_stack+0x14b/0x190 [ 294.808786] should_fail+0xa98/0xaa0 [ 294.812563] __should_failslab+0x278/0x2a0 [ 294.816850] should_failslab+0x29/0x70 19:17:33 executing program 5 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 294.820809] kmem_cache_alloc+0x127/0xb20 [ 294.824997] ? alloc_vfsmnt+0x73/0xb10 [ 294.828974] alloc_vfsmnt+0x73/0xb10 [ 294.832754] vfs_kern_mount+0xb2/0x8d0 [ 294.836693] do_mount+0xcee/0x56b0 [ 294.840338] ksys_mount+0x32e/0x3d0 [ 294.844080] __x64_sys_mount+0x157/0x1c0 [ 294.848186] ? ksys_mount+0x3d0/0x3d0 [ 294.852037] do_syscall_64+0x15b/0x220 [ 294.855975] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 294.861196] RIP: 0033:0x457089 19:17:33 executing program 3 (fault-call:3 fault-nth:4): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:33 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:33 executing program 2 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 294.864466] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 294.883401] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 294.891178] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 294.898506] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 294.905816] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 294.913119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 294.920446] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 19:17:34 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 295.060107] FAULT_INJECTION: forcing a failure. [ 295.060107] name failslab, interval 1, probability 0, space 0, times 0 [ 295.071613] CPU: 0 PID: 9646 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 295.078835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.088224] Call Trace: [ 295.090890] dump_stack+0x14b/0x190 [ 295.094582] should_fail+0xa98/0xaa0 [ 295.098362] __should_failslab+0x278/0x2a0 [ 295.102676] should_failslab+0x29/0x70 [ 295.106662] kmem_cache_alloc+0x127/0xb20 [ 295.110853] ? alloc_vfsmnt+0x73/0xb10 [ 295.114841] alloc_vfsmnt+0x73/0xb10 [ 295.118627] vfs_kern_mount+0xb2/0x8d0 [ 295.122614] do_mount+0xcee/0x56b0 [ 295.126263] ksys_mount+0x32e/0x3d0 [ 295.129988] __x64_sys_mount+0x157/0x1c0 [ 295.134120] ? ksys_mount+0x3d0/0x3d0 [ 295.137957] do_syscall_64+0x15b/0x220 [ 295.141897] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.147120] RIP: 0033:0x457089 [ 295.150354] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.169289] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.177048] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 295.184351] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 295.191650] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 295.198947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 19:17:34 executing program 0: socket$inet6(0xa, 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000003c0)={@local}) [ 295.206270] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 [ 295.222693] FAULT_INJECTION: forcing a failure. [ 295.222693] name failslab, interval 1, probability 0, space 0, times 0 [ 295.234143] CPU: 0 PID: 9652 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 295.241361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.250742] Call Trace: [ 295.253401] dump_stack+0x14b/0x190 [ 295.257096] should_fail+0xa98/0xaa0 [ 295.260876] __should_failslab+0x278/0x2a0 [ 295.265195] should_failslab+0x29/0x70 [ 295.269149] __kmalloc_track_caller+0x1f4/0xc60 [ 295.273891] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 295.279336] ? alloc_vfsmnt+0x1be/0xb10 [ 295.283507] kstrdup_const+0x154/0x270 [ 295.287479] alloc_vfsmnt+0x1be/0xb10 [ 295.291338] vfs_kern_mount+0xb2/0x8d0 [ 295.295327] do_mount+0xcee/0x56b0 [ 295.298961] ksys_mount+0x32e/0x3d0 [ 295.302692] __x64_sys_mount+0x157/0x1c0 [ 295.306824] ? ksys_mount+0x3d0/0x3d0 [ 295.310680] do_syscall_64+0x15b/0x220 [ 295.314625] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.319881] RIP: 0033:0x457089 [ 295.323141] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.342112] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.349888] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 295.357196] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 295.364552] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 295.371858] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 295.379172] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 [ 295.392719] FAULT_INJECTION: forcing a failure. [ 295.392719] name failslab, interval 1, probability 0, space 0, times 0 [ 295.404146] CPU: 0 PID: 9655 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 295.411376] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.420771] Call Trace: [ 295.423428] dump_stack+0x14b/0x190 [ 295.427149] should_fail+0xa98/0xaa0 [ 295.430929] __should_failslab+0x278/0x2a0 [ 295.435260] should_failslab+0x29/0x70 [ 295.439205] __kmalloc_track_caller+0x1f4/0xc60 [ 295.443955] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 295.449381] ? alloc_vfsmnt+0x1be/0xb10 [ 295.453456] kstrdup_const+0x154/0x270 [ 295.457423] alloc_vfsmnt+0x1be/0xb10 [ 295.461290] vfs_kern_mount+0xb2/0x8d0 [ 295.465281] do_mount+0xcee/0x56b0 [ 295.468908] ksys_mount+0x32e/0x3d0 [ 295.472618] __x64_sys_mount+0x157/0x1c0 [ 295.476754] ? ksys_mount+0x3d0/0x3d0 [ 295.480632] do_syscall_64+0x15b/0x220 [ 295.484584] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.489813] RIP: 0033:0x457089 [ 295.493048] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:17:34 executing program 6 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 295.512008] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.519782] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 295.527085] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 295.534385] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 295.541681] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 295.548982] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 [ 295.705514] FAULT_INJECTION: forcing a failure. [ 295.705514] name failslab, interval 1, probability 0, space 0, times 0 [ 295.716865] CPU: 0 PID: 9661 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 295.724080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.733458] Call Trace: [ 295.736114] dump_stack+0x14b/0x190 [ 295.739810] should_fail+0xa98/0xaa0 [ 295.743644] __should_failslab+0x278/0x2a0 [ 295.747928] should_failslab+0x29/0x70 [ 295.751933] kmem_cache_alloc+0x127/0xb20 [ 295.756135] ? alloc_vfsmnt+0x73/0xb10 [ 295.760100] alloc_vfsmnt+0x73/0xb10 [ 295.763886] vfs_kern_mount+0xb2/0x8d0 [ 295.767592] FAULT_INJECTION: forcing a failure. [ 295.767592] name failslab, interval 1, probability 0, space 0, times 0 [ 295.767850] do_mount+0xcee/0x56b0 [ 295.767926] ksys_mount+0x32e/0x3d0 [ 295.767991] __x64_sys_mount+0x157/0x1c0 [ 295.768029] ? ksys_mount+0x3d0/0x3d0 [ 295.768063] do_syscall_64+0x15b/0x220 [ 295.768133] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.803395] RIP: 0033:0x457089 [ 295.806623] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.825561] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.833337] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 295.840642] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 295.847949] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 19:17:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f, 0x2300000000000000, 0x4700000000000000}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x14, 0x22, 0x1, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000100)=0xc) rt_sigqueueinfo(r1, 0x2, &(0x7f0000000140)={0x2d, 0x20000000, 0x6, 0x101}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000380)="58cba7c959e4278924b53a8f4bae26b1", 0x10) [ 295.855252] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 295.862549] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000004 [ 295.869882] CPU: 1 PID: 9665 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 295.877125] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 295.886500] Call Trace: [ 295.889140] dump_stack+0x14b/0x190 [ 295.892883] should_fail+0xa98/0xaa0 [ 295.896670] __should_failslab+0x278/0x2a0 [ 295.900975] should_failslab+0x29/0x70 [ 295.904921] __kmalloc_track_caller+0x1f4/0xc60 [ 295.909625] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 295.915021] ? alloc_vfsmnt+0x1be/0xb10 [ 295.919078] kstrdup_const+0x154/0x270 [ 295.923038] alloc_vfsmnt+0x1be/0xb10 [ 295.926873] vfs_kern_mount+0xb2/0x8d0 [ 295.930808] do_mount+0xcee/0x56b0 [ 295.934423] ksys_mount+0x32e/0x3d0 [ 295.938127] __x64_sys_mount+0x157/0x1c0 [ 295.942237] ? ksys_mount+0x3d0/0x3d0 [ 295.946071] do_syscall_64+0x15b/0x220 [ 295.950000] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 295.955221] RIP: 0033:0x457089 [ 295.958452] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 295.977383] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 295.985140] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 295.992446] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 295.999739] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 296.007040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 296.014347] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 19:17:35 executing program 1 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:35 executing program 7 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:35 executing program 5 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:35 executing program 2 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:35 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 296.315551] FAULT_INJECTION: forcing a failure. [ 296.315551] name failslab, interval 1, probability 0, space 0, times 0 [ 296.326992] CPU: 1 PID: 9683 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 296.334237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.343630] Call Trace: [ 296.346305] dump_stack+0x14b/0x190 [ 296.350033] should_fail+0xa98/0xaa0 [ 296.353818] __should_failslab+0x278/0x2a0 [ 296.358130] should_failslab+0x29/0x70 [ 296.362070] __kmalloc_track_caller+0x1f4/0xc60 [ 296.366789] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 296.372223] ? alloc_vfsmnt+0x1be/0xb10 [ 296.376314] kstrdup_const+0x154/0x270 [ 296.380294] alloc_vfsmnt+0x1be/0xb10 [ 296.384142] vfs_kern_mount+0xb2/0x8d0 [ 296.388101] do_mount+0xcee/0x56b0 [ 296.391790] ksys_mount+0x32e/0x3d0 [ 296.395496] __x64_sys_mount+0x157/0x1c0 [ 296.399611] ? ksys_mount+0x3d0/0x3d0 [ 296.403454] do_syscall_64+0x15b/0x220 [ 296.407399] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.412628] RIP: 0033:0x457089 [ 296.414647] FAULT_INJECTION: forcing a failure. [ 296.414647] name failslab, interval 1, probability 0, space 0, times 0 [ 296.415885] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.415906] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.415945] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 296.415967] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 296.415988] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 296.416007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 296.416059] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 [ 296.490400] CPU: 0 PID: 9685 Comm: syz-executor2 Not tainted 4.19.0-rc1+ #36 [ 296.495416] FAULT_INJECTION: forcing a failure. [ 296.495416] name failslab, interval 1, probability 0, space 0, times 0 [ 296.497620] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.497633] Call Trace: [ 296.497701] dump_stack+0x14b/0x190 [ 296.497795] should_fail+0xa98/0xaa0 [ 296.528256] __should_failslab+0x278/0x2a0 [ 296.532554] should_failslab+0x29/0x70 [ 296.536498] __kmalloc+0xbe/0x350 [ 296.539990] ? nfs_fs_mount+0xf5/0x3df0 [ 296.544007] ? init_once+0x570/0x570 [ 296.547747] nfs_fs_mount+0xf5/0x3df0 [ 296.551580] ? nfs_parse_mount_options+0x5090/0x5090 [ 296.556728] ? nfs_fill_super+0xbf0/0xbf0 [ 296.560965] ? init_once+0x570/0x570 [ 296.564744] mount_fs+0x28f/0x760 [ 296.568273] vfs_kern_mount+0x21b/0x8d0 [ 296.572290] do_mount+0xcee/0x56b0 [ 296.575899] ksys_mount+0x32e/0x3d0 [ 296.579594] __x64_sys_mount+0x157/0x1c0 [ 296.583688] ? ksys_mount+0x3d0/0x3d0 [ 296.587519] do_syscall_64+0x15b/0x220 [ 296.591459] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.596671] RIP: 0033:0x457089 [ 296.599908] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.618883] RSP: 002b:00007f4050ce5c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.626638] RAX: ffffffffffffffda RBX: 00007f4050ce66d4 RCX: 0000000000457089 [ 296.633927] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 296.641244] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 296.648535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 296.655826] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000006 [ 296.663142] CPU: 1 PID: 9687 Comm: syz-executor7 Not tainted 4.19.0-rc1+ #36 [ 296.670369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.672430] FAULT_INJECTION: forcing a failure. [ 296.672430] name failslab, interval 1, probability 0, space 0, times 0 [ 296.679759] Call Trace: [ 296.679815] dump_stack+0x14b/0x190 [ 296.679887] should_fail+0xa98/0xaa0 [ 296.679937] __should_failslab+0x278/0x2a0 [ 296.680019] should_failslab+0x29/0x70 [ 296.709238] __kmalloc_track_caller+0x1f4/0xc60 [ 296.713941] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 296.719378] ? alloc_vfsmnt+0x1be/0xb10 [ 296.723432] kstrdup_const+0x154/0x270 [ 296.727396] alloc_vfsmnt+0x1be/0xb10 [ 296.731250] vfs_kern_mount+0xb2/0x8d0 [ 296.735187] do_mount+0xcee/0x56b0 [ 296.738861] ksys_mount+0x32e/0x3d0 [ 296.742554] __x64_sys_mount+0x157/0x1c0 [ 296.746653] ? ksys_mount+0x3d0/0x3d0 [ 296.750486] do_syscall_64+0x15b/0x220 [ 296.754413] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.759625] RIP: 0033:0x457089 [ 296.762849] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.781775] RSP: 002b:00007f9706c7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.789519] RAX: ffffffffffffffda RBX: 00007f9706c7d6d4 RCX: 0000000000457089 [ 296.796808] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 296.804096] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 296.811387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 296.818719] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 [ 296.826063] CPU: 0 PID: 9686 Comm: syz-executor5 Not tainted 4.19.0-rc1+ #36 [ 296.833286] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 296.842678] Call Trace: [ 296.845316] dump_stack+0x14b/0x190 [ 296.849020] should_fail+0xa98/0xaa0 [ 296.852795] __should_failslab+0x278/0x2a0 [ 296.857090] should_failslab+0x29/0x70 [ 296.861030] __kmalloc+0xbe/0x350 [ 296.864521] ? nfs_fs_mount+0xf5/0x3df0 [ 296.868533] ? init_once+0x570/0x570 [ 296.872283] nfs_fs_mount+0xf5/0x3df0 [ 296.876121] ? nfs_parse_mount_options+0x5090/0x5090 [ 296.881272] ? nfs_fill_super+0xbf0/0xbf0 [ 296.885494] ? init_once+0x570/0x570 [ 296.889291] mount_fs+0x28f/0x760 [ 296.892787] vfs_kern_mount+0x21b/0x8d0 [ 296.896794] do_mount+0xcee/0x56b0 [ 296.900401] ksys_mount+0x32e/0x3d0 [ 296.904120] __x64_sys_mount+0x157/0x1c0 [ 296.908260] ? ksys_mount+0x3d0/0x3d0 [ 296.912096] do_syscall_64+0x15b/0x220 [ 296.916041] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 296.921282] RIP: 0033:0x457089 [ 296.924511] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 296.943438] RSP: 002b:00007f50a0d7cc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 296.951179] RAX: ffffffffffffffda RBX: 00007f50a0d7d6d4 RCX: 0000000000457089 [ 296.958480] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 296.965807] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 296.973121] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 296.980415] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000006 19:17:36 executing program 1 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:36 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:36 executing program 0: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:36 executing program 6 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 297.381374] FAULT_INJECTION: forcing a failure. [ 297.381374] name failslab, interval 1, probability 0, space 0, times 0 [ 297.392792] CPU: 1 PID: 9706 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 297.400011] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.409747] Call Trace: [ 297.412401] dump_stack+0x14b/0x190 [ 297.416110] should_fail+0xa98/0xaa0 [ 297.419881] __should_failslab+0x278/0x2a0 [ 297.424186] should_failslab+0x29/0x70 [ 297.428159] __kmalloc+0xbe/0x350 19:17:36 executing program 3 (fault-call:3 fault-nth:5): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:36 executing program 5: r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) chmod(&(0x7f0000000280)='./file0\x00', 0x50) accept(r0, &(0x7f00000001c0)=@pppoe, &(0x7f0000000240)=0x80) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 297.431661] ? nfs_fs_mount+0xf5/0x3df0 [ 297.435691] ? init_once+0x570/0x570 [ 297.439468] nfs_fs_mount+0xf5/0x3df0 [ 297.443312] ? nfs_parse_mount_options+0x5090/0x5090 [ 297.448470] ? nfs_fill_super+0xbf0/0xbf0 [ 297.452707] ? init_once+0x570/0x570 [ 297.456514] mount_fs+0x28f/0x760 [ 297.460017] vfs_kern_mount+0x21b/0x8d0 [ 297.464055] do_mount+0xcee/0x56b0 [ 297.467681] ksys_mount+0x32e/0x3d0 [ 297.471418] __x64_sys_mount+0x157/0x1c0 [ 297.475532] ? ksys_mount+0x3d0/0x3d0 [ 297.479381] do_syscall_64+0x15b/0x220 [ 297.483326] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.488551] RIP: 0033:0x457089 [ 297.491786] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.510727] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.518494] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 19:17:36 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 297.525815] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 297.533125] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 297.540424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 297.547750] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000006 [ 297.572234] FAULT_INJECTION: forcing a failure. [ 297.572234] name failslab, interval 1, probability 0, space 0, times 0 [ 297.583719] CPU: 0 PID: 9710 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 297.590958] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.600338] Call Trace: [ 297.603041] dump_stack+0x14b/0x190 [ 297.606788] should_fail+0xa98/0xaa0 [ 297.610585] __should_failslab+0x278/0x2a0 [ 297.614902] should_failslab+0x29/0x70 [ 297.618834] __kmalloc_track_caller+0x1f4/0xc60 [ 297.623553] ? kmsan_internal_unpoison_shadow+0x83/0xe0 [ 297.628957] ? alloc_vfsmnt+0x1be/0xb10 [ 297.630324] FAULT_INJECTION: forcing a failure. [ 297.630324] name failslab, interval 1, probability 0, space 0, times 0 [ 297.633003] kstrdup_const+0x154/0x270 [ 297.633062] alloc_vfsmnt+0x1be/0xb10 [ 297.633116] vfs_kern_mount+0xb2/0x8d0 [ 297.655884] do_mount+0xcee/0x56b0 [ 297.659495] ksys_mount+0x32e/0x3d0 [ 297.663190] __x64_sys_mount+0x157/0x1c0 [ 297.667301] ? ksys_mount+0x3d0/0x3d0 [ 297.671133] do_syscall_64+0x15b/0x220 [ 297.675059] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.680285] RIP: 0033:0x457089 [ 297.683538] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.702464] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.710206] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 297.717528] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 297.724819] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 297.732134] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 297.739423] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000005 [ 297.746912] CPU: 1 PID: 9707 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 297.754128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.763498] Call Trace: [ 297.766143] dump_stack+0x14b/0x190 [ 297.769849] should_fail+0xa98/0xaa0 [ 297.773626] __should_failslab+0x278/0x2a0 [ 297.777968] should_failslab+0x29/0x70 [ 297.781919] __kmalloc+0xbe/0x350 [ 297.785422] ? nfs_fs_mount+0xf5/0x3df0 [ 297.789440] ? init_once+0x570/0x570 [ 297.793197] nfs_fs_mount+0xf5/0x3df0 [ 297.797054] ? nfs_parse_mount_options+0x5090/0x5090 [ 297.802222] ? nfs_fill_super+0xbf0/0xbf0 [ 297.806457] ? init_once+0x570/0x570 [ 297.810272] mount_fs+0x28f/0x760 [ 297.813788] vfs_kern_mount+0x21b/0x8d0 [ 297.817816] do_mount+0xcee/0x56b0 [ 297.821443] ksys_mount+0x32e/0x3d0 [ 297.825147] __x64_sys_mount+0x157/0x1c0 [ 297.829347] ? ksys_mount+0x3d0/0x3d0 19:17:36 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 297.833191] do_syscall_64+0x15b/0x220 [ 297.837156] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 297.842380] RIP: 0033:0x457089 [ 297.845612] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 297.864548] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 297.872300] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 19:17:36 executing program 0: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 297.879599] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 297.886918] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 297.894235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 297.901544] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000006 19:17:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x7fffffffffe) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:37 executing program 0: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:37 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000200)="d473ed615938deb2f27f7baf36510f75444b8c9e808d7cbdf302d1bceb27dec7e8aa67eca895ebb8baea4a1b8d8c1c32f94f1791b702c85ac32e497530c9a0a68991308ffa41198fc9350266d2f84f4c8baaf5d464e0373cf91bfce4c3a06a3213425d37a110", 0x66}], 0x1, &(0x7f0000000280)=[{0xd8, 0x10a, 0x3, "e6b65d80b234e1d310f3a4a436626e05a3ef59e822ecc2c8bd2b89c712286d1f11630b441ac201fce937c5d737609462cdbbf8f86f308bf43a22749b704cca237ed8ae9ce1e018946965fb43e70e9d46e5d75b868d537f06427fc706b3c3c58e70399d91859350da3bae25255de1c336aa6049d68789d5e03f5eeff5911bd109e272bc10a02c4dc3adb7b91777a007cd415eaf94203a8dd9e71b4a888a628df4c70d8e043a3c704ce3840f0e0a8e79d79d516f2af1f8ea50294659381dc66bc719"}, {0x28, 0x18f, 0x40, "edb72a367e0cdaa1a20dc0edffae6525a1bf336fe349"}, {0xa0, 0x0, 0x2, "bd9e1a2531eecb47e325de655d3c3cd2bc500c613920a213f8740b493a8276cb2a12c50a1ae88d0d5ac777504d58a96dc9285b303df61abd902aa29d55ddffb825ec58ec4b830583efe5964ef8554735b3311c55bfffbbc7990e3445bea60d44554f4783b05f9d16e35536ab871e949c7caee5943568954301a62386172b2fd9fac5fa19760f5c07e4"}, {0xa8, 0x113, 0x2, "4304056da038fa6cae9293999bf6a5a70a9e9fd8c62b889a4407b259da04207cee8826891e5c705f90c5de7ff2f90ec1508d0425c44070ea20e211ed1804a04f2521a53b8ed31effa7bde519ad1d8d614294bd4b97485253611d863b8c22594a8e8e061709a76583d81303196b4e963b218821c1bb6d7e53d5493c9ab2adacbf4ab4e1ca8c3c04257d243cb4f725d95cfe439099d5"}, {0x60, 0x10d, 0x2, "3ba33ca819eefe32fffab755725785e3f393907496a5298b621bc1bccd82c0ff9fecca59ee62885b771069be65d59eb945cf1d26644d64cf2a0bacc736e5407027d7f9dae1e98d99406b08ceb7212a5d"}, {0x100, 0x107, 0x6, "5dd13f34391058f01b972b057b93b5e89b93e9c95a6f62cf6579a0ddec031eea8741307a7b0e3a117099e3c0d5c8cf7f1b6239e72e8326bf6e4f2d3de222fecfc96370048649e9fdffb32a82a604a694802be875a1d9808e84119bccaaa527e11a7af5bad96a500ef94dd4c237502095bfcc1b5bc6b03231a9d88fa26b355a4ae5a10854a8bee21fa59830cb49e756f026b8678cab97fde8900d1ae753a8cb3e2635f46815c869c3b5d5b92f58f8cb5dd26ddafb19bde4f2496329a7c75324d4bf2d2739bbf992567dfdee7da52ee7297c40f2ab98caa3247e5127962b3545ab8472a3df07e9962e5118"}], 0x3a8, 0x40000}, 0x40080) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:37 executing program 0: perf_event_open(&(0x7f0000000a40)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:37 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:37 executing program 6 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:37 executing program 1 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:37 executing program 3 (fault-call:3 fault-nth:6): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 298.399411] FAULT_INJECTION: forcing a failure. [ 298.399411] name failslab, interval 1, probability 0, space 0, times 0 [ 298.410848] CPU: 1 PID: 9747 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 298.418069] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.427443] Call Trace: [ 298.430088] dump_stack+0x14b/0x190 [ 298.433781] should_fail+0xa98/0xaa0 [ 298.437608] __should_failslab+0x278/0x2a0 [ 298.441931] should_failslab+0x29/0x70 [ 298.445850] __kmalloc+0xbe/0x350 [ 298.449346] ? nfs_alloc_fhandle+0x40/0xf0 [ 298.453661] nfs_alloc_fhandle+0x40/0xf0 [ 298.457774] nfs_fs_mount+0x3ea/0x3df0 [ 298.461720] ? nfs_parse_mount_options+0x5090/0x5090 [ 298.466880] ? nfs_fill_super+0xbf0/0xbf0 [ 298.471123] ? init_once+0x570/0x570 [ 298.474919] mount_fs+0x28f/0x760 [ 298.478432] vfs_kern_mount+0x21b/0x8d0 [ 298.482490] do_mount+0xcee/0x56b0 [ 298.486117] ksys_mount+0x32e/0x3d0 [ 298.489856] __x64_sys_mount+0x157/0x1c0 [ 298.493966] ? ksys_mount+0x3d0/0x3d0 19:17:37 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 298.497816] do_syscall_64+0x15b/0x220 [ 298.501771] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.507053] RIP: 0033:0x457089 [ 298.510313] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.529262] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 298.537028] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 298.544348] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 298.551653] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 298.558986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 298.566290] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000007 [ 298.591923] FAULT_INJECTION: forcing a failure. [ 298.591923] name failslab, interval 1, probability 0, space 0, times 0 [ 298.603335] CPU: 1 PID: 9754 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 298.610556] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.619942] Call Trace: [ 298.622593] dump_stack+0x14b/0x190 [ 298.626347] should_fail+0xa98/0xaa0 [ 298.630142] __should_failslab+0x278/0x2a0 [ 298.634432] should_failslab+0x29/0x70 [ 298.638387] __kmalloc+0xbe/0x350 [ 298.641896] ? nfs_fs_mount+0xf5/0x3df0 [ 298.645919] ? init_once+0x570/0x570 [ 298.649680] nfs_fs_mount+0xf5/0x3df0 [ 298.653534] ? nfs_parse_mount_options+0x5090/0x5090 [ 298.658689] ? nfs_fill_super+0xbf0/0xbf0 [ 298.662936] ? init_once+0x570/0x570 [ 298.666751] mount_fs+0x28f/0x760 [ 298.670271] vfs_kern_mount+0x21b/0x8d0 [ 298.674301] do_mount+0xcee/0x56b0 [ 298.677927] ksys_mount+0x32e/0x3d0 [ 298.681635] __x64_sys_mount+0x157/0x1c0 [ 298.685781] ? ksys_mount+0x3d0/0x3d0 [ 298.689627] do_syscall_64+0x15b/0x220 [ 298.693580] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.698842] RIP: 0033:0x457089 [ 298.702082] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.718084] FAULT_INJECTION: forcing a failure. [ 298.718084] name failslab, interval 1, probability 0, space 0, times 0 [ 298.721055] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 298.721102] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 298.721121] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 298.721140] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 298.721182] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 298.721241] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000006 [ 298.777640] CPU: 0 PID: 9756 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 298.784858] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 298.794265] Call Trace: [ 298.796917] dump_stack+0x14b/0x190 [ 298.800596] should_fail+0xa98/0xaa0 [ 298.804414] __should_failslab+0x278/0x2a0 [ 298.808704] should_failslab+0x29/0x70 [ 298.812636] __kmalloc+0xbe/0x350 [ 298.816136] ? nfs_alloc_fhandle+0x40/0xf0 [ 298.820465] nfs_alloc_fhandle+0x40/0xf0 [ 298.824571] nfs_fs_mount+0x3ea/0x3df0 [ 298.828505] ? nfs_parse_mount_options+0x5090/0x5090 [ 298.833655] ? nfs_fill_super+0xbf0/0xbf0 [ 298.837892] ? init_once+0x570/0x570 [ 298.841691] mount_fs+0x28f/0x760 [ 298.845194] vfs_kern_mount+0x21b/0x8d0 [ 298.849281] do_mount+0xcee/0x56b0 [ 298.852993] ksys_mount+0x32e/0x3d0 [ 298.856705] __x64_sys_mount+0x157/0x1c0 [ 298.860819] ? ksys_mount+0x3d0/0x3d0 [ 298.864663] do_syscall_64+0x15b/0x220 [ 298.868613] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 298.873839] RIP: 0033:0x457089 19:17:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) msgget$private(0x0, 0x20) 19:17:37 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 298.877081] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 298.896018] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 298.903779] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 298.911084] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 298.918395] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 298.925698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 298.933006] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000007 19:17:38 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:38 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:38 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x12100, 0x14) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000180), &(0x7f00000001c0)=0x30) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:38 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:38 executing program 6 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:38 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:38 executing program 3 (fault-call:3 fault-nth:7): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:38 executing program 1 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 299.481363] FAULT_INJECTION: forcing a failure. [ 299.481363] name failslab, interval 1, probability 0, space 0, times 0 [ 299.492903] CPU: 0 PID: 9793 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 299.500128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.509525] Call Trace: [ 299.512175] dump_stack+0x14b/0x190 [ 299.515915] should_fail+0xa98/0xaa0 [ 299.519707] __should_failslab+0x278/0x2a0 [ 299.524019] should_failslab+0x29/0x70 [ 299.527993] __kmalloc_track_caller+0x1f4/0xc60 [ 299.532756] ? trace_kmalloc+0xb2/0x2b0 [ 299.536828] ? nfs_fs_mount+0x221d/0x3df0 [ 299.541035] kstrdup+0xd0/0x1a0 [ 299.544382] nfs_fs_mount+0x221d/0x3df0 [ 299.548408] ? nfs_parse_mount_options+0x5090/0x5090 [ 299.553554] ? nfs_fill_super+0xbf0/0xbf0 [ 299.557802] ? init_once+0x570/0x570 [ 299.561612] mount_fs+0x28f/0x760 [ 299.565121] vfs_kern_mount+0x21b/0x8d0 [ 299.569145] do_mount+0xcee/0x56b0 [ 299.572783] ksys_mount+0x32e/0x3d0 [ 299.576506] __x64_sys_mount+0x157/0x1c0 [ 299.580630] ? ksys_mount+0x3d0/0x3d0 [ 299.584472] do_syscall_64+0x15b/0x220 [ 299.586688] FAULT_INJECTION: forcing a failure. [ 299.586688] name failslab, interval 1, probability 0, space 0, times 0 [ 299.588413] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 299.588441] RIP: 0033:0x457089 [ 299.588479] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.588525] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.634739] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 299.642057] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 299.649351] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 299.656650] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 299.663949] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000008 [ 299.671278] CPU: 1 PID: 9796 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 299.678503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.687883] Call Trace: [ 299.690529] dump_stack+0x14b/0x190 [ 299.694246] should_fail+0xa98/0xaa0 [ 299.698028] __should_failslab+0x278/0x2a0 [ 299.702335] should_failslab+0x29/0x70 [ 299.706542] __kmalloc_track_caller+0x1f4/0xc60 [ 299.711920] ? trace_kmalloc+0xb2/0x2b0 [ 299.715980] ? nfs_fs_mount+0x221d/0x3df0 [ 299.720187] kstrdup+0xd0/0x1a0 [ 299.723525] nfs_fs_mount+0x221d/0x3df0 [ 299.727549] ? nfs_parse_mount_options+0x5090/0x5090 [ 299.732690] ? nfs_fill_super+0xbf0/0xbf0 [ 299.736933] ? init_once+0x570/0x570 [ 299.740730] mount_fs+0x28f/0x760 [ 299.743427] FAULT_INJECTION: forcing a failure. [ 299.743427] name failslab, interval 1, probability 0, space 0, times 0 [ 299.744260] vfs_kern_mount+0x21b/0x8d0 [ 299.744327] do_mount+0xcee/0x56b0 [ 299.763089] ksys_mount+0x32e/0x3d0 [ 299.766813] __x64_sys_mount+0x157/0x1c0 [ 299.770911] ? ksys_mount+0x3d0/0x3d0 [ 299.774791] do_syscall_64+0x15b/0x220 [ 299.778754] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 299.783972] RIP: 0033:0x457089 [ 299.787194] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.806142] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.813885] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 299.821199] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 19:17:38 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:38 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 299.828512] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 299.835798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 299.843086] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000008 [ 299.850420] CPU: 0 PID: 9798 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 299.857634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 299.867009] Call Trace: [ 299.869677] dump_stack+0x14b/0x190 [ 299.873378] should_fail+0xa98/0xaa0 [ 299.877190] __should_failslab+0x278/0x2a0 [ 299.881492] should_failslab+0x29/0x70 [ 299.885439] __kmalloc+0xbe/0x350 [ 299.888935] ? nfs_alloc_fhandle+0x40/0xf0 [ 299.893263] nfs_alloc_fhandle+0x40/0xf0 [ 299.897388] nfs_fs_mount+0x3ea/0x3df0 [ 299.901333] ? nfs_parse_mount_options+0x5090/0x5090 [ 299.906486] ? nfs_fill_super+0xbf0/0xbf0 [ 299.910716] ? init_once+0x570/0x570 [ 299.914509] mount_fs+0x28f/0x760 [ 299.918014] vfs_kern_mount+0x21b/0x8d0 [ 299.922057] do_mount+0xcee/0x56b0 [ 299.925681] ksys_mount+0x32e/0x3d0 [ 299.929382] __x64_sys_mount+0x157/0x1c0 [ 299.933486] ? ksys_mount+0x3d0/0x3d0 [ 299.937326] do_syscall_64+0x15b/0x220 [ 299.941275] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 299.946498] RIP: 0033:0x457089 [ 299.949733] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 299.968667] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 299.976430] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 299.983729] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 299.991029] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 299.998327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 300.005626] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000007 19:17:39 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000180)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) remap_file_pages(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x4, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:39 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x400000, 0x4) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x8000, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x2, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x6, 0x0, 0x8}, 0x0, 0x0, r0, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 6 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 1 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 3 (fault-call:3 fault-nth:8): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:39 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 300.486310] mmap: syz-executor5 (9827) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 300.550332] FAULT_INJECTION: forcing a failure. [ 300.550332] name failslab, interval 1, probability 0, space 0, times 0 [ 300.561793] CPU: 0 PID: 9834 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 300.569009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.578416] Call Trace: [ 300.581092] dump_stack+0x14b/0x190 [ 300.584778] should_fail+0xa98/0xaa0 [ 300.588569] __should_failslab+0x278/0x2a0 [ 300.592874] should_failslab+0x29/0x70 [ 300.596841] __kmalloc+0xbe/0x350 19:17:39 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 300.600387] ? nfs_alloc_server+0x46/0x840 [ 300.604700] nfs_alloc_server+0x46/0x840 [ 300.608809] ? nfs_create_server+0x93/0x31c0 [ 300.613297] ? nfs_try_mount+0x10f3/0x14f0 [ 300.617582] nfs_create_server+0xa8/0x31c0 [ 300.621906] ? __msan_poison_alloca+0x173/0x1f0 [ 300.626657] ? nfs_fs_mount+0x3ea/0x3df0 [ 300.630807] ? should_fail+0x53/0xaa0 [ 300.634700] ? __should_failslab+0x278/0x2a0 [ 300.639239] ? kmsan_set_origin_inline+0x6b/0x120 [ 300.644177] ? nfs_try_mount+0xed/0x14f0 [ 300.648317] ? nfs_fs_mount+0x3765/0x3df0 [ 300.652550] nfs_try_mount+0x10f3/0x14f0 [ 300.656692] ? __msan_poison_alloca+0x173/0x1f0 [ 300.661462] ? try_module_get+0x52/0x3c0 [ 300.665574] ? get_nfs_version+0x4c2/0x550 [ 300.669873] ? try_module_get+0x52/0x3c0 [ 300.674011] ? get_nfs_version+0x4c2/0x550 [ 300.678302] nfs_fs_mount+0x3765/0x3df0 [ 300.682324] ? nfs_parse_mount_options+0x5090/0x5090 [ 300.687471] ? nfs_fill_super+0xbf0/0xbf0 [ 300.691709] ? nfs_auth_info_match+0x190/0x190 [ 300.696368] ? init_once+0x570/0x570 [ 300.700163] mount_fs+0x28f/0x760 [ 300.703685] vfs_kern_mount+0x21b/0x8d0 [ 300.707707] do_mount+0xcee/0x56b0 [ 300.711342] ksys_mount+0x32e/0x3d0 [ 300.715053] __x64_sys_mount+0x157/0x1c0 [ 300.719167] ? ksys_mount+0x3d0/0x3d0 [ 300.723033] do_syscall_64+0x15b/0x220 [ 300.727027] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 300.732272] RIP: 0033:0x457089 [ 300.735504] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.754433] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.762185] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 300.769505] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 300.776808] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 300.784108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 300.791428] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000009 [ 300.806459] FAULT_INJECTION: forcing a failure. [ 300.806459] name failslab, interval 1, probability 0, space 0, times 0 [ 300.817874] CPU: 0 PID: 9845 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 300.825103] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.834487] Call Trace: [ 300.837137] dump_stack+0x14b/0x190 [ 300.840844] should_fail+0xa98/0xaa0 [ 300.844652] __should_failslab+0x278/0x2a0 [ 300.845705] FAULT_INJECTION: forcing a failure. [ 300.845705] name failslab, interval 1, probability 0, space 0, times 0 [ 300.848975] should_failslab+0x29/0x70 [ 300.849086] __kmalloc_track_caller+0x1f4/0xc60 [ 300.849154] ? trace_kmalloc+0xb2/0x2b0 [ 300.849243] ? nfs_fs_mount+0x221d/0x3df0 [ 300.849302] kstrdup+0xd0/0x1a0 [ 300.880429] nfs_fs_mount+0x221d/0x3df0 [ 300.884439] ? nfs_parse_mount_options+0x5090/0x5090 [ 300.889584] ? nfs_fill_super+0xbf0/0xbf0 [ 300.893825] ? init_once+0x570/0x570 [ 300.897623] mount_fs+0x28f/0x760 [ 300.901113] vfs_kern_mount+0x21b/0x8d0 [ 300.905120] do_mount+0xcee/0x56b0 [ 300.908754] ksys_mount+0x32e/0x3d0 [ 300.912465] __x64_sys_mount+0x157/0x1c0 [ 300.916565] ? ksys_mount+0x3d0/0x3d0 [ 300.920398] do_syscall_64+0x15b/0x220 [ 300.924326] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 300.929540] RIP: 0033:0x457089 [ 300.932765] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.951720] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 300.959505] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 300.966822] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 300.974151] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 300.981439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 300.988731] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000008 [ 300.996083] CPU: 1 PID: 9840 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 301.003348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.012815] Call Trace: [ 301.015645] dump_stack+0x14b/0x190 [ 301.019336] should_fail+0xa98/0xaa0 [ 301.023101] __should_failslab+0x278/0x2a0 [ 301.027414] should_failslab+0x29/0x70 [ 301.031369] __kmalloc+0xbe/0x350 [ 301.034910] ? nfs_alloc_server+0x46/0x840 [ 301.039244] nfs_alloc_server+0x46/0x840 [ 301.043342] ? nfs_create_server+0x93/0x31c0 [ 301.047802] ? nfs_try_mount+0x10f3/0x14f0 [ 301.052067] nfs_create_server+0xa8/0x31c0 [ 301.056392] ? __msan_poison_alloca+0x173/0x1f0 [ 301.061291] ? nfs_fs_mount+0x3ea/0x3df0 [ 301.065442] ? should_fail+0x53/0xaa0 [ 301.069331] ? __should_failslab+0x278/0x2a0 [ 301.073820] ? kmsan_set_origin_inline+0x6b/0x120 [ 301.078765] ? nfs_try_mount+0xed/0x14f0 [ 301.082866] ? nfs_fs_mount+0x3765/0x3df0 [ 301.087092] nfs_try_mount+0x10f3/0x14f0 [ 301.091237] ? __msan_poison_alloca+0x173/0x1f0 [ 301.095977] ? try_module_get+0x52/0x3c0 [ 301.100111] ? get_nfs_version+0x4c2/0x550 [ 301.104410] ? try_module_get+0x52/0x3c0 [ 301.108544] ? get_nfs_version+0x4c2/0x550 [ 301.112827] nfs_fs_mount+0x3765/0x3df0 [ 301.116848] ? nfs_parse_mount_options+0x5090/0x5090 [ 301.121987] ? nfs_fill_super+0xbf0/0xbf0 [ 301.126676] ? nfs_auth_info_match+0x190/0x190 [ 301.131293] ? init_once+0x570/0x570 [ 301.135047] mount_fs+0x28f/0x760 [ 301.138545] vfs_kern_mount+0x21b/0x8d0 [ 301.142576] do_mount+0xcee/0x56b0 [ 301.146255] ksys_mount+0x32e/0x3d0 [ 301.149971] __x64_sys_mount+0x157/0x1c0 [ 301.154097] ? ksys_mount+0x3d0/0x3d0 [ 301.157948] do_syscall_64+0x15b/0x220 [ 301.161922] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 301.167145] RIP: 0033:0x457089 [ 301.170377] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.189312] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 301.197058] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 19:17:40 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:40 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 301.204360] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 301.211659] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 301.218957] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 301.226268] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000009 19:17:40 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x101002, 0x2) getdents64(r0, &(0x7f0000000180)=""/101, 0x65) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:40 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x40000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000180)={0x1ff, 0x3, {0x1, 0x0, 0x2b53, 0x0, 0x100000000}}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x3f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:40 executing program 6 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:40 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:40 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380), 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='user.syz\x00', &(0x7f00000001c0)=""/139, 0x8b) [ 301.553355] Unknown ioctl 1080054598 19:17:40 executing program 1 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:40 executing program 3 (fault-call:3 fault-nth:9): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 301.747674] FAULT_INJECTION: forcing a failure. [ 301.747674] name failslab, interval 1, probability 0, space 0, times 0 [ 301.759379] CPU: 0 PID: 9888 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 301.766597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 301.775974] Call Trace: [ 301.778620] dump_stack+0x14b/0x190 [ 301.782307] should_fail+0xa98/0xaa0 [ 301.786128] __should_failslab+0x278/0x2a0 [ 301.790446] should_failslab+0x29/0x70 [ 301.794429] __kmalloc+0xbe/0x350 [ 301.797970] ? __alloc_percpu+0x7a/0x90 [ 301.801996] ? nfs_alloc_fattr+0x47/0x1f0 [ 301.806201] nfs_alloc_fattr+0x47/0x1f0 [ 301.810263] nfs_create_server+0xf0/0x31c0 [ 301.814585] ? __msan_poison_alloca+0x173/0x1f0 [ 301.819332] ? nfs_fs_mount+0x3ea/0x3df0 [ 301.823473] ? should_fail+0x53/0xaa0 [ 301.827353] ? __should_failslab+0x278/0x2a0 [ 301.831853] ? kmsan_set_origin_inline+0x6b/0x120 [ 301.836794] ? nfs_try_mount+0xed/0x14f0 [ 301.838247] FAULT_INJECTION: forcing a failure. [ 301.838247] name failslab, interval 1, probability 0, space 0, times 0 [ 301.840896] ? nfs_fs_mount+0x3765/0x3df0 [ 301.840974] nfs_try_mount+0x10f3/0x14f0 [ 301.841046] ? __msan_poison_alloca+0x173/0x1f0 [ 301.841109] ? try_module_get+0x52/0x3c0 [ 301.841165] ? get_nfs_version+0x4c2/0x550 [ 301.873578] ? try_module_get+0x52/0x3c0 [ 301.877697] ? get_nfs_version+0x4c2/0x550 [ 301.881973] nfs_fs_mount+0x3765/0x3df0 [ 301.885984] ? nfs_parse_mount_options+0x5090/0x5090 [ 301.891115] ? nfs_fill_super+0xbf0/0xbf0 [ 301.895336] ? nfs_auth_info_match+0x190/0x190 [ 301.899979] ? init_once+0x570/0x570 [ 301.903791] mount_fs+0x28f/0x760 [ 301.907302] vfs_kern_mount+0x21b/0x8d0 [ 301.911328] do_mount+0xcee/0x56b0 [ 301.914953] ksys_mount+0x32e/0x3d0 [ 301.918658] __x64_sys_mount+0x157/0x1c0 [ 301.922777] ? ksys_mount+0x3d0/0x3d0 [ 301.926632] do_syscall_64+0x15b/0x220 [ 301.930562] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 301.935862] RIP: 0033:0x457089 [ 301.939095] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 301.958041] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 301.965778] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 301.973100] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 301.980391] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 301.987683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 19:17:41 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 301.994975] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000a [ 302.002294] CPU: 1 PID: 9890 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 302.009517] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.018897] Call Trace: [ 302.021829] dump_stack+0x14b/0x190 [ 302.025510] should_fail+0xa98/0xaa0 [ 302.026137] FAULT_INJECTION: forcing a failure. [ 302.026137] name failslab, interval 1, probability 0, space 0, times 0 [ 302.029284] __should_failslab+0x278/0x2a0 [ 302.029335] should_failslab+0x29/0x70 [ 302.029392] __kmalloc+0xbe/0x350 [ 302.029474] ? nfs_alloc_server+0x46/0x840 [ 302.056478] nfs_alloc_server+0x46/0x840 [ 302.060574] ? nfs_create_server+0x93/0x31c0 [ 302.065020] ? nfs_try_mount+0x10f3/0x14f0 [ 302.069325] nfs_create_server+0xa8/0x31c0 [ 302.073626] ? __msan_poison_alloca+0x173/0x1f0 [ 302.078355] ? nfs_fs_mount+0x3ea/0x3df0 [ 302.082488] ? should_fail+0x53/0xaa0 [ 302.086351] ? __should_failslab+0x278/0x2a0 [ 302.090850] ? kmsan_set_origin_inline+0x6b/0x120 [ 302.095832] ? nfs_try_mount+0xed/0x14f0 [ 302.099956] ? nfs_fs_mount+0x3765/0x3df0 [ 302.104177] nfs_try_mount+0x10f3/0x14f0 [ 302.108311] ? __msan_poison_alloca+0x173/0x1f0 [ 302.113016] ? try_module_get+0x52/0x3c0 [ 302.117127] ? get_nfs_version+0x4c2/0x550 [ 302.121419] ? try_module_get+0x52/0x3c0 [ 302.126047] ? get_nfs_version+0x4c2/0x550 [ 302.130315] nfs_fs_mount+0x3765/0x3df0 [ 302.134321] ? nfs_parse_mount_options+0x5090/0x5090 [ 302.139458] ? nfs_fill_super+0xbf0/0xbf0 [ 302.143682] ? nfs_auth_info_match+0x190/0x190 [ 302.148347] ? init_once+0x570/0x570 [ 302.152126] mount_fs+0x28f/0x760 [ 302.155651] vfs_kern_mount+0x21b/0x8d0 [ 302.159660] do_mount+0xcee/0x56b0 [ 302.163285] ksys_mount+0x32e/0x3d0 [ 302.166979] __x64_sys_mount+0x157/0x1c0 [ 302.171096] ? ksys_mount+0x3d0/0x3d0 [ 302.174950] do_syscall_64+0x15b/0x220 [ 302.178888] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 302.184102] RIP: 0033:0x457089 [ 302.187330] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.206252] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 302.214008] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 302.221300] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 302.228621] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 302.235923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 302.243232] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000009 [ 302.250575] CPU: 0 PID: 9892 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 302.257806] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 302.267182] Call Trace: [ 302.269847] dump_stack+0x14b/0x190 [ 302.273531] should_fail+0xa98/0xaa0 [ 302.277307] __should_failslab+0x278/0x2a0 [ 302.281615] should_failslab+0x29/0x70 [ 302.285572] __kmalloc+0xbe/0x350 [ 302.289143] ? __alloc_percpu+0x7a/0x90 [ 302.293156] ? nfs_alloc_fattr+0x47/0x1f0 [ 302.297366] nfs_alloc_fattr+0x47/0x1f0 [ 302.301381] nfs_create_server+0xf0/0x31c0 [ 302.305703] ? __msan_poison_alloca+0x173/0x1f0 [ 302.310441] ? nfs_fs_mount+0x3ea/0x3df0 [ 302.312456] Unknown ioctl 1080054598 [ 302.314577] ? should_fail+0x53/0xaa0 [ 302.314646] ? __should_failslab+0x278/0x2a0 [ 302.314727] ? kmsan_set_origin_inline+0x6b/0x120 [ 302.314812] ? nfs_try_mount+0xed/0x14f0 [ 302.314853] ? nfs_fs_mount+0x3765/0x3df0 [ 302.339896] nfs_try_mount+0x10f3/0x14f0 [ 302.344039] ? __msan_poison_alloca+0x173/0x1f0 [ 302.348775] ? try_module_get+0x52/0x3c0 [ 302.352881] ? get_nfs_version+0x4c2/0x550 [ 302.357184] ? try_module_get+0x52/0x3c0 [ 302.361351] ? get_nfs_version+0x4c2/0x550 [ 302.365626] nfs_fs_mount+0x3765/0x3df0 [ 302.369650] ? nfs_parse_mount_options+0x5090/0x5090 [ 302.374814] ? nfs_fill_super+0xbf0/0xbf0 [ 302.379048] ? nfs_auth_info_match+0x190/0x190 [ 302.383702] ? init_once+0x570/0x570 [ 302.387487] mount_fs+0x28f/0x760 [ 302.391021] vfs_kern_mount+0x21b/0x8d0 [ 302.395034] do_mount+0xcee/0x56b0 [ 302.398654] ksys_mount+0x32e/0x3d0 [ 302.402370] __x64_sys_mount+0x157/0x1c0 [ 302.406473] ? ksys_mount+0x3d0/0x3d0 [ 302.410317] do_syscall_64+0x15b/0x220 [ 302.414276] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 302.419493] RIP: 0033:0x457089 [ 302.422722] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 302.441656] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 19:17:41 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:41 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 302.449416] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 [ 302.456715] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 302.464016] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 302.471309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 302.478601] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000a 19:17:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x28) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xb42f) 19:17:41 executing program 6 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:41 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x28) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0x0, &(0x7f0000000180)="efaed114ff4bd194284701659401626a0f7024cb5d713c3407380214d16b506eb6d2f97c7c3805525089233fe212f5760afd81006c0281ac59e8e40ef9fd") 19:17:41 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getgid() r3 = getgid() getgroups(0x4, &(0x7f0000000280)=[r0, r1, r2, r3]) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:41 executing program 1 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:41 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:41 executing program 4: socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(0xffffffffffffffff, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:41 executing program 3 (fault-call:3 fault-nth:10): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:42 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000001540)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x20000, 0x90) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x2, &(0x7f0000000240)="eaeeaf5e4a34d2c56d23aaf3142e3e7446413532bd020000000000000002000002612af2225fd9fd00179f83395de808e158f20aabba3bdd249e41d6d089b9ca8922fd0a8faeb2b0863367cd8ca7f1bca67a64ea8a7245ad894130299846932d346a0319f9bc7c4585034b55c3a352a14119b4ff6ac0ad8795f44b8903d8066795dda17f9122279cae7812d8df2d4135b217c0b3a70a034352e82be9cca39f375540a4652130310c") vmsplice(r0, &(0x7f00000014c0)=[{&(0x7f0000000300)="28d344b50b2e367bbbce305334e6ed344723ed29d902a993e65c0d99b66023227d46276fe50171dedd952bd565725e18cba97806b9dbf27823c55a244e63bab66da962321d32e1fd605ee7e8a91e1805593df23433d560", 0x57}, {&(0x7f0000000380)="74e6c989335c1fe6044c41ed284275", 0xf}, {&(0x7f00000003c0)="cb88be776ce18fac44223b8b111846374b8beb3fba38d099f474ce70010f35845ceeb31781ef97f59b20a89d1a7a9bf201128c16395dbda0b24901d80e6ffc54b58d69ef1818fac0b2f8838f066292ff5d09b1ef0d8f03077d7f64241b9411d4d9b93be733bd5cc2f8f72ca3de943336d30c22b99d8a9d1af7a9369e33068745b9382b40596b43ef6bd57a2cddac8847fa88f5e9dc52518a2f7b01e70cd408c5225cc3", 0xa3}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="23c8d1fdc353230f3e6222bd67edbb", 0xf}], 0x5, 0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="7f000800000002000000ffff086c70a3d7000600"], &(0x7f0000000180)=0x18) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x7}, 0x8) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001580)='/dev/ptmx\x00', 0x800, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f00000015c0)={0x7, 0x6, 0x0, 0x3, 0x7}) 19:17:42 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 19:17:42 executing program 4: perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x857, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000140)={{0x77359400}}, &(0x7f0000000180)) [ 303.116081] FAULT_INJECTION: forcing a failure. [ 303.116081] name failslab, interval 1, probability 0, space 0, times 0 [ 303.127581] CPU: 0 PID: 9940 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 303.134804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.144187] Call Trace: [ 303.146857] dump_stack+0x14b/0x190 [ 303.150548] should_fail+0xa98/0xaa0 [ 303.154322] __should_failslab+0x278/0x2a0 [ 303.158644] should_failslab+0x29/0x70 [ 303.162611] __kmalloc+0xbe/0x350 [ 303.166244] ? __alloc_percpu+0x7a/0x90 [ 303.170272] ? nfs_alloc_fattr+0x47/0x1f0 [ 303.174475] nfs_alloc_fattr+0x47/0x1f0 [ 303.178502] nfs_create_server+0xf0/0x31c0 [ 303.182831] ? __msan_poison_alloca+0x173/0x1f0 [ 303.187593] ? nfs_fs_mount+0x3ea/0x3df0 [ 303.191739] ? should_fail+0x53/0xaa0 [ 303.195631] ? __should_failslab+0x278/0x2a0 [ 303.200174] ? kmsan_set_origin_inline+0x6b/0x120 [ 303.205138] ? nfs_try_mount+0xed/0x14f0 [ 303.209266] ? nfs_fs_mount+0x3765/0x3df0 [ 303.213504] nfs_try_mount+0x10f3/0x14f0 [ 303.217661] ? __msan_poison_alloca+0x173/0x1f0 [ 303.222415] ? try_module_get+0x52/0x3c0 [ 303.226528] ? get_nfs_version+0x4c2/0x550 [ 303.230839] ? try_module_get+0x52/0x3c0 [ 303.234976] ? get_nfs_version+0x4c2/0x550 [ 303.239282] nfs_fs_mount+0x3765/0x3df0 [ 303.243357] ? nfs_parse_mount_options+0x5090/0x5090 [ 303.248521] ? nfs_fill_super+0xbf0/0xbf0 [ 303.252806] ? nfs_auth_info_match+0x190/0x190 [ 303.257466] ? init_once+0x570/0x570 [ 303.261290] mount_fs+0x28f/0x760 [ 303.264800] vfs_kern_mount+0x21b/0x8d0 [ 303.268855] do_mount+0xcee/0x56b0 [ 303.272479] ksys_mount+0x32e/0x3d0 [ 303.276197] __x64_sys_mount+0x157/0x1c0 [ 303.280333] ? ksys_mount+0x3d0/0x3d0 [ 303.284175] do_syscall_64+0x15b/0x220 [ 303.288134] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 303.293380] RIP: 0033:0x457089 [ 303.296632] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:17:42 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) [ 303.315590] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 303.323377] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 303.330708] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 303.338039] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 303.345361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 303.352689] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000a [ 303.439103] FAULT_INJECTION: forcing a failure. [ 303.439103] name failslab, interval 1, probability 0, space 0, times 0 [ 303.450528] CPU: 0 PID: 9915 Comm: syz-executor6 Not tainted 4.19.0-rc1+ #36 [ 303.457761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.467159] Call Trace: [ 303.469839] dump_stack+0x14b/0x190 [ 303.473566] should_fail+0xa98/0xaa0 [ 303.477347] __should_failslab+0x278/0x2a0 [ 303.481639] should_failslab+0x29/0x70 [ 303.485583] __kmalloc+0xbe/0x350 [ 303.489105] ? nfs_free_client+0x2ba/0x300 [ 303.493416] ? nfs_alloc_client+0x59/0x940 [ 303.497695] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.502622] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.507517] nfs_alloc_client+0x59/0x940 [ 303.511617] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.516500] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.521422] nfs_get_client+0x103e/0x1750 [ 303.525643] nfs_create_server+0xb33/0x31c0 [ 303.530086] ? should_fail+0x53/0xaa0 [ 303.534005] ? __should_failslab+0x278/0x2a0 [ 303.538514] nfs_try_mount+0x10f3/0x14f0 [ 303.542661] ? __msan_poison_alloca+0x173/0x1f0 [ 303.547407] ? try_module_get+0x52/0x3c0 [ 303.551510] ? get_nfs_version+0x4c2/0x550 [ 303.555825] ? try_module_get+0x52/0x3c0 [ 303.559975] ? get_nfs_version+0x4c2/0x550 [ 303.564284] nfs_fs_mount+0x3765/0x3df0 [ 303.568318] ? nfs_parse_mount_options+0x5090/0x5090 [ 303.573478] ? nfs_fill_super+0xbf0/0xbf0 [ 303.577736] ? nfs_auth_info_match+0x190/0x190 [ 303.582433] ? init_once+0x570/0x570 [ 303.586258] mount_fs+0x28f/0x760 [ 303.589771] vfs_kern_mount+0x21b/0x8d0 [ 303.593817] do_mount+0xcee/0x56b0 [ 303.597482] ksys_mount+0x32e/0x3d0 [ 303.601194] __x64_sys_mount+0x157/0x1c0 [ 303.605324] ? ksys_mount+0x3d0/0x3d0 [ 303.609169] do_syscall_64+0x15b/0x220 [ 303.613127] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 303.618356] RIP: 0033:0x457089 19:17:42 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev}}}}}}, &(0x7f0000000000)) 19:17:42 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1) write$UHID_INPUT(r1, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006) [ 303.621613] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.640567] RSP: 002b:00007fc07e16fc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 303.648343] RAX: ffffffffffffffda RBX: 00007fc07e1706d4 RCX: 0000000000457089 [ 303.655648] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 303.662950] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 303.668690] FAULT_INJECTION: forcing a failure. [ 303.668690] name failslab, interval 1, probability 0, space 0, times 0 [ 303.670257] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 303.670278] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000b [ 303.696530] CPU: 1 PID: 9934 Comm: syz-executor1 Not tainted 4.19.0-rc1+ #36 [ 303.703767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 303.713177] Call Trace: [ 303.715906] dump_stack+0x14b/0x190 [ 303.715991] should_fail+0xa98/0xaa0 [ 303.716042] __should_failslab+0x278/0x2a0 [ 303.716081] should_failslab+0x29/0x70 [ 303.716111] __kmalloc+0xbe/0x350 [ 303.716144] ? nfs_free_client+0x2ba/0x300 [ 303.716223] ? nfs_alloc_client+0x59/0x940 [ 303.716255] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.716312] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.716342] nfs_alloc_client+0x59/0x940 [ 303.716376] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.716406] ? unregister_nfs_version+0x2c0/0x2c0 [ 303.716463] nfs_get_client+0x103e/0x1750 [ 303.716519] nfs_create_server+0xb33/0x31c0 [ 303.716591] ? should_fail+0x53/0xaa0 [ 303.779874] ? __should_failslab+0x278/0x2a0 [ 303.779974] nfs_try_mount+0x10f3/0x14f0 19:17:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0xfe11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='jfs\x00', 0x0, &(0x7f000000a000)) socketpair(0x3, 0x5, 0xbad, &(0x7f0000000100)) [ 303.780044] ? __msan_poison_alloca+0x173/0x1f0 [ 303.780112] ? try_module_get+0x52/0x3c0 [ 303.797409] ? get_nfs_version+0x4c2/0x550 [ 303.797475] ? try_module_get+0x52/0x3c0 [ 303.797529] ? get_nfs_version+0x4c2/0x550 [ 303.797561] nfs_fs_mount+0x3765/0x3df0 [ 303.797594] ? nfs_parse_mount_options+0x5090/0x5090 19:17:42 executing program 3 (fault-call:3 fault-nth:11): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 303.797625] ? nfs_fill_super+0xbf0/0xbf0 [ 303.797702] ? nfs_auth_info_match+0x190/0x190 [ 303.797776] ? init_once+0x570/0x570 19:17:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000100)=0x0) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000180)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000280)=0xe8) lstat(&(0x7f0000000540)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000380)={r1, r3, r4}, 0xc) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r5 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0xc8c00, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r5, 0x404c534a, &(0x7f0000000400)={0x20, 0x4, 0xff}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:43 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x1a, 0x5, &(0x7f0000000100)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x100}, [@ldst={0x3, 0x2, 0x3, 0x6, 0x8, 0xfffffffffffffffc, 0x10}]}, &(0x7f0000000180)='GPL\x00', 0x8001, 0x0, 0x0, 0x41f00, 0x1, [], 0x0, 0xf}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002e40)='/dev/vcs\x00', 0xc0001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002ec0)={{{@in6=@local, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@dev}}, &(0x7f0000002fc0)=0xe8) sendmsg$nl_xfrm(r2, &(0x7f00000032c0)={&(0x7f0000002e80)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000003280)={&(0x7f0000003000)=@delpolicy={0x27c, 0x14, 0x200, 0x70bd2a, 0x25dfdbfc, {{@in, @in=@loopback, 0x4e22, 0x0, 0x4e23, 0xb50, 0x2, 0x20, 0x20, 0xbe, 0x0, r3}, 0x0, 0x1}, [@proto={0x8, 0x19, 0x33}, @ipv4_hthresh={0x8, 0x3, {0x6, 0xf}}, @tmpl={0x144, 0x5, [{{@in=@multicast1, 0x4d3, 0x3b}, 0x2, @in=@multicast1, 0x3504, 0x3, 0x0, 0x3, 0x1, 0xf9, 0x1}, {{@in=@rand_addr=0xd9c, 0x4d3, 0x2b}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x1f}, 0x0, 0x1, 0x1, 0x1, 0x2, 0x480000000000000, 0x400}, {{@in6=@local, 0x4d6, 0x2b}, 0x2, @in6=@remote, 0x3507, 0x7, 0x3, 0x4, 0x7fffffff, 0x5b00000000000000, 0x1}, {{@in=@broadcast, 0x4d2, 0x6c}, 0xa, @in6=@dev={0xfe, 0x80, [], 0xf}, 0x3502, 0x5, 0x3, 0x2, 0x9, 0x4, 0x9}, {{@in6=@mcast2, 0x4d3}, 0xa, @in6=@loopback, 0x3503, 0x3, 0x2, 0x2, 0xc3, 0x3, 0x5}]}, @coaddr={0x14, 0xe, @in=@multicast2}, @mark={0xc, 0x15, {0x350759, 0x5}}, @replay_val={0x10, 0xa, {0x70bd28, 0x70bd27, 0x9}}, @output_mark={0x8, 0x1d, 0x2}, @algo_comp={0xa0, 0x3, {{'deflate\x00'}, 0x2b0, "85a5c77dcfd9dbe4555ffcf87654755f777b523941c4b7dae4ac57932d7ad499fcffe2fb53d870e6bc9106294a3544a8283fe212b74c48503fe2d347d8dd795e0bbf2f5c57632aadbff79613f92c3452a0395836a156"}}]}, 0x27c}, 0x1, 0x0, 0x0, 0x4000010}, 0x4004) [ 303.797853] mount_fs+0x28f/0x760 [ 303.797894] vfs_kern_mount+0x21b/0x8d0 19:17:43 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x4) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], 0x88b) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000640)="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", 0x0, &(0x7f0000000a40)="535bf59eccaa3b89ecf5ba913182d82a4d4006146d3fdb159655ebbbe871d86db2c9dacdb67541ae2dadf4cfcab64926bae010d166a2c0662ff5a75e8bc2bc43345da460e22fe9c1c0c9b0397d6f86226e57f1650f310362a0f592c00247b79b4cfe4fd48053b9eb6431f8ec5807156bea001ab4d405ef763c46bbef39bfb8f2d18c867ebb3390b344ccbfd86b2b2e4acc2b7c03b56cc2cd2542b2fa5a11ff087fa6d46676749d6206adb4679108000000000000000000000000000000") getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x6, 0x9}, &(0x7f0000000280)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000003c0)=ANY=[@ANYRES32=r1, @ANYBLOB="0100010004006548acea06b25caa735c8fa59d26799c6014db05906fb9196a1400d23861b8ab785edffbd292951bd4fca2edf63db697945934f3cbc8c079fa00000000000000000000000000fd0cd219e065a194ae1990676f6340cab8f507329f816c87da61"], &(0x7f0000000300)=0xa) 19:17:43 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, &(0x7f0000000000)) [ 303.797931] do_mount+0xcee/0x56b0 [ 303.798006] ksys_mount+0x32e/0x3d0 [ 303.798073] __x64_sys_mount+0x157/0x1c0 [ 303.798110] ? ksys_mount+0x3d0/0x3d0 [ 303.798140] do_syscall_64+0x15b/0x220 [ 303.798182] entry_SYSCALL_64_after_hwframe+0x63/0xe7 19:17:43 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 303.798219] RIP: 0033:0x457089 [ 303.798254] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 303.798271] RSP: 002b:00007fbea0622c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 303.798305] RAX: ffffffffffffffda RBX: 00007fbea06236d4 RCX: 0000000000457089 19:17:43 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, &(0x7f0000000000)) [ 303.798325] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 303.798344] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 303.798362] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 303.798382] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000b 19:17:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1) write$UHID_INPUT(r1, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006) 19:17:43 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, &(0x7f0000000000)) 19:17:43 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x1) write$UHID_INPUT(r1, &(0x7f0000000140)={0x8, "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", 0x1000}, 0x1006) 19:17:43 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, &(0x7f0000000000)) 19:17:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0x150) [ 304.841306] FAULT_INJECTION: forcing a failure. [ 304.841306] name failslab, interval 1, probability 0, space 0, times 0 [ 304.852859] CPU: 1 PID: 9982 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 304.860097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 304.869496] Call Trace: [ 304.872147] dump_stack+0x14b/0x190 [ 304.875838] should_fail+0xa98/0xaa0 [ 304.879673] __should_failslab+0x278/0x2a0 [ 304.883968] should_failslab+0x29/0x70 [ 304.887901] __kmalloc+0xbe/0x350 [ 304.891410] ? nfs_alloc_client+0x59/0x940 [ 304.895696] ? unregister_nfs_version+0x2c0/0x2c0 [ 304.900594] ? unregister_nfs_version+0x2c0/0x2c0 [ 304.905477] nfs_alloc_client+0x59/0x940 [ 304.909587] ? unregister_nfs_version+0x2c0/0x2c0 [ 304.914470] ? unregister_nfs_version+0x2c0/0x2c0 [ 304.919385] nfs_get_client+0x103e/0x1750 [ 304.923624] nfs_create_server+0xb33/0x31c0 [ 304.928042] ? should_fail+0x53/0xaa0 [ 304.931935] ? __should_failslab+0x278/0x2a0 [ 304.936457] nfs_try_mount+0x10f3/0x14f0 [ 304.940602] ? __msan_poison_alloca+0x173/0x1f0 [ 304.945385] ? try_module_get+0x52/0x3c0 [ 304.949489] ? get_nfs_version+0x4c2/0x550 [ 304.953799] ? try_module_get+0x52/0x3c0 [ 304.957947] ? get_nfs_version+0x4c2/0x550 [ 304.962248] nfs_fs_mount+0x3765/0x3df0 [ 304.966271] ? nfs_parse_mount_options+0x5090/0x5090 [ 304.971417] ? nfs_fill_super+0xbf0/0xbf0 [ 304.975657] ? nfs_auth_info_match+0x190/0x190 [ 304.980319] ? init_once+0x570/0x570 [ 304.984120] mount_fs+0x28f/0x760 [ 304.987630] vfs_kern_mount+0x21b/0x8d0 [ 304.991654] do_mount+0xcee/0x56b0 [ 304.995296] ksys_mount+0x32e/0x3d0 [ 304.999035] __x64_sys_mount+0x157/0x1c0 [ 305.003157] ? ksys_mount+0x3d0/0x3d0 [ 305.007014] do_syscall_64+0x15b/0x220 [ 305.010960] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 305.016425] RIP: 0033:0x457089 [ 305.019707] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:17:44 executing program 6: umount2(&(0x7f0000000100)='./file0\x00', 0x8) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000180)="bd9b30cafea0ef0d43f7") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 305.038650] RSP: 002b:00007fdcde479c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 305.046433] RAX: ffffffffffffffda RBX: 00007fdcde47a6d4 RCX: 0000000000457089 [ 305.053748] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000040 [ 305.061055] RBP: 0000000000930140 R08: 000000002000a000 R09: 0000000000000000 [ 305.068357] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 305.075661] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 000000000000000b 19:17:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {}]}]}}}}}}}, &(0x7f0000000000)) 19:17:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:44 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x100, &(0x7f000000a000)) 19:17:44 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000100)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) 19:17:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xe1bb0e3a4371701b, 0x6, 0xe16, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) socketpair(0xe, 0x5, 0xcd8f, &(0x7f0000000180)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) exit(0x1) 19:17:44 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f00000001c0), 0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800005f}, r2, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x1, 0x30, 0xde87, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={r3, 0x18, "420610414c23529441415bd5fa95ca59ea61011ed5ef5201"}, &(0x7f00000002c0)=0x20) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:44 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:44 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:44 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) futex(&(0x7f0000000100), 0x9, 0x1, &(0x7f00000001c0)={r0, r1+30000000}, &(0x7f0000000200)=0x1, 0x2) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:44 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) execve(&(0x7f0000f8aff8)='./file0\x00', &(0x7f0000000340), &(0x7f0000000280)) gettid() r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/exec\x00') socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) ioctl$int_in(0xffffffffffffffff, 0x0, &(0x7f0000008ff8)) readv(0xffffffffffffffff, &(0x7f0000000100), 0x0) write$P9_RAUTH(r0, &(0x7f0000000000)={0x14}, 0x150) recvfrom$unix(0xffffffffffffffff, &(0x7f0000bf5000), 0x0, 0x0, &(0x7f0000d93ff6)=@abs, 0x8) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) fcntl$setsig(0xffffffffffffffff, 0xa, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000200)={{0x2, 0x0, @loopback}, {0x0, @broadcast}, 0x0, {}, 'veth0_to_bond\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) tkill(0x0, 0x0) statfs(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=""/161) 19:17:44 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8400, 0x0) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) 19:17:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x202000000802, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_flowlabel\x00') sendfile(r1, r2, &(0x7f0000000180)=0x201, 0x7ffffffe) 19:17:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x2) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = dup(r1) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200) renameat(r2, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r3, r4}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0xffffffff) 19:17:45 executing program 3: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0xd7, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000300)={0x800}, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000180)="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") ioctl$RTC_VL_CLR(r0, 0x7014) 19:17:45 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x400000, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000002c0)=""/65) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) name_to_handle_at(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x7d, 0x4, "5daebfb211e132d81f81b979827057f1e34993c62af91ca6feba120975ab927aab2fb3d2772d5668caecb65a2e9782e1aef0a549dd1d4710a28468cc5bf91b6e292f68215b095b5570e457fb3f1a473d432d0b0dcf646086f0e84ec69c9945c795933db336e3db6f8dcaf89fe664dcdaf2ce3390fe"}, &(0x7f0000000240), 0x1400) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000240)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x200000002, 0x70, 0x5, 0x108000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x0, 0x20080) dup2(r0, r1) 19:17:45 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 4: eventfd(0x0) ioctl$void(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x0, 0x1b071, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() rt_tgsigqueueinfo(r0, r1, 0x0, &(0x7f0000000000)) 19:17:45 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x10000, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000380)={{0x7, 0x800}, {0x8}, 0x1, 0x4, 0x81}) ioctl$TCFLSH(r0, 0x540b, 0x5) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x4000, &(0x7f000000a000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x40000, 0x0) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x3) syz_open_dev$sg(&(0x7f00000002c0)='/dev/sg#\x00', 0x80000001, 0x2000) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000340)={0x3, r2}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000300)={'ip6gre0\x00', 0x400}) 19:17:45 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:45 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./file0\x00', 0x0) ioctl$fiemap(r1, 0xc020660b, &(0x7f0000000340)={0x0, 0x10000, 0x4}) 19:17:46 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x6, 0x10}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000240)={r2, 0x7}, &(0x7f0000000280)=0x8) write$binfmt_script(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='#! md5sum%\\ mime_typecpuset nfs\x00\n\x00\x00\x00\x00\x00\x00\x00'], 0x29) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000002c0)=0x1f) 19:17:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:46 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sync() 19:17:46 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:46 executing program 5: r0 = msgget$private(0x0, 0x10) msgrcv(r0, &(0x7f0000001400)={0x0, ""/202}, 0xffffffffffffff26, 0x1, 0x2800) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x0, 0x400000) r2 = syz_open_dev$adsp(&(0x7f0000001300)='/dev/adsp#\x00', 0x40, 0x10000) renameat(r1, &(0x7f00000012c0)='./file1\x00', r2, &(0x7f0000001340)='./file0\x00') r3 = getuid() r4 = getgid() r5 = geteuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r7 = getpid() ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000001500)={{0x8, r3, r4, r5, r6, 0x118, 0x3ff}, 0x8001, 0xfffffffffffffff7, 0xd9, 0x3, 0x400, 0x1000, r7, r8}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) msgsnd(r0, &(0x7f0000000280)={0x3, "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"}, 0x1008, 0x800) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f00000013c0)={0x2, 0x0, 0x101}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) write$FUSE_IOCTL(r1, &(0x7f0000001380)={0x20, 0x0, 0x6, {0x36f2ce3c, 0x0, 0x74a0, 0xe5}}, 0x20) 19:17:46 executing program 3: r0 = memfd_create(&(0x7f0000000100)='nfs\x00', 0xa3dfb22bad1a2816) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x8, {0xa4fc, 0x9, 0x1f, 0x633, 0x7f, 0x80000}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:46 executing program 2: r0 = dup(0xffffffffffffffff) ioctl$VT_DISALLOCATE(r0, 0x5608) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f00000001c0)="ebb95f2e9a2c1e177faf4dfd20c534f45e12649ea506a0904857d1022520422eb572ad8ba84581fa350a1fe5a17f5a7cdf9492ca9421231801471f282f0f107df89fbff4a9") r0 = socket$packet(0x11, 0x3, 0x300) openat$uinput(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uinput\x00', 0x2, 0x0) accept(r0, &(0x7f0000000240)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000002c0)=0x80) r1 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x7fffffff, 0x103200) accept(r1, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:46 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:46 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x7) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)="2f67726f75702e73746174003c23fb572a1f0294e6f378b41ad54b4d9d9a1f63f8785ad188a7e1c88875e05b18a4cb3a9cd12dcea440d899c22c652b3a471b4a7fa2f3fdf6e034d804e5f0df4b1dee483b157624c59c0100e89e6a357c000000", 0x2761, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000200)={'bridge0\x00'}) write$cgroup_int(r1, &(0x7f0000000080)=0xee970200, 0x297ef) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) r2 = getpid() bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000400)={0x0, 0x8}, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x3f, 0x2, 0xff, 0x0, 0x0, 0x0, 0x200, 0x0, 0x6cff, 0x8, 0x9, 0x8, 0x80000000, 0xfffffffffffffffc, 0x7, 0x1, 0x949, 0x5, 0xa0, 0x9, 0x6a6, 0xffffffff00000001, 0xc0b, 0x0, 0x7, 0x100000000, 0x9, 0x80, 0x9, 0x2, 0x0, 0x0, 0x8, 0x8, 0x5, 0x9, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x0, 0x0, 0xfffffffffffffffc, 0x1, 0x2, 0x81, 0x9d8}, r2, 0x9, r0, 0x9) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080), 0xc) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000280)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x2000000000000000) r4 = getpid() ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x100000004) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x2, 0x9, 0xfffffffffffffffd, 0x9, 0x0, 0x0, 0x80, 0x3, 0x3, 0x9, 0x8, 0x1ff, 0x0, 0x0, 0x6, 0x5656, 0x0, 0x1, 0x0, 0x2, 0x1, 0x6, 0x7fffffff, 0x9, 0x7fffffff, 0x5, 0x1000, 0x80000000, 0x20, 0x4, 0xffff, 0x80000001, 0x400, 0x1000, 0x5, 0x8, 0x0, 0x3, 0x3, @perf_bp={&(0x7f0000000480), 0xf}, 0x20, 0x100000000, 0x4, 0x0, 0xfffffffffffffff7, 0x6, 0x5}, r4, 0x5, r1, 0xa) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000200)={0x2, 0x70, 0xffffffffffffffff, 0x7, 0xe8, 0x43, 0x0, 0x4, 0x0, 0x8, 0xf0fc, 0xffd, 0x76, 0x7, 0x0, 0x4, 0x8001, 0x1f, 0x3, 0x9, 0xffffffffffffff81, 0x6, 0x1, 0xff, 0x100000001, 0x1000, 0x6, 0x10000, 0x200, 0x3ff, 0x1e, 0x7, 0x6, 0x3e000000, 0x1f, 0x0, 0x1, 0x0, 0x0, 0x27, 0x3, @perf_config_ext={0x8, 0x9d8}, 0x140, 0x0, 0x7, 0x6, 0x3ff, 0x1, 0xff}) bpf$MAP_CREATE(0x0, &(0x7f0000000440)={0x0, 0xffff, 0x0, 0x10001, 0x8, 0xffffffffffffffff, 0x5}, 0x2c) 19:17:46 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002040)=0x14) r2 = syz_open_dev$vcsa(&(0x7f0000002080)='/dev/vcsa#\x00', 0x1, 0x8000) bind$xdp(r0, &(0x7f00000020c0)={0x2c, 0x4, r1, 0x35, r2}, 0x10) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @perf_bp, 0x8000000200000000, 0x10800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='net/nfsfs\x00') setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x470, 0x248, 0x248, 0x0, 0x388, 0x388, 0x388, 0x4, &(0x7f0000000240), {[{{@arp={@empty, @local, 0x0, 0xffffffff, @empty, {[0xff, 0x0, 0x0, 0xff, 0xff]}, @empty, {[0xff, 0x0, 0xff, 0xff]}, 0x7ff, 0x3, 0x9, 0x80000001, 0x322, 0xe91, 'ip_vti0\x00', 'irlan0\x00', {0xff}, {}, 0x0, 0x4}, 0xf0, 0x118}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "84b2421ade79c11cafb6c923b1df17ba70559fd21efcea2e2f8251fd09ae"}}, {{@arp={@local, @remote, 0xff0000ff, 0xffffffff, @mac=@dev={[], 0x12}, {[0x0, 0xff, 0xff, 0x0, 0x0, 0xff]}, @mac=@local, {[0xff, 0x0, 0xff, 0xff, 0x0, 0xff]}, 0x3, 0x7fff, 0x935, 0x4, 0x1ff, 0x9, 'bridge_slave_1\x00', 'eql\x00', {0xff}, {}, 0x0, 0x200}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@dev={[], 0x1a}, @multicast1, @loopback, 0x8, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4c0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000100)) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='\x00', r3}, 0x10) ioctl$BLKBSZGET(r5, 0x80081270, &(0x7f00000002c0)) sched_yield() 19:17:46 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:46 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000002c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$cgroup_procs(r0, &(0x7f0000000000)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000080), 0x12) 19:17:47 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x1}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/178, 0xb2}], 0x1) 19:17:47 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = gettid() ptrace$getsig(0x4202, r0, 0x17f4, &(0x7f0000000100)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="876f58d597fc43b0cdddfd8525c9153cb4ca9f99b2df3f59344c31488957199ccbd91ef3dc9e87687cc1ce768927a73ac79fec76818b56ac92639fc41602655c3861d63865c4bde45f98856f032581cc53bb0884489ee19ddd4305253c57a22c35fe3998b78f3d19891eacec31cf16ee0373f817ce01f4217183d9adbc1d2e635403e1d568e3e2862cc072a9390d700be547f82670dec5b42a4a8992111400cd8f2756f4872a01448f510f7bb784922f7dabfe3070eedf2a5d74fd88d5d92a", 0xbf, 0xfffffffffffffff9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = getgid() keyctl$chown(0x4, r0, r1, r2) 19:17:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {}, {}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 3: rmdir(&(0x7f0000000100)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000001600)=[{&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/242, 0xf2}, {&(0x7f0000001540)=""/138, 0x8a}], 0x4, &(0x7f0000001640)=""/165, 0xa5, 0x7fff}, 0x8000}], 0x1, 0x103, &(0x7f0000001740)={0x77359400}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xd6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='autofs\x00', 0x401, &(0x7f0000000240)="e7975442c4ad00729ee62ea0cf532448407596ddfb58d3f2ff06342efe1949057fc911a551d010eb1d25c52f0000000000003af3c33694d94b7c45ee048d8e77c4e5f2f87a31c9389d0ee867edd0ab028b3406eb3a16e656496decbec73b41a633d0dafecb86eb72e133fc7cbacec4d675b8244e2ca587125178a2803ca76d4a1be9956951b99373849ea1de319c8c1a8588005e4de53bd26d") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000001780)=0xfffffffffffffffe) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, &(0x7f000000a000)) 19:17:47 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:47 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x2000, &(0x7f0000000180)="c87ab86b5e13331370dc2ba6181fba82e7825997e2927b9ee0ec0d91c9c2cea254c0a7e6b956542a379c91348aa191a17714932ef6dcfd0487c5e01c77a8bb184fa0", &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="76bea977bf0722555a2041c97010255a2cf3f3dddffb45fe03e2d6a79cffe2b87debd55f156f4b6f63e3f29a51ef7a1decf231735dc3a89503801d4c4c5a28e075196f2230730d0a74cc9252686e0294de0ac1105a131999f99803b2e7c75df6b184b64ed16f1ac6bddbacf843795848085b64271628b309dc899115b6948665b238684eb267572f55d248cbaf6fb6eb6e674c35809986627161506bc667a58993ad95a51af5e34baae961d92878ffaef8e94485c863062463576227725a5d58a4e0e8c8a163d8") [ 309.012816] cgroup: cgroup2: unknown option "" 19:17:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="6fe4d6baa9e7b5f7fc8cee22706fb590e9ef439382948160ac61cb2c780a27d3c2bc88b53c7120447995b61d9829a90b3285e2de0dad98ae0e0ea8a1e8ad82b80e1764ec43c2978f5bfb1b3912604e333358ff7edeffc82be4182c14662cf27fb3d6989f6fc026b0b35ef41a48927e708f2fc1f13f28ba24a52b3ed8c6538f08004faa16424927a1807e483c98307cdb7bbcde1cb25683b6c16f30c9d9a047237276e5bbb9f5abc96c", 0x20000, &(0x7f000000a000)) 19:17:48 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x7, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cgroup2\x00', 0x0, &(0x7f000000a000)) 19:17:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:48 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000180)=0x740) [ 309.401417] cgroup: cgroup2: unknown option "" 19:17:48 executing program 4: r0 = memfd_create(&(0x7f0000000100)='nfs\x00', 0xa3dfb22bad1a2816) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000180)={0x8, {0xa4fc, 0x9, 0x1f, 0x633, 0x7f, 0x80000}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:48 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x90001, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:48 executing program 0: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xf, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x28, 0x0, 0x0, 0x0, [{}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:48 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7d7, 0x1000, 0x1000000020000000, 0x1, 0x0, 0x3ff, 0x8, 0x5, 0xfffffffffffffff9, 0x1f, 0x0, 0xf1, 0x3, 0xb44, 0x7, 0xfffffffffffffe01, 0x8edd, 0x1, 0x1, 0x7, 0x8bc, 0x916, 0x0, 0x1ff, 0x5, 0x7, 0x6b2113f7, 0x32b732d, 0x0, 0x5, 0x10000, 0x40, 0x80000001, 0x80000001, 0x6, 0x2, 0x0, 0x9, 0x0, @perf_config_ext={0x10001, 0x5}, 0x24008, 0x75, 0x8, 0x7, 0x7f, 0x3, 0xfffffffffffffffd}, r1, 0xcb, r0, 0x8) mknod(&(0x7f0000000100)='./file0\x00', 0x100, 0x1) recvmmsg(0xffffffffffffff9c, &(0x7f00000078c0)=[{{&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001500)=[{&(0x7f0000000280)=""/247, 0xf7}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000001380)=""/154, 0x9a}, {&(0x7f0000001440)=""/60, 0x3c}, {&(0x7f0000001480)=""/124, 0x7c}], 0x5, &(0x7f0000001580)=""/67, 0x43, 0x9}, 0x5}, {{&(0x7f0000001600)=@in={0x2, 0x0, @rand_addr}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001680)=""/211, 0xd3}], 0x1, &(0x7f00000017c0)=""/4096, 0x1000, 0x3f}, 0x7}, {{&(0x7f00000027c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000003900)=[{&(0x7f0000002840)=""/191, 0xbf}, {&(0x7f0000002900)=""/4096, 0x1000}], 0x2, &(0x7f0000003940)=""/63, 0x3f, 0x100000000}, 0x7}, {{0x0, 0x0, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/113, 0x71}, {&(0x7f0000003a00)=""/145, 0x91}], 0x2, &(0x7f0000003b00)=""/78, 0x4e, 0xcf9}, 0xdc3}, {{&(0x7f0000003b80)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003c00)=""/141, 0x8d}, {&(0x7f0000003cc0)=""/218, 0xda}], 0x2, &(0x7f0000003e00)=""/63, 0x3f, 0x2}, 0xd0}, {{0x0, 0x0, &(0x7f0000005080)=[{&(0x7f0000003e40)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/36, 0x24}, {&(0x7f0000004e80)=""/27, 0x1b}, {&(0x7f0000004ec0)=""/231, 0xe7}, {&(0x7f0000004fc0)=""/151, 0x97}], 0x5, &(0x7f0000005100)=""/6, 0x6, 0x3}, 0xffff}, {{&(0x7f0000005140)=@nfc, 0x80, &(0x7f00000077c0)=[{&(0x7f00000051c0)=""/4096, 0x1000}, {&(0x7f00000061c0)=""/226, 0xe2}, {&(0x7f00000062c0)=""/208, 0xd0}, {&(0x7f00000063c0)=""/73, 0x49}, {&(0x7f0000006440)=""/72, 0x48}, {&(0x7f00000064c0)=""/116, 0x74}, {&(0x7f0000006540)=""/242, 0xf2}, {&(0x7f0000006640)=""/120, 0x78}, {&(0x7f00000066c0)=""/4096, 0x1000}, {&(0x7f00000076c0)=""/245, 0xf5}], 0xa, &(0x7f0000007880)=""/17, 0x11, 0x932}, 0x3f}], 0x7, 0x2100, 0x0) sendto$inet6(r2, &(0x7f0000007a80)="62da0774e8a30b3e0d94b5bad64e28356c9f96f24e8b539d0dc86125c42e033976c63e322134cf7e57ab7898efcddb6860a74fcf4f7d5f15cc366e71a24244d643a9176ca68a9edc2f3a1542e59970f8eb9012ef736c15e8664a61e41eca88cada50e9df6793f9d0eadb9a247914209f83553e70e6f2c2c179082c7861a3062e7fb7ba25a3586ac940d3d567d9ef9455943697e56d197cfd2912f62cb849ed06428c3a2ee9580676080b3d325123", 0xae, 0x10, 0x0, 0x0) 19:17:48 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="876f58d597fc43b0cdddfd8525c9153cb4ca9f99b2df3f59344c31488957199ccbd91ef3dc9e87687cc1ce768927a73ac79fec76818b56ac92639fc41602655c3861d63865c4bde45f98856f032581cc53bb0884489ee19ddd4305253c57a22c35fe3998b78f3d19891eacec31cf16ee0373f817ce01f4217183d9adbc1d2e635403e1d568e3e2862cc072a9390d700be547f82670dec5b42a4a8992111400cd8f2756f4872a01448f510f7bb784922f7dabfe3070eedf2a5d74fd88d5d92a", 0xbf, 0xfffffffffffffff9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) r2 = getgid() keyctl$chown(0x4, r0, r1, r2) 19:17:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='cpuset\x00', 0x50000, &(0x7f00000001c0)="0603945e88ea36ce1cbc71f3b28cbcd573d59741584e11494093503448cac771b4646f0c952041acba5244ba075589e477fde50c9aeb4cf8ce1c4b4257680a9d") 19:17:49 executing program 7: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x240) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) sendto(r0, &(0x7f0000000180)="1196ec7fa6109d2496174761ae5df98906d9bfd31d500de247b1f3e8fd4b837451e12e53d9dc1623f787fa68024657ccb0c8b45018c31f1fda7c1fb5f247055421dd8b56843642bb847345b18c1189ed118d3a623c2d58e64c18b85d4c4daf318e399b4fd1a8afcc268585c6c90348ccd8ad939d598aa4892481edd6ce8903bd3a61eada0464e8bdcc08ce7056f6139f760852dbe863cd720c1df594a2064bbfcd5c5dd7b486e2b65ddd5c498fef8b6c46d2a454793bf88c88836612b348bc49e9b8e9d8504a7fb9100590ee6a6ac4f8d87eeccb", 0xd4, 0x10, &(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) r1 = socket$inet(0x2, 0x0, 0x101) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000300)=0x4) 19:17:49 executing program 6: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000380)=0xe8) sendmsg$can_raw(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x1d, r1}, 0x10, &(0x7f0000000480)={&(0x7f0000000400)=@canfd={{0x3, 0x1, 0x3, 0x8001}, 0x1e, 0x1, 0x0, 0x0, "9e5be94697440a20f1f8deb80c2c5244402991632b483313a6116dba33fb68f4c14243c143a320455f43051631d50072f5ef51a28a0bc0cbf41d5bf5b867edcf"}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x8814) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='gretap0\x00', 0x10) 19:17:49 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)="6fe4d6baa9e7b5f7fc8cee22706fb590e9ef439382948160ac61cb2c780a27d3c2bc88b53c7120447995b61d9829a90b3285e2de0dad98ae0e0ea8a1e8ad82b80e1764ec43c2978f5bfb1b3912604e333358ff7edeffc82be4182c14662cf27fb3d6989f6fc026b0b35ef41a48927e708f2fc1f13f28ba24a52b3ed8c6538f08004faa16424927a1807e483c98307cdb7bbcde1cb25683b6c16f30c9d9a047237276e5bbb9f5abc96c", 0x20000, &(0x7f000000a000)) 19:17:49 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) write$P9_RRENAME(r0, &(0x7f0000000100)={0x7, 0x15, 0x2}, 0x7) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000200)) write$vnet(r0, &(0x7f0000000440)={0x1, {&(0x7f0000000240)=""/253, 0xfd, &(0x7f0000000340)=""/246, 0x2, 0x5}}, 0x68) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000180)={0x80000000}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='anon_inodefs\x00', 0x121000, &(0x7f0000000580)="84d1438373f6c433871916e64f2158f31e9618bb69de914e6fc819e483dd4e8e225bf9dff58d7bc515d1f4c429192cc82552a0916a10e0b7eb8d9ce8e23876ff22df420d020d80c115790c49ce5b75d6b5993ea7dffb7a8fe1ec69adc4b8e6620c754d144153aaee86737ab3df44293d8bf438af2bdb0b8a7c147abe5ccfc34366ab577fa0d1e9fb") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) chroot(&(0x7f00000001c0)='./file0\x00') 19:17:49 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f00000001c0)={0x40000000}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0xa000, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:49 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) clone(0x2000, &(0x7f0000000180)="c87ab86b5e13331370dc2ba6181fba82e7825997e2927b9ee0ec0d91c9c2cea254c0a7e6b956542a379c91348aa191a17714932ef6dcfd0487c5e01c77a8bb184fa0", &(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)="76bea977bf0722555a2041c97010255a2cf3f3dddffb45fe03e2d6a79cffe2b87debd55f156f4b6f63e3f29a51ef7a1decf231735dc3a89503801d4c4c5a28e075196f2230730d0a74cc9252686e0294de0ac1105a131999f99803b2e7c75df6b184b64ed16f1ac6bddbacf843795848085b64271628b309dc899115b6948665b238684eb267572f55d248cbaf6fb6eb6e674c35809986627161506bc667a58993ad95a51af5e34baae961d92878ffaef8e94485c863062463576227725a5d58a4e0e8c8a163d8") 19:17:49 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000180)={'filter\x00', 0x7, 0x4, 0x458, 0x0, 0x258, 0x258, 0x370, 0x370, 0x370, 0x4, &(0x7f0000000100), {[{{@arp={@rand_addr=0x4, @loopback, 0xffffffff, 0x0, @empty, {[0xff, 0x0, 0xff, 0x0, 0x0, 0xff]}, @empty, {[0xff, 0x0, 0x0, 0x0, 0xff, 0xff]}, 0x100, 0x3, 0x91, 0xfffffffffffffffe, 0xea, 0x8001, 'bridge0\x00', 'team_slave_0\x00', {0xff}, {0xff}, 0x0, 0x1}, 0xf0, 0x118}, @unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @empty, @rand_addr=0x56, 0xf}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0xffffffffffffffe0, 0x5}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4a8) 19:17:50 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000100)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) fanotify_init(0x40, 0x101400) 19:17:50 executing program 1: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:50 executing program 6: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x5, 0x80080) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000001c0)='nfs\x00', &(0x7f0000000200)='cgroup\x00', &(0x7f0000000240)='nfs\x00', &(0x7f0000000280)='nfs\x00'], &(0x7f0000000380)=[&(0x7f0000000300)='nfs\x00', &(0x7f0000000340)='nfs\x00'], 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x88) perf_event_open(&(0x7f000000a000)={0x6, 0xfe18, 0x0, 0x0, 0x0, 0xe1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:50 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) sendto(r0, &(0x7f0000000180)="1196ec7fa6109d2496174761ae5df98906d9bfd31d500de247b1f3e8fd4b837451e12e53d9dc1623f787fa68024657ccb0c8b45018c31f1fda7c1fb5f247055421dd8b56843642bb847345b18c1189ed118d3a623c2d58e64c18b85d4c4daf318e399b4fd1a8afcc268585c6c90348ccd8ad939d598aa4892481edd6ce8903bd3a61eada0464e8bdcc08ce7056f6139f760852dbe863cd720c1df594a2064bbfcd5c5dd7b486e2b65ddd5c498fef8b6c46d2a454793bf88c88836612b348bc49e9b8e9d8504a7fb9100590ee6a6ac4f8d87eeccb", 0xd4, 0x10, &(0x7f0000000280)=@nfc={0x27, 0x0, 0x1, 0x1}, 0x80) r1 = socket$inet(0x2, 0x0, 0x101) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000100), &(0x7f0000000300)=0x4) 19:17:50 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x100) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:50 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10200, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000080)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x5d0b448a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:50 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x240) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:50 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:51 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x7, 0x10800) ioctl$BLKRESETZONE(r0, 0x40101283, &(0x7f00000001c0)={0x457, 0x8}) unlink(&(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:51 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) recvmmsg(r0, &(0x7f0000001700)=[{{&(0x7f0000000300)=@ipx, 0x80, &(0x7f0000001600)=[{&(0x7f0000000380)=""/182, 0xb6}, {&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000001440)=""/242, 0xf2}, {&(0x7f0000001540)=""/138, 0x8a}], 0x4, &(0x7f0000001640)=""/165, 0xa5, 0x7fff}, 0x8000}], 0x1, 0x103, &(0x7f0000001740)={0x77359400}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xd6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x4) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='autofs\x00', 0x401, &(0x7f0000000240)="e7975442c4ad00729ee62ea0cf532448407596ddfb58d3f2ff06342efe1949057fc911a551d010eb1d25c52f0000000000003af3c33694d94b7c45ee048d8e77c4e5f2f87a31c9389d0ee867edd0ab028b3406eb3a16e656496decbec73b41a633d0dafecb86eb72e133fc7cbacec4d675b8244e2ca587125178a2803ca76d4a1be9956951b99373849ea1de319c8c1a8588005e4de53bd26d") r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000180), &(0x7f0000000200)=0x14) ioctl$BLKDISCARD(r1, 0x1277, &(0x7f0000001780)=0xfffffffffffffffe) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:51 executing program 6: mkdir(&(0x7f0000000240)='./file0\x00', 0x40) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x10000, 0x0) readlinkat(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/194, 0xc2) migrate_pages(r1, 0x8, &(0x7f0000000180)=0x800, &(0x7f00000001c0)=0x1000) 19:17:51 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = dup3(r0, r0, 0x80000) r2 = gettid() r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r3, 0x40000000af01, &(0x7f0000000300)) write$cgroup_pid(r1, &(0x7f00000001c0)=r2, 0x12) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000001980)=""/150, 0x96}], 0x1) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000f1dff8)={0x0, r4}) write$vnet(r3, &(0x7f0000000480)={0x1, {&(0x7f0000000380)=""/12, 0xc, &(0x7f00000003c0)=""/176, 0x0, 0x2}}, 0x68) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000180)) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) 19:17:51 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x3, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000200)='./file0\x00', 0x2) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = dup(r1) r3 = syz_open_dev$sndpcmp(&(0x7f0000000100)='/dev/snd/pcmC#D#p\x00', 0x7, 0x200) renameat(r2, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.swap.current\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000001c0)={r3, r4}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0xffffffff) 19:17:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000380)="bbae572337dcc8a22ac85c4ac2de7e965d1ee1c8db323c78c7905a16d02f170533fac28970b2fb14f99d115f8af843970808154e8bb81de80bedcf534cf8b89bb031251c2107c4efebac9f9891bb8c4d72443364194431450a0b24d3cfe17b4fac41c8a19c5b5922a650cb3885016ae729ba678b205143a215826a01e2d1bf84a76ae8d7c2eed24016bbf11a359284c45730424ecafdc12fc572f89cca9a1190d631cedc713969a2444e917dfc387a89adc74d5384e94382e8310f981359330cb0763db80aa0c78999cb5d4fb8c69e223a152ee7646af7f7460b2cddc0b1") 19:17:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x0, 0x6a4002) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='ifb0\x00') mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) sendmmsg$alg(r0, &(0x7f0000000680)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)="17bd23dba6bf7871b9b536edd9fc74d49d4db5f81203d88a95ff23691e08616ef445ced97e49df786b0347f213f44db08cc190633f289c9d241a55e04cf561e97a45969bcbfef70a54d945b3051163abcdec445e906c486a8d23bc9619dff6425cd9ae9b9ca6796f768bcc22c0ce54bf97f44ddb399ec2283c264d9a8c53dee28696f6a0683bdd5c5608ec578d45906a7935203e54f25b4fe6770c4a2db2af2f11fbb3a7b00747b3d07fe68777dba7716d3d4c8a5b5b4cb197b9621ab4fa2ce3820cf9aac8b3612858b067a8", 0xcc}, {&(0x7f00000002c0)="6b68944ca46a7dcce8c93df1aa67a40800eef35442279453ca152b35e772b1543c077ee8f8596374e719f17c8f8e0fe0d4b97031b4a8a84a98d60e90b9a1b006190da793ddd8cdeec4cc9297418c", 0x4e}], 0x2, &(0x7f0000000380)=[@iv={0x70, 0x117, 0x2, 0x59, "10936784238cc69b223a85a64b6048bb0dfd2c26cbf91006a59e97c3bca419d61147562c42706975d1aef23ad79aeb0dfc326c6a5502b545b5c420b86afa2077d6bbb4b4867fe7e09675987f7dad684f7acf423da2f1383dd2"}, @op={0x18, 0x117, 0x3, 0x1}], 0x88}, {0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000440)="6a29292e6e0fcaa114c84b6a6b0afc0954b0f727450ef1c4a7d8c4497a7fc60ea8bfb753286464d7da431d092ad5ffb9b1605822cc954a9b93a4f42b2f18b5f90d5bdd4e590708dd3143f2b9d9d3ca1d45dae2c89430f46fa09a4bc60d16c27a13762faa1418ed943d33d2d72e231f8fb452797f8fc6aad9a57593fb4644377afb19cd882baed996ecf1d06860733c495a6c731eb2cca0", 0x97}, {&(0x7f0000000500)="d613e9b1e2e3c34ac21a1f8a7a9439ef3c6c7c2c1ef689381048e9ee3ab63eb3cb82974d2b73268fcb6b957141dba25559354ed417b84b9836a0376ec669f1eb28a4b1a830d7d92ce2c6bc6a7ba39d1d2d3f976e2dcecdb88d1015e7040093a0e0eba2ad1e544d8c1c1a5d3b85c5fc9824f73dccadd990bf07c64e49c3ef179775b1c6b001a5c8074cbb4b008bc2f7d60b", 0x91}], 0x2, &(0x7f0000000600)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x3403}, @assoc={0x18, 0x117, 0x4, 0x1fe000000}], 0x60, 0x24000001}], 0x2, 0x10) 19:17:52 executing program 7: mkdir(&(0x7f0000000300)='./file0\x00', 0x1c2) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000340)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='rootfs\x00', 0x4000, &(0x7f0000000400)="7efaffa2ed4bef0caaac73836cf2978200e93530125561265049ebc945b257c0cec1e11f6101eb1307e6b5572dc17cef927bbb374ec3841144ea04e2453f8ade40a7ceab51841d3fdf36ebdc") r1 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000002c0)={0x7, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000480)=0x2, 0x8) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'bond_slave_0\x00', 0x800}) getsockname(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f0000000200)=0x80) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e23, 0x0, @ipv4, 0xd5c9}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x4e22}, @in={0x2, 0x4e21}], 0x6c) 19:17:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:52 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f0000000100)) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100, 0x0) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000380)=[&(0x7f00000001c0)=']vmnet0cpuset\x00', &(0x7f0000000200)='nodev\x00', &(0x7f0000000240)='&mime_type\\self@\x00', &(0x7f0000000280)='.vmnet1cgroupppp0\x00', &(0x7f00000002c0)='nfs\x00', &(0x7f0000000300)='/dev/null\x00', &(0x7f0000000340)='mime_typetrusted#\x00'], &(0x7f0000000600)=[&(0x7f00000003c0)='&\x00', &(0x7f0000000400)='/dev/null\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='proc.$eth1\x00', &(0x7f00000004c0)='\x00', &(0x7f0000000500)='/dev/null\x00', &(0x7f0000000540)='selinux\x00', &(0x7f0000000580)='nfs\x00', &(0x7f00000005c0)='/dev/null\x00']) r1 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000680)={@in6={{0xa, 0x4e23, 0x8, @loopback, 0x9}}, 0x7, 0x4040000, 0x1, "db79f42c3523996583ba5f85610819425d5e3d39f6c96c2e97da1d00ce1309417b9b9d44d80c5171d8204953daf55a27912e17c1d998ebb6df67e17dc369cda3ff968c90da314e4ec5c66e94450e6b51"}, 0xd8) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x1, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000001c0)=0x14, 0x800) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={r1, @multicast2, @local}, 0xc) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:52 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x400, 0x44080) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000180)={0xaf, ""/175}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000200)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000180)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = dup3(r0, r0, 0x80000) r2 = gettid() r3 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001940)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_FEATURES(r3, 0x4008af00, &(0x7f0000000080)=0x200000000) ioctl$int_in(r3, 0x40000000af01, &(0x7f0000000300)) write$cgroup_pid(r1, &(0x7f00000001c0)=r2, 0x12) r4 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) close(r4) socket$packet(0x11, 0x3, 0x300) readv(r3, &(0x7f00000002c0)=[{&(0x7f0000001980)=""/150, 0x96}], 0x1) ioctl$VHOST_SET_MEM_TABLE(r3, 0x4008af03, &(0x7f0000000280)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f0000f1dff8)={0x0, r4}) write$vnet(r3, &(0x7f0000000480)={0x1, {&(0x7f0000000380)=""/12, 0xc, &(0x7f00000003c0)=""/176, 0x0, 0x2}}, 0x68) ioctl$VHOST_GET_FEATURES(r1, 0x8008af00, &(0x7f0000000180)) write$cgroup_pid(r1, &(0x7f0000000100)=r2, 0x12) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000000200)=r2) 19:17:52 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x20000, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) sendmsg(r1, &(0x7f0000000cc0)={&(0x7f00000002c0)=@ipx={0x4, 0xa7, 0x40, "08435e34efb9", 0x6}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000340)="e6d96b3271ab24cd23539bfff1c08405053ba5bd08552ac524f301ef8a67ba8f31557a21783174203b822151fc1dabf32e4c3408e52cbcd6cd9cd1fd89092c43c8b6583ad1d34c27a12c89f3229f2449e688d21adac17b5658e48c7dda449506d74629a6a5f6a338c12bad431c070479ac5cdb26bf949c2d33d47fd2177ed05a4e29968460dc603d25783937206a5d9aaf9a60a4a0163b57c2be1a4c40ff0544488aa4393539dd9613a7d4c40476583fee379dd66aa70e5d53e0dfbcb62a2692466a7bb4deff", 0xc6}, {&(0x7f0000000440)="f447d22bc19ef11c60ba7af04d73b534f85fb52758b29b66ba1b7fa296eacb2e4ea0ce6f65c4e30b4205a5bd44c154129f3fc019bb8baf49426b1138ecc63b837ddb85ec3d7956488bfbab60f69ac4509549a53b915cd165bcf1c941a6eb8ea1c446d344fc8c753b5146cf876a468de9f7f11b5ff8dc1926830f399eb6a9e4a339d9111e12ca5dd6324f29d3eeb11776652c", 0x92}, {&(0x7f0000000500)="a24d7a2fd4639d4cd937913f99bf90e3fd7b167e010b1e3938c6cf0f5854ffb5b47708478d4d839627da83f022cdd95ff713ad8cf3cd9fda94ec2ec5955d218f6d18a295789ef1e46ef0bd6a7bc631cf3004ee97828fd12dddc55e2fcfb414e526115f1234f9c149c0440bc2e5ec0bfaf0941029c9972e57d92b9ce0f153350cb6cb5da363c270778f93a7b6825913bbda1e3a4edb24588f71a42ae2f036be2623ec5d5b9cc849c75774af570970a05c56b34c3007c6d912ea88d956eb951c8dd24e", 0xc2}, {&(0x7f0000000600)="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", 0xfa}, {&(0x7f0000000700)="877d46929b837bb7116f1ace9dbec1dd2cc46a9fb42d44d1e822bdbe3254f74b8324469e2c296a76237e26004a6c608ee9154fdef96cb5e9020f3792eed311adcadffa138080db0442386e1679541875103e261c3e5bfd", 0x57}], 0x5, &(0x7f0000000800)=[{0x48, 0x1bb, 0x100000000, "a5c0fb05dfaba7c0f45b8ea30397dcf796defcadd99ed8ec86ed46cd600c13a687ea2a9f11dc2dc5fb89c46c1ff622c657"}, {0x48, 0x10c, 0x2, "ebbb9792033728e0d5e0eb42872a440dd1fbe56e3cf49056745932aba8f472175af3a5465b614d940c70c3b636264de22bf23ab07b61"}, {0xc0, 0x10d, 0x800, "30a8d4014a356630a66cd658a977e411a9ad3a52277e0af19fa921d3fc8e5f45548360f87929b6ee43e31deb98a70f2ac9da55e3ad4f0b21d2ca77a88967ce6124a4d3648fd94017450fd26abe7321c384b9dc1a4d6116360893837a4770eba742340d5db16640028f306861161002da5992c58d1c8e59ab95e1eac34f38d970c2d16a01fb1603e37840c59c536537d6516c6fbf43db43b1242a11ef42b3bb5432e4bdbbcfa6a9d7eeec0a"}, {0x48, 0x1, 0x4a6d4805, "f9bbbe08ac2746079d09a001207928246319e42a2cb00c613a96ffec5b7c83fa36fb92711989fe914f1a24ff22cf1a55060b122b06"}, {0xf0, 0x104, 0x38a2, "8e9b8f2e3363e9918f30f11c6fbee88bcfa0c72864fc4ebe4860856e75b2809c646f5490471fd2bb5047d986e8d0954c5e09fd6f65d561bd6ab8c01bad665cdedaf6fa6f46580d8f4b6fa936ac28408b0e96a691c735329e4ffa4dddbc98cab2cc404ba12011822b558aebdb31cb30ffa693032547f6a3732eb49f292ee6b8e6a7a9ab855511a434a7eb2c176c730dae2eeeed06b493b98dbfb94857dbc4c4eae3f2916141c790ede64326b011b214263e21ad28091be7ccf261957de99bb6ea4abd81756b638b9665c2bdaa2ed74537e1db470824be3ee06db4"}, {0x108, 0x1, 0xf5d5, "6b3bc0e8615c2ea1f6efeeffbc8d956e47b103fbd0a9b82ef3910071d339bd6f0eb2f7dc7999b301f1d61760fb4d2a85afe8072c03fd624f924c068c83bff60086e729356559b739aae071404f76b65cc64ca6bb32b994788abf7563f015ab30c20bffc431de639c832bbc22ecaaf6d46e8f498e24f0a5965835ec42d63a9c377dd4b62bf34992f07429b152f54e5b64aaaa5f7c8b85539f2d8e06d958a8a7ee1c9ce5a2e30d4cd2508db7d4745fabf45284b30cfee2e41c9716fc4f12ab88f84966ffd18d67ad2e825d04b5151a1de2dd4ffc7a2f43942d5b962ac8ef5c16789833336424ae51fdcdfa4d98da0830f0a825bf"}, {0x60, 0x116, 0x9, "0ad98fc03af77098ffd07b82e61ddecaedcedb9336477e720c8c6d1ee4a9aa4232a14a513dee5adae9bcb307d8f48791d01d97b41b52080d3eae926ec0fa823ea703eb3325b10981552861"}, {0xb8, 0x117, 0xfff, "b9608fb2cc1cf9fb3fe1c6d080c56e76d588bfa08bb5c64e134d7dd63d75e5869b050b3e2a1fbaea564f9488639f8166fde2d93066f9fc15a6d3885b80de5a24a0a5ca2f54e37d4299152117b5f183e6655b1aa0fd368b763e2d096558d55d0150496a2aac4787271acd6d3b40c12de9b92722702b2ebd8e1747de274843b3dd8d26325ffbc3a9a6d5279d4837683bd8acfa7494d3ef9a4f10e5ff8aa74dd35c930b6638a4"}], 0x4a8, 0x1}, 0x0) 19:17:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = request_key(&(0x7f0000000100)='.request_key_auth\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f00000001c0)=':\x00', 0xffffffffffffffff) keyctl$setperm(0x5, r0, 0x4) mkdir(&(0x7f0000000200)='./file0\x00', 0x80) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = accept4(r1, &(0x7f0000000240)=@un=@abs, &(0x7f00000002c0)=0x80, 0x80000) ioctl$SIOCSIFMTU(r2, 0x8922, &(0x7f0000000300)={'vcan0\x00', 0x9}) 19:17:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000200)={0x4800000000, 0x8, 0x100, 0x1f, 0x0}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000280)={0x1, 0x3, 0x100000000, 0x1, r1}, &(0x7f00000002c0)=0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000100)='./file0\x00', 0x40) utime(&(0x7f0000000300)='./file0\x00', &(0x7f0000000180)={0x4, 0x7}) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000380)={&(0x7f0000000340)='./file0\x00'}, 0x10) 19:17:53 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, &(0x7f000000a000)) 19:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x3, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x301000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000180)={0x5}, 0x1) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) chdir(&(0x7f0000000040)='./file0\x00') mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x8, &(0x7f000000a000)) [ 314.368276] ceph: device name is missing path (no : separator in ./file0) 19:17:53 executing program 6: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = memfd_create(&(0x7f0000000100)='[loeth0-\x00', 0x3) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$rtc(&(0x7f0000000200)='/dev/rtc#\x00', 0xff, 0x240200) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000240)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:53 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x0, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000180)={0x333, 0x20, 0x1ff, 0x3ff, 0x8, 0x81, 0x1, 0x7, 0x25, 0x3, 0xf21c, 0xa8}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getrlimit(0x0, &(0x7f0000000200)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:53 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x8400, 0x0) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) 19:17:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000003c0)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000340)='nfs\x00', 0x0, &(0x7f0000000300)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r1 = getpgrp(0x0) write$P9_RGETLOCK(r0, &(0x7f0000000380)={0x25, 0x37, 0x1, {0x0, 0x100, 0x7, r1, 0x7, 'queue0\x00'}}, 0x25) openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x202000, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r2, 0xc02c5341, &(0x7f0000000740)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x14000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, &(0x7f00000001c0)={0x3, 0xfffffffffffff809, 0xffffffffffffffff, 'queue0\x00', 0x2}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000100)="65d9ae3f0bb55ec9797a6d2f83bfa0935d0656d24c4e8817449f84d8c385739d529576fdfc34a92d1add10b33c16f4ca509b428a") 19:17:53 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200001, 0x52) r1 = shmget(0x3, 0x4000, 0x54000004, &(0x7f0000ffb000/0x4000)=nil) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000340)=""/4096) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f00000001c0)=0x9, 0x4) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0xffffffffffffffff, &(0x7f00000002c0)="eb3e22779336f1df7a8fee05636d2a17eac0cfcb7a1562fbf6049208299164515676ee205e764455c1089f3a15da63949038c1d4c6e6f62625cfb6189d136eb14cfe6f544edd944ed78e8bb0fdb500e6d77f15d603062153b180c30200154264a510f342ca21e2c44670c31456a90800000060e564e42d2271a3ac22cc02b12c") mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000240)="12435838c3f59ea74b1d7215f2230f314215a9359b07ee4fd6cd96e5f887cc662d176ef9dc994448fd146cb44967266cf3963b7588024f8f7531cf5c16df7fbf6bbe51aabd9f341fb121fc03f53b4d0b2728352485f65dde2fb0df3f4e50aed6aa38664d0e945bf7d78fe4") 19:17:53 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x8000, 0x0) accept$inet6(r0, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:53 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x20000, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000280)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x400040, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) sendmsg(r1, &(0x7f0000000cc0)={&(0x7f00000002c0)=@ipx={0x4, 0xa7, 0x40, "08435e34efb9", 0x6}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000340)="e6d96b3271ab24cd23539bfff1c08405053ba5bd08552ac524f301ef8a67ba8f31557a21783174203b822151fc1dabf32e4c3408e52cbcd6cd9cd1fd89092c43c8b6583ad1d34c27a12c89f3229f2449e688d21adac17b5658e48c7dda449506d74629a6a5f6a338c12bad431c070479ac5cdb26bf949c2d33d47fd2177ed05a4e29968460dc603d25783937206a5d9aaf9a60a4a0163b57c2be1a4c40ff0544488aa4393539dd9613a7d4c40476583fee379dd66aa70e5d53e0dfbcb62a2692466a7bb4deff", 0xc6}, {&(0x7f0000000440)="f447d22bc19ef11c60ba7af04d73b534f85fb52758b29b66ba1b7fa296eacb2e4ea0ce6f65c4e30b4205a5bd44c154129f3fc019bb8baf49426b1138ecc63b837ddb85ec3d7956488bfbab60f69ac4509549a53b915cd165bcf1c941a6eb8ea1c446d344fc8c753b5146cf876a468de9f7f11b5ff8dc1926830f399eb6a9e4a339d9111e12ca5dd6324f29d3eeb11776652c", 0x92}, {&(0x7f0000000500)="a24d7a2fd4639d4cd937913f99bf90e3fd7b167e010b1e3938c6cf0f5854ffb5b47708478d4d839627da83f022cdd95ff713ad8cf3cd9fda94ec2ec5955d218f6d18a295789ef1e46ef0bd6a7bc631cf3004ee97828fd12dddc55e2fcfb414e526115f1234f9c149c0440bc2e5ec0bfaf0941029c9972e57d92b9ce0f153350cb6cb5da363c270778f93a7b6825913bbda1e3a4edb24588f71a42ae2f036be2623ec5d5b9cc849c75774af570970a05c56b34c3007c6d912ea88d956eb951c8dd24e", 0xc2}, {&(0x7f0000000600)="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", 0xfa}, {&(0x7f0000000700)="877d46929b837bb7116f1ace9dbec1dd2cc46a9fb42d44d1e822bdbe3254f74b8324469e2c296a76237e26004a6c608ee9154fdef96cb5e9020f3792eed311adcadffa138080db0442386e1679541875103e261c3e5bfd", 0x57}], 0x5, &(0x7f0000000800)=[{0x48, 0x1bb, 0x100000000, "a5c0fb05dfaba7c0f45b8ea30397dcf796defcadd99ed8ec86ed46cd600c13a687ea2a9f11dc2dc5fb89c46c1ff622c657"}, {0x48, 0x10c, 0x2, "ebbb9792033728e0d5e0eb42872a440dd1fbe56e3cf49056745932aba8f472175af3a5465b614d940c70c3b636264de22bf23ab07b61"}, {0xc0, 0x10d, 0x800, "30a8d4014a356630a66cd658a977e411a9ad3a52277e0af19fa921d3fc8e5f45548360f87929b6ee43e31deb98a70f2ac9da55e3ad4f0b21d2ca77a88967ce6124a4d3648fd94017450fd26abe7321c384b9dc1a4d6116360893837a4770eba742340d5db16640028f306861161002da5992c58d1c8e59ab95e1eac34f38d970c2d16a01fb1603e37840c59c536537d6516c6fbf43db43b1242a11ef42b3bb5432e4bdbbcfa6a9d7eeec0a"}, {0x48, 0x1, 0x4a6d4805, "f9bbbe08ac2746079d09a001207928246319e42a2cb00c613a96ffec5b7c83fa36fb92711989fe914f1a24ff22cf1a55060b122b06"}, {0xf0, 0x104, 0x38a2, "8e9b8f2e3363e9918f30f11c6fbee88bcfa0c72864fc4ebe4860856e75b2809c646f5490471fd2bb5047d986e8d0954c5e09fd6f65d561bd6ab8c01bad665cdedaf6fa6f46580d8f4b6fa936ac28408b0e96a691c735329e4ffa4dddbc98cab2cc404ba12011822b558aebdb31cb30ffa693032547f6a3732eb49f292ee6b8e6a7a9ab855511a434a7eb2c176c730dae2eeeed06b493b98dbfb94857dbc4c4eae3f2916141c790ede64326b011b214263e21ad28091be7ccf261957de99bb6ea4abd81756b638b9665c2bdaa2ed74537e1db470824be3ee06db4"}, {0x108, 0x1, 0xf5d5, "6b3bc0e8615c2ea1f6efeeffbc8d956e47b103fbd0a9b82ef3910071d339bd6f0eb2f7dc7999b301f1d61760fb4d2a85afe8072c03fd624f924c068c83bff60086e729356559b739aae071404f76b65cc64ca6bb32b994788abf7563f015ab30c20bffc431de639c832bbc22ecaaf6d46e8f498e24f0a5965835ec42d63a9c377dd4b62bf34992f07429b152f54e5b64aaaa5f7c8b85539f2d8e06d958a8a7ee1c9ce5a2e30d4cd2508db7d4745fabf45284b30cfee2e41c9716fc4f12ab88f84966ffd18d67ad2e825d04b5151a1de2dd4ffc7a2f43942d5b962ac8ef5c16789833336424ae51fdcdfa4d98da0830f0a825bf"}, {0x60, 0x116, 0x9, "0ad98fc03af77098ffd07b82e61ddecaedcedb9336477e720c8c6d1ee4a9aa4232a14a513dee5adae9bcb307d8f48791d01d97b41b52080d3eae926ec0fa823ea703eb3325b10981552861"}, {0xb8, 0x117, 0xfff, "b9608fb2cc1cf9fb3fe1c6d080c56e76d588bfa08bb5c64e134d7dd63d75e5869b050b3e2a1fbaea564f9488639f8166fde2d93066f9fc15a6d3885b80de5a24a0a5ca2f54e37d4299152117b5f183e6655b1aa0fd368b763e2d096558d55d0150496a2aac4787271acd6d3b40c12de9b92722702b2ebd8e1747de274843b3dd8d26325ffbc3a9a6d5279d4837683bd8acfa7494d3ef9a4f10e5ff8aa74dd35c930b6638a4"}], 0x4a8, 0x1}, 0x0) 19:17:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x40000, 0x0) r1 = semget$private(0x0, 0x3, 0x20) semop(r1, &(0x7f0000000180)=[{0x3, 0x1, 0x1000}, {0x7, 0x400}, {0x5, 0x2, 0x800}, {0x0, 0x0, 0x1000}, {0x3, 0x7, 0x1800}, {0x3, 0x5, 0x800}, {0x3, 0x42, 0x1800}, {0x4, 0xddb5, 0x1000}, {0x3, 0x3, 0x800}], 0x9) ioctl$UFFDIO_UNREGISTER(r0, 0x8010aa01, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0x0, &(0x7f0000000180)) [ 315.073160] ceph: device name is missing path (no : separator in ./file0) 19:17:54 executing program 7: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xff, 0x101000) perf_event_open(&(0x7f0000000180)={0x5, 0x70, 0x1, 0xff, 0x1a60, 0xffffffffffffffff, 0x0, 0x6, 0x2000, 0x1, 0x1, 0xfc0000000000, 0xff, 0x9, 0x8, 0xa690, 0xb102, 0x0, 0xd1, 0x401, 0x80000000000, 0x5, 0x1, 0xffffffffffff758e, 0x0, 0x1, 0x10001, 0x9, 0x80000000, 0x7, 0x100, 0x10000000000, 0x4, 0x23c9, 0xffffffff, 0x2, 0x4, 0x9, 0x0, 0xfb87, 0x4, @perf_config_ext={0x6, 0xc753}, 0x4440, 0x9, 0x100000000, 0x4, 0x4, 0x1a46, 0x8}, r0, 0x5, r1, 0xb) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x4, 0x1) sendto$inet(r0, &(0x7f0000000180)="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", 0x1000, 0x4004000, &(0x7f0000001180)={0x2, 0x4e21, @local}, 0x10) 19:17:54 executing program 0: syz_emit_ethernet(0x62, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0xe, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x24, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:54 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x40) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x11fffe, &(0x7f0000000200)="9ea32b6101084e26d236d79e7f55d610835322da1e4fd5ed19f4d7f70baf2afded04ec00aeda0da2c1e71ab7b824bf8bf7deadb0cede76a92e13b47d81b914057cc4d82abfa581e3a9699e66585690a521fcc58d937a911106269c4442f0618c8201017dbc63300722fa0437b074ff63090602073ed6bbede38892910ce8c84516e6ddf0f3330763ca7a2e1f3673ffafb35fea016682d735f2ed729c0e6d7ebf8a83123fbded307cd15e39d56e69bf46aad33377c5e85a5acb") r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000400)=""/194) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000340)=""/161) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:54 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getuid() ioprio_get$uid(0x3, r0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x3d, 0x440100) r2 = getuid() lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='fuseblk\x00', 0x1090, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x8}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x12000, 0x0) write$FUSE_DIRENT(r1, &(0x7f0000000400)={0x78, 0xfffffffffffffff5, 0x6, [{0x1, 0x9dd, 0x8, 0x2, '.*@wlan0'}, {0x2, 0x1, 0x4, 0x1, 'nfs\x00'}, {0x0, 0x1, 0xa, 0x164, '^%\\vmnet0}'}]}, 0x78) setsockopt$ALG_SET_AEAD_AUTHSIZE(r4, 0x117, 0x5, 0x0, 0x0) 19:17:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0xe1bb0e3a4371701b, 0x6, 0xe16, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) socketpair(0xe, 0x5, 0xcd8f, &(0x7f0000000180)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) exit(0x1) 19:17:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x401, 0x101000) accept$packet(0xffffffffffffff9c, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000006c0)={@mcast1, r1}, 0x14) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:54 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f00000001c0), 0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800005f}, r2, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x1, 0x30, 0xde87, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={r3, 0x18, "420610414c23529441415bd5fa95ca59ea61011ed5ef5201"}, &(0x7f00000002c0)=0x20) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:54 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000001, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000100)={0x6, 0x20, 0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000240)="3b18cf1bb7a2e9ceceda2ab3c4f2e68ae8eeaa5c8e7bfe6499c4ada361bec8b75b15aad618eebbd5366444422a82709ac3b5e4") 19:17:55 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x10, 0x5, 0x5) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x88d, 0x4) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400002, 0x0) dup2(r1, r0) r2 = add_key(&(0x7f0000000200)='rxrpc\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="1ebe4aaab6a18c1ec2c28d757dabf63c7597d0763d96fb9b6aaedf625a809c5f3068f44cf418ced0277c645dc593eb688ca3bd1e8b7bdbe72daacd9d883c35cc46a23cc0e8c9c0e5f6ed5416746da58f6cde36168fdbfc5dee000925046331394ee50e3df4f42ee62e4e5a8041e7c276", 0x70, 0xfffffffffffffff8) keyctl$clear(0x7, r2) unlinkat(r1, &(0x7f0000000180)='./file1\x00', 0x0) 19:17:55 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) r1 = accept4$inet6(r0, 0x0, &(0x7f00000001c0), 0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800005f}, r2, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000200)={0x0, 0x1, 0x30, 0xde87, 0x7}, &(0x7f0000000240)=0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000280)={r3, 0x18, "420610414c23529441415bd5fa95ca59ea61011ed5ef5201"}, &(0x7f00000002c0)=0x20) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0x0, 0x50002) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:55 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:55 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x80000) faccessat(r0, &(0x7f0000000180)='./file0\x00', 0x10, 0x100) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:55 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x40) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, &(0x7f00000002c0)=0x10) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x11fffe, &(0x7f0000000200)="9ea32b6101084e26d236d79e7f55d610835322da1e4fd5ed19f4d7f70baf2afded04ec00aeda0da2c1e71ab7b824bf8bf7deadb0cede76a92e13b47d81b914057cc4d82abfa581e3a9699e66585690a521fcc58d937a911106269c4442f0618c8201017dbc63300722fa0437b074ff63090602073ed6bbede38892910ce8c84516e6ddf0f3330763ca7a2e1f3673ffafb35fea016682d735f2ed729c0e6d7ebf8a83123fbded307cd15e39d56e69bf46aad33377c5e85a5acb") r1 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000400)=""/194) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000340)=""/161) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:55 executing program 6: r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$inet(0x2, 0x80007, 0x3) dup3(r0, r1, 0x80000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getgroups(0x1, &(0x7f0000000200)=[0xee01]) chown(&(0x7f0000000100)='./file0\x00', r2, r3) 19:17:55 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e24, 0x4, @local, 0x1c000000000}}, 0xe972, 0xfffffffffffffffb, 0x0, 0x0, 0x5}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000280)={0x4, 0x1, 0xe, 0x3, 0x4000000040, 0xffff, 0x40, 0xa1d, r1}, 0x20) r2 = shmget$private(0x0, 0x2000, 0x54000053, &(0x7f0000ffb000/0x2000)=nil) shmat(r2, &(0x7f0000ffb000/0x2000)=nil, 0x1000) 19:17:56 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x400, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x800, 0x0) linkat(r0, &(0x7f0000000180)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00', 0x1000) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:56 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) accept(r0, &(0x7f0000000180)=@nfc_llcp, &(0x7f0000000100)=0x80) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:56 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000100)='./file0\x00', 0x40) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000180)={0xffffffffffffff9c}) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f00000001c0)=0x147a, 0x4) 19:17:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000100)="24000000010a07041dfffd946fa2830020200a0009000100021d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) flistxattr(r0, &(0x7f0000000180)=""/255, 0xff) 19:17:56 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x80000001, 0x0) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000100)={0x6, 0x20, 0x1}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f0000000240)="3b18cf1bb7a2e9ceceda2ab3c4f2e68ae8eeaa5c8e7bfe6499c4ada361bec8b75b15aad618eebbd5366444422a82709ac3b5e4") 19:17:56 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f00000001c0)=0x3, 0x4) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x3ff, 0x802) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000003, 0x10, r1, 0x0) ioctl$EVIOCGLED(r1, 0x80404519, &(0x7f0000000240)=""/4096) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000001400)) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000001240)) 19:17:56 executing program 0 (fault-call:0 fault-nth:0): syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 317.595846] FAULT_INJECTION: forcing a failure. [ 317.595846] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 317.607864] CPU: 0 PID: 10746 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #36 [ 317.615171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 317.624579] Call Trace: [ 317.627247] dump_stack+0x14b/0x190 [ 317.630936] should_fail+0xa98/0xaa0 [ 317.634716] __alloc_pages_nodemask+0x5db/0x5c80 [ 317.639581] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 317.644317] ? __wake_up_common_lock+0x108/0x370 [ 317.649134] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 317.654659] ? task_kmsan_context_state+0x5e/0x110 [ 317.659695] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 317.665143] ? vmalloc_to_page+0x57d/0x6b0 [ 317.669452] ? vmalloc_to_page_or_null+0x3b/0xa0 [ 317.674318] ? kmsan_set_origin_inline+0x6b/0x120 [ 317.679230] ? kmsan_set_origin+0x93/0x150 [ 317.683526] alloc_pages_current+0x6b1/0x970 [ 317.688005] skb_page_frag_refill+0x3ab/0x590 [ 317.692558] tun_get_user+0x10da/0x7f70 [ 317.696618] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 317.702065] ? lockref_put_or_lock+0x262/0x360 [ 317.706735] tun_chr_write_iter+0x1d4/0x330 [ 317.711117] ? tun_chr_read_iter+0x450/0x450 [ 317.715575] do_iter_readv_writev+0x874/0xa50 [ 317.720134] ? tun_chr_read_iter+0x450/0x450 [ 317.724600] do_iter_write+0x302/0xd80 [ 317.728547] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 317.734056] ? import_iovec+0x3a0/0x5c0 [ 317.738098] do_writev+0x3be/0x820 [ 317.741733] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 317.747170] ? fput+0x257/0x2e0 [ 317.750551] __x64_sys_writev+0xe1/0x120 [ 317.754670] ? __ia32_sys_readv+0x120/0x120 [ 317.759034] do_syscall_64+0x15b/0x220 [ 317.762993] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 317.768232] RIP: 0033:0x456f41 [ 317.771485] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b6 fb ff c3 48 83 ec 08 e8 da 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 23 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 317.790419] RSP: 002b:00007fd75a266ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 317.798208] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 0000000000456f41 [ 317.805530] RDX: 0000000000000001 RSI: 00007fd75a266bf0 RDI: 00000000000000f0 [ 317.812831] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 317.820146] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 317.827482] R13: 00000000004d64e0 R14: 00000000004c9b11 R15: 0000000000000000 19:17:56 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='cgroup2\x00', 0x2200802, &(0x7f0000000200)="a61e3ec8f959b379956d12e8523742f8b79f462afff37857ed75b11a7986af9e197bd054537ce1d5b1bc075bc7aef782b4a975831c163abd8c40ae16a03d471c9fab24fd64cb4c3f7a775763254474a66f7497b77f32b03d2a4de6cd17e533c6a352c88686a6f416a8430a51c15601ad57df763e28b0229e65f05994fcd23961b1272cdec4b5e01f1fc2d3f5782b1a838f213658dc2a3da57814aa7bd3a97aaf21c647df038e3f34f3f65430e38491") r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x246000, 0x0) readlinkat(r0, &(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000300)=""/152, 0x98) mount(&(0x7f0000000480)='./file0/file0\x00', &(0x7f0000000440)='./file0\x00', &(0x7f00000005c0)='msdos\x00', 0xfffffffffffffffd, &(0x7f00000004c0)="b92aea3419500d3c09e511ac95b1e9a1c7fde65940ba3115a1dad3a73190bf9e33c189b5f8d62eda25de4a68409bdde7301de77162df9fefb54aa3a7bbe60fa9e17c605be1082628b09299c82f77ccc0016b6028187c2fd54b376cf929d5cdd780cfd88ee040298bd58084df9dd52d994266bcec3d4f427ab6890e3b1cfb74811fa4932f42b8ceb4d1b911dbe384fc9e60507dd1e4af1c8b62ef4dc56160d28b91fba77f30bf246f70cfd67ee3520c335258a5bb9fac8ff11292d035") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:56 executing program 0 (fault-call:0 fault-nth:1): syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:17:57 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgid(0x0) rt_tgsigqueueinfo(r0, r1, 0x26, &(0x7f0000000140)={0x3a, 0xffffffff95ca0bbb, 0x101}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)='nfs\x00', 0x2c00b8, &(0x7f0000000180)="9deda51eaeb241e12942bdd008c7c5936b94c0c9f6c939a9a37a2965cb23606b14362bf9e72892f21f23b224107e200ebd6d0d7ca608a8c96f2e255fa9c9574d8ef986ef004a9fa27cd2f388193282c12b0da46053374ae3da4beb5a381a093bda51a0b07f006e2c996f28d9555f4a642353f4254bc8331655536290094c177d9360adb871fd356e335f58b9a33009a64e8dce55341f9379e91600000000") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 318.097319] cgroup: cgroup2: unknown option "¦>ÈùY³y•mèR7Bø·ŸF*ÿóxWíu±y†¯ž{ÐTS|áÕ±¼[Ç®÷‚´©uƒ:½Œ@® =GŸ«$ýdËL?zwWc%Dt¦ot—·2°=*MæÍå3Æ£RȆ†¦ô¨C [ 318.097319] QÁV­Wßv>(°"žeðY”üÒ9a±'" [ 318.115617] FAULT_INJECTION: forcing a failure. [ 318.115617] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.127692] CPU: 0 PID: 10759 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #36 [ 318.134975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.144340] Call Trace: [ 318.146956] dump_stack+0x14b/0x190 [ 318.150629] should_fail+0xa98/0xaa0 [ 318.154378] __alloc_pages_nodemask+0x5db/0x5c80 [ 318.159187] ? kernel_poison_pages+0x1a0/0x360 [ 318.163814] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.169312] ? get_page_from_freelist+0xae35/0xb8b0 [ 318.174362] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 318.179873] ? __module_address+0x6a/0x600 [ 318.184132] ? task_kmsan_context_state+0x5e/0x110 [ 318.189101] kmsan_internal_alloc_meta_for_pages+0x8e/0x700 [ 318.194869] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 318.200394] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.205310] kmsan_alloc_page+0x75/0xd0 [ 318.209319] __alloc_pages_nodemask+0xf6b/0x5c80 [ 318.214095] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 318.218784] ? __wake_up_common_lock+0x108/0x370 [ 318.223605] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 318.229089] ? task_kmsan_context_state+0x5e/0x110 [ 318.234057] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 318.239448] ? vmalloc_to_page+0x57d/0x6b0 [ 318.243733] ? vmalloc_to_page_or_null+0x3b/0xa0 [ 318.248531] ? kmsan_set_origin_inline+0x6b/0x120 [ 318.253414] ? kmsan_set_origin+0x93/0x150 [ 318.257691] alloc_pages_current+0x6b1/0x970 [ 318.262166] skb_page_frag_refill+0x3ab/0x590 [ 318.266746] tun_get_user+0x10da/0x7f70 [ 318.270761] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 318.276146] ? lockref_put_or_lock+0x262/0x360 [ 318.280806] tun_chr_write_iter+0x1d4/0x330 [ 318.285185] ? tun_chr_read_iter+0x450/0x450 [ 318.289638] do_iter_readv_writev+0x874/0xa50 19:17:57 executing program 4 (fault-call:8 fault-nth:0): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:57 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x20000000000006, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:57 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='bdev\x00', 0x0, &(0x7f00000002c0)="d46ea8dbd9bbec07ffbbd2400ae876c13b3a76ee2d41c97b81a904fdf7ce6dd4edd14c9fc779c35d0008881b4b7c630a11af2d8380ec03ea28bd985e27d9dfd608d3c83661e6b0a0a4c9ae923b6bb322098c97c51dcf77ef13444c428c81a28e1d926289434e50dd3c5ae304c653fbd349a1cb03803d7c7008409846c9ab19ffaaa072761a3871c5986cbd5db6a1af") mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = fcntl$dupfd(r0, 0x0, r0) statx(r1, &(0x7f0000000380)='./file0/file0\x00', 0x1000, 0xfff, &(0x7f00000003c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) [ 318.294190] ? tun_chr_read_iter+0x450/0x450 [ 318.298633] do_iter_write+0x302/0xd80 [ 318.302557] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 318.308033] ? import_iovec+0x3a0/0x5c0 [ 318.312057] do_writev+0x3be/0x820 [ 318.315658] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 318.321064] ? fput+0x257/0x2e0 [ 318.324386] __x64_sys_writev+0xe1/0x120 [ 318.328484] ? __ia32_sys_readv+0x120/0x120 [ 318.332838] do_syscall_64+0x15b/0x220 [ 318.336774] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.341989] RIP: 0033:0x456f41 [ 318.345243] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b6 fb ff c3 48 83 ec 08 e8 da 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 23 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 318.364196] RSP: 002b:00007fd75a266ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 318.371937] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 0000000000456f41 [ 318.379241] RDX: 0000000000000001 RSI: 00007fd75a266bf0 RDI: 00000000000000f0 [ 318.386529] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 318.393818] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 318.401116] R13: 00000000004d64e0 R14: 00000000004c9b11 R15: 0000000000000001 [ 318.453877] FAULT_INJECTION: forcing a failure. [ 318.453877] name failslab, interval 1, probability 0, space 0, times 0 [ 318.465413] CPU: 0 PID: 10778 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 318.472736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.482120] Call Trace: [ 318.484787] dump_stack+0x14b/0x190 [ 318.488475] should_fail+0xa98/0xaa0 [ 318.492267] __should_failslab+0x278/0x2a0 [ 318.496578] should_failslab+0x29/0x70 [ 318.500524] __kmalloc+0xbe/0x350 [ 318.504075] ? rw_copy_check_uvector+0x173/0x740 [ 318.508894] rw_copy_check_uvector+0x173/0x740 [ 318.513574] ? do_preadv+0x310/0x570 [ 318.517361] import_iovec+0x178/0x5c0 [ 318.521247] do_preadv+0x310/0x570 [ 318.524874] ? syscall_return_slowpath+0xdb/0x700 [ 318.529810] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 318.535267] ? fput+0x257/0x2e0 [ 318.538597] __x64_sys_preadv+0x120/0x170 [ 318.542797] ? __ia32_sys_writev+0x120/0x120 [ 318.547266] do_syscall_64+0x15b/0x220 [ 318.551254] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 318.556477] RIP: 0033:0x457089 [ 318.559713] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 318.578658] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 318.586422] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 318.593736] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 19:17:57 executing program 1: mkdir(&(0x7f0000000000)='./file1\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) clock_gettime(0x0, &(0x7f0000004c40)={0x0, 0x0}) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000004cc0)) creat(&(0x7f0000004d00)='./file1\x00', 0x1) recvmmsg(r0, &(0x7f0000004a40)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000180)=""/35, 0x23}, {&(0x7f00000001c0)=""/189, 0xbd}, {&(0x7f0000000280)=""/192, 0xc0}, {&(0x7f0000000340)=""/141, 0x8d}], 0x4, &(0x7f0000000440)=""/101, 0x65, 0x8}, 0x3}, {{&(0x7f00000004c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000540)=""/108, 0x6c}, {&(0x7f00000005c0)=""/97, 0x61}], 0x2, &(0x7f0000000680)=""/117, 0x75, 0x19b}, 0x8001}, {{&(0x7f0000000700)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000780)=""/46, 0x2e}, {&(0x7f00000007c0)=""/32, 0x20}, {&(0x7f0000000800)=""/187, 0xbb}, {&(0x7f00000008c0)=""/154, 0x9a}, {&(0x7f0000000980)=""/160, 0xa0}, {&(0x7f0000000a40)=""/41, 0x29}, {&(0x7f0000000a80)=""/181, 0xb5}, {&(0x7f0000000b40)=""/64, 0x40}], 0x8, &(0x7f0000000c00)=""/196, 0xc4, 0x1}, 0x5}, {{&(0x7f0000000d00)=@hci, 0x80, &(0x7f0000000fc0)=[{&(0x7f0000000d80)=""/58, 0x3a}, {&(0x7f0000000dc0)=""/255, 0xff}, {&(0x7f0000000ec0)=""/198, 0xc6}], 0x3, &(0x7f0000001000)=""/129, 0x81, 0x8}, 0xa69}, {{&(0x7f00000010c0)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000002200)=[{&(0x7f0000001140)=""/4096, 0x1000}, {&(0x7f0000002140)=""/47, 0x2f}, {&(0x7f0000002180)=""/86, 0x56}], 0x3, &(0x7f0000002240)=""/84, 0x54, 0xb2d}}, {{&(0x7f00000022c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000002340)=""/222, 0xde}, {&(0x7f0000002440)=""/218, 0xda}], 0x2, &(0x7f0000002580)=""/179, 0xb3, 0x7ff}, 0x8}, {{&(0x7f0000002640)=@ax25, 0x80, &(0x7f0000003780)=[{&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000036c0)=""/189, 0xbd}], 0x2, &(0x7f00000037c0)=""/100, 0x64, 0x4}}, {{&(0x7f0000003840)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000004940)=[{&(0x7f00000038c0)=""/4096, 0x1000}, {&(0x7f00000048c0)=""/69, 0x45}], 0x2, &(0x7f0000004980)=""/174, 0xae, 0x7f}, 0x1000}], 0x8, 0x40010041, &(0x7f0000004c80)={r1, r2+30000000}) [ 318.601062] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 318.608373] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 318.615673] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000000 19:17:57 executing program 3: kexec_load(0x9, 0x3, &(0x7f0000002880)=[{&(0x7f0000001680)="b7a225095f40600835012dbf81d5ae65b362f28c565cac176a6dfd313df505415871074367f81fe2b0d2f7e40e9596dbee91f91ca5d721ec88c8173df92901db90149e5c236d9c57fca750c8524c454dd34178f33668c60b0305b2eb667df07b72b6013364aa3bf44a00deeb1fe9a9f658e9a643b2e3ae32191aff47657493cefc5b523802af37b6ce1c28aeed2ebe1752f2b154423ab986ce8add2c81151335d0e9c3ad09c487c956cb1ee0d60a91880924f33a7bd572adc69b6bd3ee743f34e657adba1e18cb8fb8598fb37c607d4e59da2d97230a187bfce8b51240c62adf3ea96c0c4d08a5d2", 0xe8, 0x7, 0x5}, {&(0x7f0000001780)="59d4a4c2b324477462c94a1f4c968e91d4dfe0b2bf2a175d7fcccf199c6e7413ad7494d0cab1b7635e763bc7e03fc73df3bbdc8162bfc759d4c000cebc2d8a7453691fb2d0433ab3de49829e8aa912e4b5a59051fa576218c5be9e73fdc8daa6c0539817fece1653e05aa0d5a2b49cd1e2fbc49d898c7e21ac58cdd3a1be79de956635aaf749d0025b7784736036ac8f14e234a60208337f952b7134a8fafd9321d82f6c812d3a7388e7fd6564e815b16e1c6be848970a6753a6c431b47023e8e2c1d42509fe8a5d", 0xc8, 0x8000, 0x4}, {&(0x7f0000001880)="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", 0x1000, 0x2, 0xffff}], 0x3e0000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) socketpair$inet6(0xa, 0x80000, 0x9, &(0x7f0000000100)={0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x406, r1) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000001500), &(0x7f0000001540)=0x4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000180)={0x0, @in6={{0xa, 0x4e20, 0x1, @mcast1, 0x5}}}, &(0x7f0000000240)=0x84) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000015c0)={'raw\x00'}, &(0x7f0000001640)=0x54) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000001580)='em1proc\x00') getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000280)={0x0, 0x6}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000300)={r3, 0xfffffffffffffff7, 0x7, 0x1, 0x5, 0x233c, 0x0, 0xbf, {r4, @in={{0x2, 0x4e20, @loopback}}, 0x100000001, 0xfffffffffffffc00, 0xe7, 0xfffffffffffffffc}}, &(0x7f00000003c0)=0xb0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x2, &(0x7f0000000440)="e64f7e035126b3c5b0ced715096a178a7d61160600c08e413954b7b5667d66548cbad8c71a154510a997939b2700d6ac22db8217ea29b1913204af5aceec2f105cc9c2020bfb8ae5ade211c49420bde7a3c45e51f329a8adc50fb3") r5 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x1) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000014c0)) ioctl$PPPIOCGL2TPSTATS(r5, 0x80487436, &(0x7f00000004c0)="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") 19:17:57 executing program 4 (fault-call:8 fault-nth:1): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:57 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2000, 0x0) getpeername$unix(r0, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) 19:17:57 executing program 0 (fault-call:0 fault-nth:2): syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 318.876999] cgroup: cgroup2: unknown option "¦>ÈùY³y•mèR7Bø·ŸF*ÿóxWíu±y†¯ž{ÐTS|áÕ±¼[Ç®÷‚´©uƒ:½Œ@® =GŸ«$ýdËL?zwWc%Dt¦ot—·2°=*MæÍå3Æ£RȆ†¦ô¨C [ 318.876999] QÁV­Wßv>(°"žeðY”üÒ9a±'" [ 318.898547] FAULT_INJECTION: forcing a failure. [ 318.898547] name failslab, interval 1, probability 0, space 0, times 0 [ 318.910452] CPU: 0 PID: 10792 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 318.917758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 318.927141] Call Trace: [ 318.929842] dump_stack+0x14b/0x190 [ 318.933523] should_fail+0xa98/0xaa0 [ 318.937338] __should_failslab+0x278/0x2a0 [ 318.941649] should_failslab+0x29/0x70 [ 318.942979] FAULT_INJECTION: forcing a failure. [ 318.942979] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 318.945629] __kmalloc_node+0x22a/0x11c0 [ 318.961488] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 318.966889] ? balance_callback+0x48/0x260 [ 318.971188] ? kvmalloc_node+0x19d/0x3e0 [ 318.975292] ? __schedule+0x680/0x760 [ 318.979117] kvmalloc_node+0x19d/0x3e0 [ 318.983036] seq_read+0x4b0/0x1e80 [ 318.986625] ? __ia32_sys_writev+0x120/0x120 [ 318.991059] do_iter_read+0x890/0xe20 [ 318.994922] ? seq_open+0x390/0x390 [ 318.998579] do_preadv+0x38e/0x570 [ 319.002194] ? syscall_return_slowpath+0xdb/0x700 [ 319.007111] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 319.012528] ? fput+0x257/0x2e0 [ 319.016307] __x64_sys_preadv+0x120/0x170 [ 319.020490] ? __ia32_sys_writev+0x120/0x120 [ 319.024935] do_syscall_64+0x15b/0x220 [ 319.028872] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.034085] RIP: 0033:0x457089 [ 319.037305] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.056232] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 319.063972] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 319.071286] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 319.078593] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 319.085905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 319.093211] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000001 [ 319.100519] CPU: 1 PID: 10799 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #36 [ 319.107831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.117231] Call Trace: [ 319.119846] dump_stack+0x14b/0x190 [ 319.124012] should_fail+0xa98/0xaa0 [ 319.127777] __alloc_pages_nodemask+0x5db/0x5c80 [ 319.132743] ? kernel_poison_pages+0x1a0/0x360 [ 319.137360] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.142827] ? get_page_from_freelist+0xae35/0xb8b0 [ 319.147868] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 319.153382] ? task_kmsan_context_state+0x5e/0x110 [ 319.158351] kmsan_internal_alloc_meta_for_pages+0xfa/0x700 [ 319.164113] ? __msan_metadata_ptr_for_store_1+0x13/0x20 [ 319.169624] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.174531] kmsan_alloc_page+0x75/0xd0 [ 319.178528] __alloc_pages_nodemask+0xf6b/0x5c80 [ 319.183310] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 319.188733] ? update_load_avg+0x6c4/0x1a00 [ 319.193086] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.198559] ? rb_erase_cached+0x28ca/0x2c60 [ 319.203018] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.207903] ? __perf_event_task_sched_in+0x63/0xa30 [ 319.213078] alloc_pages_current+0x6b1/0x970 [ 319.217524] skb_page_frag_refill+0x3ab/0x590 [ 319.222051] tun_get_user+0x10da/0x7f70 [ 319.226054] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 319.231444] ? lockref_put_or_lock+0x262/0x360 [ 319.236099] tun_chr_write_iter+0x1d4/0x330 [ 319.240443] ? tun_chr_read_iter+0x450/0x450 [ 319.244865] do_iter_readv_writev+0x874/0xa50 [ 319.249396] ? tun_chr_read_iter+0x450/0x450 [ 319.253805] do_iter_write+0x302/0xd80 [ 319.257715] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.263191] ? import_iovec+0x3a0/0x5c0 [ 319.267227] do_writev+0x3be/0x820 [ 319.270819] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 319.276213] ? fput+0x257/0x2e0 [ 319.279509] __x64_sys_writev+0xe1/0x120 [ 319.283586] ? __ia32_sys_readv+0x120/0x120 [ 319.287918] do_syscall_64+0x15b/0x220 [ 319.291826] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.297011] RIP: 0033:0x456f41 [ 319.300216] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b6 fb ff c3 48 83 ec 08 e8 da 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 23 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 319.319138] RSP: 002b:00007fd75a266ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 19:17:58 executing program 4 (fault-call:8 fault-nth:2): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 319.326878] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 0000000000456f41 [ 319.334183] RDX: 0000000000000001 RSI: 00007fd75a266bf0 RDI: 00000000000000f0 [ 319.341488] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 319.348756] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 319.356038] R13: 00000000004d64e0 R14: 00000000004c9b11 R15: 0000000000000002 19:17:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x125000, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:58 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x402) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 319.478216] FAULT_INJECTION: forcing a failure. [ 319.478216] name failslab, interval 1, probability 0, space 0, times 0 [ 319.489954] CPU: 0 PID: 10811 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 319.497254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.506630] Call Trace: [ 319.509296] dump_stack+0x14b/0x190 [ 319.513015] should_fail+0xa98/0xaa0 [ 319.516794] __should_failslab+0x278/0x2a0 [ 319.521081] should_failslab+0x29/0x70 [ 319.524998] __kmalloc+0xbe/0x350 19:17:58 executing program 5: sendto(0xffffffffffffffff, &(0x7f0000000180)="497e87954ad093b5fe849ae706538cc68c4198a90b6f46d054ad661f0e8ffa2302b33b6052a94d18a0672d665f32acd5a8fe26fdab9ee72b1c43f41d0009712adcf07fce8e848c126ef3e6c15ff369c25478887b9faa11680fba3456d625d02f1b9f36a8addc8fdd84740a070a9cf00b0596773f64678819aba13088ce9ab3b8cf96004c13fc5ed43f7792a514820457a4b41db27b0885f46be60c0cfd3fdf063c7080d3912535d10706ef17dd8c0ba99b269343dfef7eb5e9ce14cd2debbccc4f", 0xc1, 0x4000010, &(0x7f0000000280)=@nl=@proc={0x10, 0x0, 0x25dfdbff, 0x40400}, 0x80) mkdir(&(0x7f0000000380)='./file0\x00', 0x105) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hwrng\x00', 0x0, 0x0) getresuid(&(0x7f0000000440)=0x0, &(0x7f0000000480)=0x0, &(0x7f00000004c0)) r3 = getgid() fchownat(r0, &(0x7f0000000400)='./file0\x00', r2, r3, 0x1900) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0xc0000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) write$P9_RSTATu(r0, &(0x7f0000000500)={0x7c, 0x7d, 0x2, {{0x0, 0x5c, 0x9, 0xa07, {0x0, 0x3, 0x8}, 0x80000000, 0x6, 0x7, 0x1, 0xf, '/dev/sequencer\x00', 0x4, 'nfs\x00', 0xf, '/dev/sequencer\x00', 0x7, 'ppp1em1'}, 0xb, '/dev/hwrng\x00', r1, r3, r2}}, 0x7c) [ 319.528512] ? proc_cpuset_show+0x64/0x8d0 [ 319.532793] ? proc_cpuset_show+0x95/0x8d0 [ 319.537085] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 319.542586] proc_cpuset_show+0x95/0x8d0 [ 319.546711] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 319.552118] ? get_pid_task+0x10f/0x1a0 [ 319.556131] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 319.561636] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 319.567129] proc_single_show+0x1b1/0x300 [ 319.571342] ? proc_single_open+0x90/0x90 [ 319.575527] seq_read+0xb10/0x1e80 [ 319.579139] do_iter_read+0x890/0xe20 [ 319.583054] ? seq_open+0x390/0x390 [ 319.586725] do_preadv+0x38e/0x570 [ 319.590369] ? kmsan_set_origin_inline+0x6b/0x120 [ 319.595277] __x64_sys_preadv+0x120/0x170 [ 319.599477] ? __ia32_sys_writev+0x120/0x120 [ 319.603928] do_syscall_64+0x15b/0x220 [ 319.607880] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.613098] RIP: 0033:0x457089 19:17:58 executing program 0 (fault-call:0 fault-nth:3): syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 319.616338] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 319.635283] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 319.643071] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 319.650375] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 319.657675] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 319.664979] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 319.672284] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000002 19:17:58 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getuid() setfsuid(r0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 319.781407] FAULT_INJECTION: forcing a failure. [ 319.781407] name failslab, interval 1, probability 0, space 0, times 0 [ 319.792782] CPU: 0 PID: 10831 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #36 [ 319.800096] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 319.809471] Call Trace: [ 319.812121] dump_stack+0x14b/0x190 [ 319.815811] should_fail+0xa98/0xaa0 [ 319.819640] __should_failslab+0x278/0x2a0 [ 319.823932] should_failslab+0x29/0x70 [ 319.827887] kmem_cache_alloc+0x127/0xb20 [ 319.832095] ? build_skb+0xfa/0x6d0 [ 319.835780] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.841270] ? copy_page_from_iter+0xa6d/0x1050 [ 319.846068] build_skb+0xfa/0x6d0 [ 319.849583] tun_get_user+0x178d/0x7f70 [ 319.853644] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 319.859104] ? lockref_put_or_lock+0x262/0x360 [ 319.863764] tun_chr_write_iter+0x1d4/0x330 [ 319.868141] ? tun_chr_read_iter+0x450/0x450 [ 319.872610] do_iter_readv_writev+0x874/0xa50 [ 319.877209] ? tun_chr_read_iter+0x450/0x450 [ 319.881682] do_iter_write+0x302/0xd80 [ 319.885629] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 319.891120] ? import_iovec+0x3a0/0x5c0 [ 319.895145] do_writev+0x3be/0x820 [ 319.898797] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 319.904255] ? fput+0x257/0x2e0 [ 319.907618] __x64_sys_writev+0xe1/0x120 [ 319.911725] ? __ia32_sys_readv+0x120/0x120 [ 319.916089] do_syscall_64+0x15b/0x220 [ 319.920032] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 319.925258] RIP: 0033:0x456f41 [ 319.928494] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b6 fb ff c3 48 83 ec 08 e8 da 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 23 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 [ 319.947430] RSP: 002b:00007fd75a266ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 319.955197] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 0000000000456f41 [ 319.962506] RDX: 0000000000000001 RSI: 00007fd75a266bf0 RDI: 00000000000000f0 [ 319.969804] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 19:17:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0x80800, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x80000001) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) open$dir(&(0x7f0000000100)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:59 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x8, 0x100) bind$unix(r0, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e20}, 0x6e) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000200)={0x2, r0}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x400000000, &(0x7f000000a000)) [ 319.977105] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 319.984408] R13: 00000000004d64e0 R14: 00000000004c9b11 R15: 0000000000000003 19:17:59 executing program 4 (fault-call:8 fault-nth:3): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:17:59 executing program 0 (fault-call:0 fault-nth:4): syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 320.194689] FAULT_INJECTION: forcing a failure. [ 320.194689] name failslab, interval 1, probability 0, space 0, times 0 [ 320.207015] CPU: 0 PID: 10847 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 320.212395] FAULT_INJECTION: forcing a failure. [ 320.212395] name failslab, interval 1, probability 0, space 0, times 0 [ 320.214329] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.214343] Call Trace: [ 320.214403] dump_stack+0x14b/0x190 [ 320.214500] should_fail+0xa98/0xaa0 [ 320.244982] __should_failslab+0x278/0x2a0 [ 320.249267] should_failslab+0x29/0x70 [ 320.253209] __kmalloc+0xbe/0x350 [ 320.256717] ? proc_cpuset_show+0x64/0x8d0 [ 320.260985] ? proc_cpuset_show+0x95/0x8d0 [ 320.265256] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.270764] proc_cpuset_show+0x95/0x8d0 [ 320.274864] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 320.280259] ? get_pid_task+0x10f/0x1a0 [ 320.284263] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.289744] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.295238] proc_single_show+0x1b1/0x300 [ 320.299421] ? proc_single_open+0x90/0x90 [ 320.303594] seq_read+0xb10/0x1e80 [ 320.307158] ? iov_iter_advance+0x496/0x1eb0 [ 320.311627] do_iter_read+0xb87/0xe20 [ 320.315457] ? seq_open+0x390/0x390 [ 320.319127] do_preadv+0x38e/0x570 [ 320.322756] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.327642] __x64_sys_preadv+0x120/0x170 [ 320.331822] ? __ia32_sys_writev+0x120/0x120 [ 320.336256] do_syscall_64+0x15b/0x220 [ 320.340195] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.345413] RIP: 0033:0x457089 [ 320.348645] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.367584] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 320.375323] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 320.382637] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 320.389924] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 320.397222] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 320.404511] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000003 [ 320.411825] CPU: 1 PID: 10850 Comm: syz-executor0 Not tainted 4.19.0-rc1+ #36 [ 320.419144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.428541] Call Trace: [ 320.431200] dump_stack+0x14b/0x190 [ 320.434880] should_fail+0xa98/0xaa0 [ 320.438647] __should_failslab+0x278/0x2a0 [ 320.442923] should_failslab+0x29/0x70 [ 320.446843] kmem_cache_alloc+0x127/0xb20 [ 320.451029] ? dst_alloc+0x28f/0x860 [ 320.454828] dst_alloc+0x28f/0x860 [ 320.458417] ip_route_output_key_hash_rcu+0x226f/0x3aa0 [ 320.463818] ? ipv4_redirect+0x1e0/0x5a0 [ 320.467927] ipv4_redirect+0x3e0/0x5a0 [ 320.471925] gre_err+0x521/0xf30 [ 320.475361] ? gre_rcv+0x1910/0x1910 [ 320.479150] gre_err+0x1ab/0x200 [ 320.482610] ? gre_rcv+0x3b0/0x3b0 [ 320.486275] icmp_redirect+0x39d/0x750 [ 320.490221] ? icmp_unreach+0x1070/0x1070 [ 320.494425] icmp_rcv+0x1813/0x19a0 [ 320.498125] ? kmsan_set_origin_inline+0x6b/0x120 [ 320.503081] ? __msan_poison_alloca+0x173/0x1f0 [ 320.507798] ? local_bh_enable+0x40/0x40 [ 320.511899] ip_local_deliver_finish+0x7ee/0xea0 [ 320.516711] ip_local_deliver+0x438/0x4d0 [ 320.520898] ? ip_local_deliver+0x4d0/0x4d0 [ 320.525264] ? ip_call_ra_chain+0x7c0/0x7c0 [ 320.529624] ip_rcv+0x65f/0x6d0 [ 320.532946] ? ip_rcv_core+0x1160/0x1160 [ 320.537061] netif_receive_skb_internal+0x5bd/0x970 [ 320.542123] ? ip_local_deliver_finish+0xea0/0xea0 [ 320.547101] netif_receive_skb+0x230/0x240 [ 320.551375] tun_get_user+0x6aa5/0x7f70 [ 320.555441] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 320.560880] tun_chr_write_iter+0x1d4/0x330 [ 320.565262] ? tun_chr_read_iter+0x450/0x450 [ 320.569728] do_iter_readv_writev+0x874/0xa50 [ 320.574283] ? tun_chr_read_iter+0x450/0x450 [ 320.578736] do_iter_write+0x302/0xd80 [ 320.582672] ? __msan_metadata_ptr_for_store_8+0x13/0x20 [ 320.588191] ? import_iovec+0x3a0/0x5c0 [ 320.592234] do_writev+0x3be/0x820 [ 320.595869] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 320.601312] ? fput+0x257/0x2e0 [ 320.604680] __x64_sys_writev+0xe1/0x120 [ 320.608805] ? __ia32_sys_readv+0x120/0x120 [ 320.613164] do_syscall_64+0x15b/0x220 [ 320.617118] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.622347] RIP: 0033:0x456f41 [ 320.625581] Code: 75 14 b8 14 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 34 b6 fb ff c3 48 83 ec 08 e8 da 2c 00 00 48 89 04 24 b8 14 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 23 2d 00 00 48 89 d0 48 83 c4 08 48 3d 01 19:17:59 executing program 4 (fault-call:8 fault-nth:4): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 320.644513] RSP: 002b:00007fd75a266ba0 EFLAGS: 00000293 ORIG_RAX: 0000000000000014 [ 320.652265] RAX: ffffffffffffffda RBX: 000000000000006a RCX: 0000000000456f41 [ 320.659562] RDX: 0000000000000001 RSI: 00007fd75a266bf0 RDI: 00000000000000f0 [ 320.666856] RBP: 00000000200000c0 R08: 00000000000000f0 R09: 0000000000000000 [ 320.674158] R10: 0000000000000064 R11: 0000000000000293 R12: 0000000000000003 [ 320.681567] R13: 00000000004d64e0 R14: 00000000004c9b11 R15: 0000000000000004 [ 320.703545] FAULT_INJECTION: forcing a failure. [ 320.703545] name failslab, interval 1, probability 0, space 0, times 0 [ 320.715221] CPU: 0 PID: 10863 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 320.722530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 320.731911] Call Trace: [ 320.734571] dump_stack+0x14b/0x190 [ 320.738269] should_fail+0xa98/0xaa0 [ 320.742038] __should_failslab+0x278/0x2a0 [ 320.746330] should_failslab+0x29/0x70 [ 320.750256] __kmalloc+0xbe/0x350 [ 320.753767] ? proc_cpuset_show+0x64/0x8d0 [ 320.758043] ? proc_cpuset_show+0x95/0x8d0 [ 320.762321] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.767813] proc_cpuset_show+0x95/0x8d0 [ 320.771920] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 320.777322] ? get_pid_task+0x10f/0x1a0 [ 320.781342] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.786867] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 320.792362] proc_single_show+0x1b1/0x300 [ 320.796551] ? proc_single_open+0x90/0x90 [ 320.800740] seq_read+0xb10/0x1e80 [ 320.804323] ? iov_iter_advance+0x496/0x1eb0 [ 320.808793] do_iter_read+0xb87/0xe20 [ 320.812633] ? seq_open+0x390/0x390 [ 320.816312] do_preadv+0x38e/0x570 [ 320.819937] ? syscall_return_slowpath+0xdb/0x700 [ 320.824866] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 320.830296] ? fput+0x257/0x2e0 [ 320.833632] __x64_sys_preadv+0x120/0x170 [ 320.837835] ? __ia32_sys_writev+0x120/0x120 [ 320.842277] do_syscall_64+0x15b/0x220 [ 320.846229] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 320.851448] RIP: 0033:0x457089 [ 320.854686] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 320.873629] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 320.881374] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 320.888693] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 320.896005] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:17:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x0, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)) r1 = syz_open_dev$sndpcmc(&(0x7f0000000340)='/dev/snd/pcmC#D#c\x00', 0x9, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000380)={r0}) r2 = socket(0x11, 0x4000000000080002, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x4, r3, 0x1, 0x0, 0x6, @local}, 0x14) getsockopt$inet_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmmsg$inet_sctp(r2, &(0x7f0000871fc8)=[{&(0x7f000086c000)=@in6={0xa, 0x0, 0x2}, 0x1c, &(0x7f0000d1e000), 0x0, &(0x7f0000dda000)}], 0x492492492492510, 0x0) io_setup(0x7, &(0x7f0000000100)=0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x20000, 0x0) io_cancel(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x8, 0x2, r0, &(0x7f0000000140)="08b6104831bdde0b199da454bcf3683079bf148c53746ef884eaea07434fe3e743d92df32cde5b57f818a92373dc3749fd4e8525fe5e6b6b3d3096c0044a8b13529351e7244db46433b5ca6aa82f1f5b3e94a31942cb536f0d6bf47cec3faeae726fd943faf61006b9aba77fc07c392e3ba716087a0c44f1b1f386a601bb92882bb1ddf82c9ac4bc67011509e0b25bb590bc03d26f0052d220e4e24a59e5e026ca648849fdfddb5f36ee58edbae43f980c23ef30ebddcac3776d032c8edb2e1cb2827f4df65ec3907a6bdfd13c7408a825f5d8", 0xd3, 0x7, 0x0, 0x1}, &(0x7f0000000300)) r5 = add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000400)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$get_keyring_id(0x0, r5, 0x7fbd) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:59 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$inet_sctp(0x2, 0x400005, 0x84) sendto$inet(r0, &(0x7f0000000100)="5ff4c78288c46887def34b9c7094939763e6323e204cd07ad4b8f2c29bf97e99d3", 0x21, 0x14, &(0x7f0000000180)={0x2, 0x4e23, @rand_addr=0x3}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:17:59 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x80, 0x800) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000580), &(0x7f00000005c0)=0x4) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000180)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x90000, 0x0) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f0000000240)={'filter\x00'}, &(0x7f00000002c0)=0x44) r2 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0xfff, 0x80) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f00000001c0)=0x2, 0x4) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x5, 0x9}, &(0x7f0000000340)=0x8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000400)={{{@in6, @in6=@ipv4={[], [], @local}}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000500)=0xe8) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={r3, 0x3, 0x30}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000600)=0x0) prlimit64(r4, 0xb, &(0x7f0000000640)={0x4, 0x9}, &(0x7f0000000680)) 19:17:59 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000180)=@ipx, &(0x7f0000000200)=0x80) [ 320.903314] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 320.910625] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000004 19:18:00 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x2}) 19:18:00 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) rename(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000180)='./file0\x00') mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:00 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001480)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f00000014c0)={0x3, 0xabb}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) rename(&(0x7f0000001500)='./file0/file0\x00', &(0x7f0000001540)='./file0/file0\x00') r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer2\x00', 0x121100, 0x0) mount(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)='./file0/file0\x00', &(0x7f0000001380)='xfs\x00', 0x800, &(0x7f00000013c0)="924e97897ff639848c81377635da2e5f3c5f8203bcccd1d91d85fefcedc721b5cc27559175f241c6d9bfee2747f1cec11b471baa25cf11abb11c716163d483db6028da3a6eb5c92a1d5199fc63dd3f3378d22ae2070dc5926b47a37deb6567ed98276afc5b4ff743d5178997122c27615a46e019246a8a7e8d5ba5fc15d1532c102eb7c2f21cc34c42bf71c64ce7380c7d254e7a587d544326a7eea3f5e179ed0e22ae328a2b") mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='hfs\x00', 0x4, &(0x7f00000002c0)="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") read$eventfd(r1, &(0x7f00000012c0), 0x8) write$FUSE_INIT(r1, &(0x7f0000000180)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x7, 0x88880, 0x4, 0x20, 0xe649, 0x6c4a}}, 0x50) 19:18:00 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x10482, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000080)=""/19) 19:18:00 executing program 4 (fault-call:8 fault-nth:5): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:00 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e20, @remote}}, 0x9, 0x4, 0x8, 0x0, 0x8}, &(0x7f0000000140)=0x98) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000180)={r1, 0xffffffffffffff5f, 0x30, 0x5, 0x9d25}, &(0x7f00000001c0)=0x18) syz_emit_ethernet(0x95, &(0x7f0000000200)={@remote, @broadcast, [{[{0x9100, 0x1, 0xc5bc}], {0x8100, 0x4, 0x1c9, 0x1}}], {@llc_tr={0x11, {@llc={0xff, 0xff, "9620", "55cd398f3e3ae499eba9a6422227286d217dd8deda969c0e04ce2fafe9791ce277ac85615fff724732ad0d74021c90dd3ccddf4c809ae84c263ebbaf39114c331ca6b403c1638c736d7fda38d6e30640ac923faf3b2449927af21d22e6bae6a162c5efe6739ff378a4802eb627610a0c2d4ec73697d37c8c12e38e"}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffe]}) [ 321.596879] FAULT_INJECTION: forcing a failure. [ 321.596879] name failslab, interval 1, probability 0, space 0, times 0 [ 321.608733] CPU: 0 PID: 10914 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 321.616045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 321.625424] Call Trace: [ 321.628076] dump_stack+0x14b/0x190 [ 321.631759] should_fail+0xa98/0xaa0 [ 321.635537] __should_failslab+0x278/0x2a0 [ 321.639825] should_failslab+0x29/0x70 [ 321.643750] __kmalloc+0xbe/0x350 [ 321.647260] ? proc_cpuset_show+0x64/0x8d0 [ 321.651537] ? proc_cpuset_show+0x95/0x8d0 [ 321.655801] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 321.661320] proc_cpuset_show+0x95/0x8d0 [ 321.665433] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 321.670851] ? get_pid_task+0x10f/0x1a0 [ 321.674876] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 321.680376] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 321.685871] proc_single_show+0x1b1/0x300 [ 321.690062] ? proc_single_open+0x90/0x90 [ 321.694245] seq_read+0xb10/0x1e80 [ 321.697811] ? iov_iter_advance+0x496/0x1eb0 [ 321.702311] do_iter_read+0xb87/0xe20 [ 321.706140] ? seq_open+0x390/0x390 [ 321.709818] do_preadv+0x38e/0x570 [ 321.713450] ? kmsan_set_origin_inline+0x6b/0x120 [ 321.718350] __x64_sys_preadv+0x120/0x170 [ 321.722547] ? __ia32_sys_writev+0x120/0x120 [ 321.726996] do_syscall_64+0x15b/0x220 [ 321.730915] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 321.736118] RIP: 0033:0x457089 [ 321.739346] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 321.758259] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 321.766015] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 321.773327] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 321.780631] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 321.788100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 321.795383] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000005 19:18:00 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078ac1414bbac141411050290780000000080000000000000f5ff2e0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) 19:18:01 executing program 4 (fault-call:8 fault-nth:6): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:01 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:18:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x2000, 0x0) accept(r0, 0x0, &(0x7f0000000180)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:01 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000980)='/dev/rtc0\x00', 0x400, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000a00)={0x5, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1e}}, {0x2, 0x4e23, @remote}, {0x2, 0x4e20, @remote}, 0x101, 0x4, 0x6, 0x2, 0x3, &(0x7f00000009c0)='ip6_vti0\x00', 0x0, 0x9, 0x9}) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = accept(r0, &(0x7f00000004c0)=@nl=@proc, &(0x7f0000000100)=0xfffffffffffffe7e) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r2, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa8, r3, 0xf01, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x37}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x5}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x14}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x2}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}]}, 0xa8}, 0x1, 0x0, 0x0, 0x20040004}, 0x40000) ioctl$FICLONE(r1, 0x40049409, r0) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) unlink(&(0x7f0000000480)='./file0\x00') mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socket$bt_hidp(0x1f, 0x3, 0x6) openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x12400, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0x2, 0x0) getsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000200)=0x7f, &(0x7f0000000240)=0x2) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0xf, 0x1}, 0x14) [ 322.121313] FAULT_INJECTION: forcing a failure. [ 322.121313] name failslab, interval 1, probability 0, space 0, times 0 [ 322.133357] CPU: 1 PID: 10938 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 322.140663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.150052] Call Trace: [ 322.152713] dump_stack+0x14b/0x190 [ 322.156431] should_fail+0xa98/0xaa0 [ 322.160221] __should_failslab+0x278/0x2a0 [ 322.164534] should_failslab+0x29/0x70 [ 322.168486] __kmalloc+0xbe/0x350 [ 322.172016] ? proc_cpuset_show+0x64/0x8d0 [ 322.176327] ? proc_cpuset_show+0x95/0x8d0 [ 322.180606] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.186102] proc_cpuset_show+0x95/0x8d0 [ 322.190237] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 322.195650] ? get_pid_task+0x10f/0x1a0 [ 322.199679] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.205191] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.210718] proc_single_show+0x1b1/0x300 [ 322.214919] ? proc_single_open+0x90/0x90 [ 322.219143] seq_read+0xb10/0x1e80 [ 322.222763] ? iov_iter_advance+0x496/0x1eb0 [ 322.227283] do_iter_read+0xb87/0xe20 [ 322.231182] ? seq_open+0x390/0x390 [ 322.234872] do_preadv+0x38e/0x570 [ 322.238497] ? syscall_return_slowpath+0xdb/0x700 [ 322.243422] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 322.248857] ? fput+0x257/0x2e0 [ 322.252239] __x64_sys_preadv+0x120/0x170 [ 322.256435] ? __ia32_sys_writev+0x120/0x120 [ 322.260880] do_syscall_64+0x15b/0x220 [ 322.264857] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.270106] RIP: 0033:0x457089 [ 322.273345] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.292284] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 322.300037] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 322.307347] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 322.314653] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 322.321961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 322.329277] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000006 19:18:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x1, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:01 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x101) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:01 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)) 19:18:01 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) syz_open_dev$sndmidi(&(0x7f0000000100)='/dev/snd/midiC#D#\x00', 0xffff, 0x80) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value={0x0}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000280)={r2}, 0x8) r3 = msgget$private(0x0, 0x88) msgctl$IPC_RMID(r3, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x40180) 19:18:01 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sequencer2\x00', 0x840, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x11, &(0x7f0000000740)={0x0, 0x5}, &(0x7f0000000780)=0x8) r2 = geteuid() r3 = getegid() write$P9_RGETATTR(r0, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x100, {0x41, 0x2, 0x6}, 0x1, r2, r3, 0x9, 0x1ff, 0xfffffffffffffffe, 0x6, 0xb6f, 0x3, 0x0, 0x1, 0x3, 0x7fffffff, 0x80000001, 0x8, 0x6, 0x21e, 0xfffffffffffffffd}}, 0xa0) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000007c0)=r1, 0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f0000000240)={'filter\x00', 0x7d, "8867d9c15308f3b5f655a466f8454708edfc9b5e4c8c1e6f67b4cf21b65cc815c4a17caf8e505f2ebfbce5616a51a5e37d697cc22032796397e65e050ba0a02fd572ad80f0a1739942aa6194df13291200467021d6361ab166c266c11dfbbe2403905163b9772570850770d4cae5c69c9694fb5a3db79f089a234f2f9c"}, &(0x7f0000000100)=0xa1) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:01 executing program 4 (fault-call:8 fault-nth:7): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 322.721154] FAULT_INJECTION: forcing a failure. [ 322.721154] name failslab, interval 1, probability 0, space 0, times 0 [ 322.732595] CPU: 1 PID: 10973 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 322.739905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 322.749311] Call Trace: [ 322.751964] dump_stack+0x14b/0x190 [ 322.755689] should_fail+0xa98/0xaa0 [ 322.759482] __should_failslab+0x278/0x2a0 [ 322.763790] should_failslab+0x29/0x70 [ 322.767757] __kmalloc+0xbe/0x350 [ 322.771294] ? proc_cpuset_show+0x64/0x8d0 [ 322.775611] ? proc_cpuset_show+0x95/0x8d0 [ 322.779903] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.785404] proc_cpuset_show+0x95/0x8d0 [ 322.789535] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 322.794942] ? get_pid_task+0x10f/0x1a0 [ 322.798959] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.804457] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 322.809984] proc_single_show+0x1b1/0x300 [ 322.814185] ? proc_single_open+0x90/0x90 19:18:01 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x9, 0x5, 0x6, 0x7, '\x00', 0x8}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) sched_setaffinity(r1, 0x8, &(0x7f0000000100)=0x401) recvfrom$inet6(r0, &(0x7f0000000140)=""/83, 0x53, 0x41, &(0x7f00000001c0)={0xa, 0x4e21, 0xffffffff00000000, @mcast2, 0x2ba}, 0x1c) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000240), 0x4) r3 = syz_genetlink_get_family_id$team(&(0x7f00000002c0)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000300)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000400)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000500)={'bridge0\x00', 0x0}) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000600)={@loopback, 0x0}, &(0x7f0000000640)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000780)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000008c0)={'vcan0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000ac0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000a80)={&(0x7f0000000900)={0x16c, r3, 0x8, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r5}, {0x10c, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r7}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x10}, 0x80) getgroups(0x1, &(0x7f0000000200)=[r2]) [ 322.818410] seq_read+0xb10/0x1e80 [ 322.821994] ? iov_iter_advance+0x496/0x1eb0 [ 322.826512] do_iter_read+0xb87/0xe20 [ 322.830389] ? seq_open+0x390/0x390 [ 322.834094] do_preadv+0x38e/0x570 [ 322.837789] ? syscall_return_slowpath+0xdb/0x700 [ 322.842726] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 322.848164] ? fput+0x257/0x2e0 [ 322.851550] __x64_sys_preadv+0x120/0x170 [ 322.855791] ? __ia32_sys_writev+0x120/0x120 [ 322.860242] do_syscall_64+0x15b/0x220 [ 322.864202] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 322.869428] RIP: 0033:0x457089 [ 322.872669] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 322.891658] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 322.899430] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 322.906820] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 322.914124] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 322.921437] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 322.928738] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000007 19:18:02 executing program 4 (fault-call:8 fault-nth:8): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 323.109523] FAULT_INJECTION: forcing a failure. [ 323.109523] name failslab, interval 1, probability 0, space 0, times 0 [ 323.121187] CPU: 0 PID: 10992 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 323.128502] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.137882] Call Trace: [ 323.140530] dump_stack+0x14b/0x190 [ 323.144223] should_fail+0xa98/0xaa0 [ 323.147998] __should_failslab+0x278/0x2a0 [ 323.152286] should_failslab+0x29/0x70 [ 323.156241] __kmalloc+0xbe/0x350 [ 323.159759] ? proc_cpuset_show+0x64/0x8d0 [ 323.164045] ? proc_cpuset_show+0x95/0x8d0 [ 323.168334] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.173842] proc_cpuset_show+0x95/0x8d0 [ 323.177976] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.183400] ? get_pid_task+0x10f/0x1a0 [ 323.187423] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.192918] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.198395] proc_single_show+0x1b1/0x300 [ 323.202586] ? proc_single_open+0x90/0x90 [ 323.206796] seq_read+0xb10/0x1e80 [ 323.210345] ? iov_iter_advance+0x496/0x1eb0 [ 323.214779] do_iter_read+0xb87/0xe20 [ 323.218605] ? seq_open+0x390/0x390 [ 323.222266] do_preadv+0x38e/0x570 [ 323.225899] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 323.231430] ? __schedule+0x680/0x760 [ 323.235263] __x64_sys_preadv+0x120/0x170 [ 323.239418] ? __ia32_sys_writev+0x120/0x120 [ 323.243839] do_syscall_64+0x15b/0x220 [ 323.247783] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.253004] RIP: 0033:0x457089 [ 323.256238] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.275188] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 323.282978] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 323.290295] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 323.297583] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:02 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x1) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) prctl$setmm(0x23, 0x1000000000, &(0x7f0000ffe000/0x2000)=nil) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:02 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@remote, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0xd8f]}) r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x100000001, 0x100) fcntl$getflags(r0, 0x40b) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) [ 323.304882] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 323.312179] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000008 19:18:02 executing program 4 (fault-call:8 fault-nth:9): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:02 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x100000000, &(0x7f000000a000)) r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x3, 0x92, [], 0x1, &(0x7f0000000100)=[{}], &(0x7f0000000180)=""/146}, &(0x7f00000002c0)=0x78) 19:18:02 executing program 0: syz_emit_ethernet(0x72, &(0x7f0000000140)={@local, @broadcast, [{[{0x9100, 0x100, 0x0, 0x4}], {0x8100, 0x0, 0x5, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x800000000000000, [0x2]}) 19:18:02 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) signalfd4(r0, &(0x7f0000000100)={0x8000}, 0x8, 0x80800) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 323.658992] FAULT_INJECTION: forcing a failure. [ 323.658992] name failslab, interval 1, probability 0, space 0, times 0 [ 323.670439] CPU: 1 PID: 11017 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 323.677755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 323.687143] Call Trace: [ 323.689821] dump_stack+0x14b/0x190 [ 323.693532] should_fail+0xa98/0xaa0 [ 323.697315] __should_failslab+0x278/0x2a0 [ 323.701634] should_failslab+0x29/0x70 [ 323.705590] __kmalloc+0xbe/0x350 19:18:02 executing program 0: syz_emit_ethernet(0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000000)={0x0, 0x0, [0x1, 0xc99, 0x0, 0x8b7]}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x8000000000ff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r0, &(0x7f0000000100)='cgroup.type\x00', 0x2, 0x0) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x10001, 0x8000) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000080)) [ 323.709124] ? proc_cpuset_show+0x64/0x8d0 [ 323.713458] ? proc_cpuset_show+0x95/0x8d0 [ 323.717758] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.723270] proc_cpuset_show+0x95/0x8d0 [ 323.727390] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 323.732799] ? get_pid_task+0x10f/0x1a0 [ 323.736822] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.742320] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 323.747852] proc_single_show+0x1b1/0x300 [ 323.752047] ? proc_single_open+0x90/0x90 [ 323.756273] seq_read+0xb10/0x1e80 [ 323.759859] ? iov_iter_advance+0x496/0x1eb0 [ 323.764368] do_iter_read+0xb87/0xe20 [ 323.768251] ? seq_open+0x390/0x390 [ 323.771944] do_preadv+0x38e/0x570 [ 323.775569] ? syscall_return_slowpath+0xdb/0x700 [ 323.780497] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 323.785957] ? fput+0x257/0x2e0 [ 323.789326] __x64_sys_preadv+0x120/0x170 [ 323.793524] ? __ia32_sys_writev+0x120/0x120 [ 323.797972] do_syscall_64+0x15b/0x220 [ 323.801920] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 323.807161] RIP: 0033:0x457089 [ 323.810425] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 323.829370] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 323.837132] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 323.844448] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 323.851752] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 323.859059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 323.866362] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000009 19:18:02 executing program 4 (fault-call:8 fault-nth:10): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) unlink(&(0x7f0000000100)='./file0\x00') ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000180)={{0x1aadaa6e, 0xffffffffffffd2d5}, {0x4b5, 0xa6}, 0x1000, 0x1, 0x401}) 19:18:02 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x280d) setsockopt$inet_tcp_int(r0, 0x6, 0x800000000001e, &(0x7f0000000040)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) close(r0) syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078acec76bbac141411050290780000000080000000000000000030872ff41414aaac141400082c000000000000000000007f2edc0100000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f0000000140)={'gre0\x00', 0x59}) writev(r0, &(0x7f0000001940)=[{&(0x7f0000000280)="244dc0d7c599fecd6a4b3faf9a1f0a5d25c1f71c7386d30b8cf4f19a89002de8ecce05", 0x23}, {&(0x7f00000002c0)="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", 0xff}, {&(0x7f00000003c0)="f4f468b255f08de39d4695d655652d5905dab39e1fe9681d1e86e726b914a88f21b5194c58cc3e020072683fb06d38fdc45d430ee4e1c8517cf9224b9ce037388f892b573af7a2e3e9394e5e4874f35f38d359a8ac391688fade998dfc83995812b5f39e99f31977b7ca6cfb306247c680a52675afcb6fb48e958372b68c21cdcc97d87a0527ad2ed4e057031535181b36fd9fc4cf47abcbfc451c6a063fc287c111685b5ce8cbe4bce45b542dca5446dd16b2c88fe335711fea56cb3d07e11d2ef8120b5d2376d02b748337420c8b19e4a8258c2110203d8593afa200be4f248ea081c13a6114", 0xe7}, {&(0x7f00000004c0)="dbb0482a1a5b340df9ec13a77aa99324f6b88694781bc173cc2a2927ddb9c85c25078737121c6e9de6cf598d78dcb8f1c472dabfb638f02db0a1970dbbfbb16f37ee9ddface9d5aeca9781f7581dcd2524c02916750637cb2ea982bd7f00d3afa2bb19680f660b441b7d1cf2c4f8d0cbd5075393475530bf1d8201ea45ad2cb7233b43e882510531a5dbc5c68796866e8b7c36b8c8d01dc2209a0dbea36bd837e2ca2bfcaaa4ae575fa6051eecb93d0202bceefd3dcec77f0f7b393f97ee67c367140002b975ed6a5f28ea3c703f540d5206d21fc9cfde2a5cc5ecb056b768307eabe9da4f33", 0xe6}, {&(0x7f00000005c0)="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", 0xfd}, {&(0x7f00000006c0)="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", 0x1000}, {&(0x7f00000016c0)="cf212190e4438b3960e3d1c97f29159b207c2aabd09eac3a500fe70c4f55263362166c72d986eb2505a99df93e0d5c34c6813dee5b0422568e23788d26771e41f229805f6a33317d18fcf5fe4023bfa35bf308d7b595ab1316a5db342182e2f150cf0d08e16b2c6c08f267b3dc5babc0fa59973251285ab8d879d7ef9cab1b25066e0df2fe735fc5ed7f23e66ecba5563f24da955dac0fc8fb58d923dd1111159ab626879f30da94f1f84b85e1f6c3b5164614a68ed7cadb2df98b002622a9e73559a995e130bf6f5763f0cad55f9738c8c9084ec4494761196f34b916bcf4", 0xdf}, {&(0x7f00000017c0)="daeaf059870728fbc4642c0e16a2485d323611a388dfe0123895814cb7eb1a78d2182443d05d003be6710e246d967c262939ab0181aab098e1bca3417cdc57eb61607c2c5f6ece86606344ec6000d255490c43177ec3fac0f3ca28157427eddbe2ce369fb2892ac9ac6b700b1b2b305a89eb93b5ada0a8c36432f6e191d223999cea3379a832190619ec022320c1f386398ec696979245f88036b1619517370dc090880924c6232fe917a1cfd9b56c2029e8c6315cc429c3937eb505c385a54eb5340e33b37bb87e7ed8eaf0cccdc030c8a4d6a7baa496bb164e92310076e536a7a605798cb4c4a2743d6bbff65916a3414c518a3804b1755e", 0xf9}, {&(0x7f00000018c0)="8a7fc07a7b3f40388c86f46001c4072bb53e26a2b923d50346990d4b19f104ef2132076d84e175384f2ebdbae0ed9f837f7207607373e3c919be28712914e2a44289f06bc842854752919eec9b1a0d1c845a1ca6", 0x54}], 0x9) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f00000001c0)=""/184) 19:18:03 executing program 7: mkdir(&(0x7f0000000180)='./file0\x00', 0x154) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:03 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='gfs2meta\x00', 0x0, &(0x7f00000002c0)) openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x4000, 0x80) [ 324.082951] FAULT_INJECTION: forcing a failure. [ 324.082951] name failslab, interval 1, probability 0, space 0, times 0 [ 324.094400] CPU: 1 PID: 11032 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 324.101756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.111197] Call Trace: [ 324.113859] dump_stack+0x14b/0x190 [ 324.117579] should_fail+0xa98/0xaa0 [ 324.121368] __should_failslab+0x278/0x2a0 [ 324.126217] should_failslab+0x29/0x70 [ 324.130185] __kmalloc+0xbe/0x350 [ 324.133757] ? proc_cpuset_show+0x64/0x8d0 [ 324.138095] ? proc_cpuset_show+0x95/0x8d0 [ 324.142404] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.148176] proc_cpuset_show+0x95/0x8d0 [ 324.152765] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 324.158563] ? get_pid_task+0x10f/0x1a0 [ 324.162940] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.169072] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.174913] proc_single_show+0x1b1/0x300 [ 324.179297] ? proc_single_open+0x90/0x90 [ 324.183543] seq_read+0xb10/0x1e80 [ 324.187288] ? iov_iter_advance+0x496/0x1eb0 [ 324.192097] do_iter_read+0xb87/0xe20 [ 324.196252] ? seq_open+0x390/0x390 [ 324.200328] do_preadv+0x38e/0x570 [ 324.204068] ? syscall_return_slowpath+0xdb/0x700 [ 324.209443] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 324.214887] ? fput+0x257/0x2e0 [ 324.218261] __x64_sys_preadv+0x120/0x170 [ 324.222469] ? __ia32_sys_writev+0x120/0x120 [ 324.226964] do_syscall_64+0x15b/0x220 [ 324.230927] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.236189] RIP: 0033:0x457089 [ 324.239435] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.258366] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 324.266097] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 324.273396] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 324.280683] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 324.287998] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 324.295302] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000a 19:18:03 executing program 4 (fault-call:8 fault-nth:11): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 324.368533] gfs2: path_lookup on ./file0/file0 returned error -2 19:18:03 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000eb7e00000100000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) [ 324.427132] gfs2: path_lookup on ./file0/file0 returned error -2 19:18:03 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x282000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r0, 0xc0405519, &(0x7f0000000180)={0x5, 0x6, 0x8, 0x101, 'syz1\x00'}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000006c0)={'team0\x00', 0x0}) open$dir(&(0x7f0000000200)='./file0\x00', 0xc00, 0x6a) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000700)={@remote, 0x61, r1}) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x400, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 324.511717] FAULT_INJECTION: forcing a failure. [ 324.511717] name failslab, interval 1, probability 0, space 0, times 0 [ 324.523601] CPU: 0 PID: 11053 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 324.530906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 324.540286] Call Trace: [ 324.542939] dump_stack+0x14b/0x190 [ 324.546619] should_fail+0xa98/0xaa0 [ 324.550398] __should_failslab+0x278/0x2a0 [ 324.554684] should_failslab+0x29/0x70 [ 324.558612] __kmalloc+0xbe/0x350 [ 324.562114] ? proc_cpuset_show+0x64/0x8d0 [ 324.566405] ? proc_cpuset_show+0x95/0x8d0 [ 324.570686] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.576212] proc_cpuset_show+0x95/0x8d0 [ 324.580330] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 324.585739] ? get_pid_task+0x10f/0x1a0 [ 324.589762] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.595258] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 324.600759] proc_single_show+0x1b1/0x300 [ 324.604975] ? proc_single_open+0x90/0x90 19:18:03 executing program 6: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x301880, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={0x0, 0x3ff9}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x8}, &(0x7f0000000240)=0x8) r2 = semget(0x2, 0x2, 0x160) stat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() r5 = getuid() getresgid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)=0x0) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000400)={{0x100000000, r3, r4, r5, r6, 0x101, 0x7f}, 0x2, 0x1ff, 0xc8}) [ 324.609185] seq_read+0xb10/0x1e80 [ 324.612779] ? iov_iter_advance+0x496/0x1eb0 [ 324.617261] do_iter_read+0xb87/0xe20 [ 324.621144] ? seq_open+0x390/0x390 [ 324.624845] do_preadv+0x38e/0x570 [ 324.628476] ? syscall_return_slowpath+0xdb/0x700 [ 324.633420] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 324.638859] ? fput+0x257/0x2e0 [ 324.642217] __x64_sys_preadv+0x120/0x170 [ 324.646415] ? __ia32_sys_writev+0x120/0x120 [ 324.650873] do_syscall_64+0x15b/0x220 [ 324.654812] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 324.660037] RIP: 0033:0x457089 [ 324.663274] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 324.682225] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 324.690002] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 324.697307] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 324.705396] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 324.712699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 324.720005] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000b 19:18:03 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaa5eaaaaffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) 19:18:03 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x1f1005172e216626, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000180)=""/104) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)="6e9b00a8ead3736dfb86d7d5680a51d71ab6169b3a7f9bb45758aa23558058884aecc0ee0fb44b6e3911a0a0000000", 0x0, &(0x7f000000a000)) umount2(&(0x7f00000000c0)='./file0\x00', 0xd) 19:18:04 executing program 3: socketpair$inet6(0xa, 0x1, 0x401, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') accept4$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e, 0x80800) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x10, &(0x7f000000a000)) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000000100)='reiserfs\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000000240)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000cbeff8)='./file0\x00', &(0x7f00005f7ffa)='ramfs\x00', 0x80000, &(0x7f0000000080)) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) mount(&(0x7f00000000c0)='.', &(0x7f0000187ff8)='.', &(0x7f0000000180)='rpc_pipefs\x00', 0x5010, &(0x7f0000000200)) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) r2 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$TIOCCONS(r2, 0x541d) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000280)=']cpuset@\x00') symlinkat(&(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000240)='./file0/../file0\x00') 19:18:04 executing program 4 (fault-call:8 fault-nth:12): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:04 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x2) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x20000, 0x0) r0 = getpid() r1 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, r0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000940000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x1, r1, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rfkill\x00', 0x840, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x0, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r2, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x40000000, 0x8, "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", 0x4e, 0xffffffffffffffe0, 0x1, 0x20, 0x2, 0x8, 0x6f8, 0x1}, r3}}, 0x120) 19:18:04 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000000200)=@ipx={0x4, 0xffffffffffff25e1, 0x5, "dc26b992bed9", 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000280)="a3dfc6925d5ab2fa6dd2be1d8f3ed18641d427ad8822c92beeddc0703ecedaf72ed4448c3e7963d916da1c6085b0334ac5e9fef13099440a1f30d6ff9f56d59de59b4ff0b8dae8e53cc653c158dfaa7533212dff446577e5e5e4e71db39887040f1a09eab36ceec6a629593cba1c08c5f9d82d7fd51adeb804dac2b834d091499099f2b75bcfd324d8783a15812568219660560333d89168923eb95dbb30010954e2a60205cc0fa6a3c981e66e2d78a95dc613391cbaa419a3d66821258b281b5181f17fe248386f2efb4f1854013f751a40f369e38c31119d581caa6c1637c2e60f7d7d8bb9bd8ee9e6", 0xea}, {&(0x7f0000000380)="c087824e9e17574501b2198359451e753180333f00990b9d4158af744fabe9007d828a0692d6f9ccab4a5cd51a2ec645561d04681dd4191f2dbed32bc00514ce31ce56e41cf4f77476551b32b3cc463c8a6d7665a78912c185af4f4acea5d524b5d46409516154ce6e91c5d9b20987838afdb6512fd8b7e81592f7a9e65cc91dc45a9e0191c4dfab5ff0d7aebcff3ffd7e066e92fdfe8aa3dd706e6938c4543ef875091dd0", 0xa5}], 0x2, &(0x7f0000000440)=[{0x68, 0x101, 0x9, "28afbaa3ac70f537c7b29a99ab3e3e31685037119c87f0a4508e19aa2af45952f6916885383c4dff5fe7a394423064aad27aacef6e8c99ef64bcc94aa28a901c1098a323af67ce3c07cd839ee1169ad1e13a88d6dcb3"}, {0x110, 0x114, 0x6, "2614eb609c4da0dbf5e9596f544070f24b500a80e69a97326e0ace6c7c9e8ac3c53d5c2c755822bad187b41f6f51d038028651ebd96c07b4a63392e98ae3cc19e1bae31097493e1dee933520ce75dbdc13c070c88166387b186d281035866d7c42be08e918f4b128208b32ac702716c25c83f82557853f0adebde586a7cd07eb9f51ccd5d5501d25c2caee88d860c5adb151337cfbefbb3d227b8e9a0ec3f494ce13efb91f74b2ce6448374fb5c172d3e3cb5cd0e8a3f0d56c1dad9681b75fd6c636786a41fc50f3de6af6b773e7e5106217f06996040d562bb763c1664d7701f5f462149ea7c95c6d133d35036023b0f93ea6f8f926e2405f"}, {0x40, 0x116, 0x7f8, "d8e180198d4766763cefed71d071b274d56a5b800f8d30d87665fc1a67a28c71667cdf6ade38cabb95f28b033b589c"}, {0xd0, 0x115, 0x0, "e670c56c606857f8c172341c79942fa3549c3059fb68dd4af03671ed7b3e44a65c1052c00ad31fa7912a8cbdd3fa3503ef074851dee2e5a0fc84f5a66172b57d34c6c4a1cc3f76b3fede097eeb9b75ffd642836dc0cc4ac77341f57dbbcf14ea322417f9bc8fbd756a8c6d49336f3379c8f9d764510dede343943dfb41d6394b6f8935fb3588d1b882cc15030a5f9f7cb975c7c73c49ec5b41cb8c27f6f77065ec7ef514eef439e17ec595ef2816a446ec0b13c4e70d92232d57f6753c"}], 0x288, 0x4040010}, 0x8000) r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000180)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 325.240685] FAULT_INJECTION: forcing a failure. [ 325.240685] name failslab, interval 1, probability 0, space 0, times 0 [ 325.252264] CPU: 1 PID: 11094 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 325.259560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.268909] Call Trace: [ 325.271516] dump_stack+0x14b/0x190 [ 325.275201] should_fail+0xa98/0xaa0 [ 325.279034] __should_failslab+0x278/0x2a0 [ 325.283327] should_failslab+0x29/0x70 [ 325.287286] __kmalloc+0xbe/0x350 [ 325.290817] ? proc_cpuset_show+0x64/0x8d0 [ 325.295137] ? proc_cpuset_show+0x95/0x8d0 [ 325.299428] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.304939] proc_cpuset_show+0x95/0x8d0 [ 325.309051] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.314460] ? get_pid_task+0x10f/0x1a0 [ 325.318480] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.324014] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.329513] proc_single_show+0x1b1/0x300 [ 325.333712] ? proc_single_open+0x90/0x90 [ 325.337930] seq_read+0xb10/0x1e80 [ 325.341516] ? iov_iter_advance+0x496/0x1eb0 [ 325.346119] do_iter_read+0xb87/0xe20 [ 325.350036] ? seq_open+0x390/0x390 [ 325.353752] do_preadv+0x38e/0x570 [ 325.357373] ? syscall_return_slowpath+0xdb/0x700 [ 325.362301] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 325.367762] ? fput+0x257/0x2e0 [ 325.371125] __x64_sys_preadv+0x120/0x170 [ 325.375363] ? __ia32_sys_writev+0x120/0x120 [ 325.379819] do_syscall_64+0x15b/0x220 [ 325.383769] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.388998] RIP: 0033:0x457089 [ 325.392250] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.411199] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 325.418982] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 325.426286] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 325.433584] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:04 executing program 6: r0 = open(&(0x7f0000000700)='./file0\x00', 0x20000, 0x4) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000740)={0x0, 0x2, 0x3, 0x4}) mkdir(&(0x7f0000000100)='./file0\x00', 0x12d) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) write$binfmt_aout(r1, &(0x7f0000000180)={{0x107, 0x6, 0x4, 0x36e, 0x16b, 0x4, 0x38b, 0x4}, "76024f354fe93f1da24751dfb2413a7af3386fbccee9db9fc78131c27cbe3d5a3a219b0c0a522159cbffe056c8df9a51cac1c7d5588c18a5d0d790b4417a2d510f57d28b760bc8c5b27c2615c6", [[], [], [], [], []]}, 0x56d) 19:18:04 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0xe0a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socket$packet(0x11, 0x2, 0x300) [ 325.440887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 325.448195] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000c 19:18:04 executing program 4 (fault-call:8 fault-nth:13): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 325.575941] FAULT_INJECTION: forcing a failure. [ 325.575941] name failslab, interval 1, probability 0, space 0, times 0 [ 325.587479] CPU: 1 PID: 11115 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 325.594783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 325.604192] Call Trace: [ 325.606843] dump_stack+0x14b/0x190 [ 325.610547] should_fail+0xa98/0xaa0 [ 325.614340] __should_failslab+0x278/0x2a0 [ 325.618645] should_failslab+0x29/0x70 [ 325.622581] __kmalloc+0xbe/0x350 [ 325.626114] ? proc_cpuset_show+0x64/0x8d0 [ 325.630455] ? proc_cpuset_show+0x95/0x8d0 [ 325.634766] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.640352] proc_cpuset_show+0x95/0x8d0 [ 325.644469] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 325.649877] ? get_pid_task+0x10f/0x1a0 [ 325.653904] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.659407] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 325.664902] proc_single_show+0x1b1/0x300 [ 325.669100] ? proc_single_open+0x90/0x90 [ 325.673323] seq_read+0xb10/0x1e80 [ 325.676906] ? iov_iter_advance+0x496/0x1eb0 [ 325.681381] do_iter_read+0xb87/0xe20 [ 325.685260] ? seq_open+0x390/0x390 [ 325.688953] do_preadv+0x38e/0x570 [ 325.692581] ? syscall_return_slowpath+0xdb/0x700 [ 325.697511] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 325.702950] ? fput+0x257/0x2e0 [ 325.706314] __x64_sys_preadv+0x120/0x170 [ 325.710513] ? __ia32_sys_writev+0x120/0x120 [ 325.714964] do_syscall_64+0x15b/0x220 [ 325.718934] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 325.724185] RIP: 0033:0x457089 [ 325.727424] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 325.746366] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 325.754138] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 325.761468] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 325.768773] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:04 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) [ 325.776077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 325.783381] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000d 19:18:04 executing program 4 (fault-call:8 fault-nth:14): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:04 executing program 0: syz_emit_ethernet(0xfffffffffffffed8, &(0x7f00000000c0)={@random="c8aa4d423c1c", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000040)={0x0, 0x0, [0x56e]}) 19:18:05 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x40, 0x1) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:05 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=""/5, 0x5) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f00000001c0)='nsfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 326.116119] FAULT_INJECTION: forcing a failure. [ 326.116119] name failslab, interval 1, probability 0, space 0, times 0 [ 326.128177] CPU: 0 PID: 11134 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 326.135495] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.145313] Call Trace: [ 326.147971] dump_stack+0x14b/0x190 [ 326.151650] should_fail+0xa98/0xaa0 [ 326.155424] __should_failslab+0x278/0x2a0 [ 326.159711] should_failslab+0x29/0x70 [ 326.163648] __kmalloc+0xbe/0x350 [ 326.167178] ? proc_cpuset_show+0x64/0x8d0 [ 326.171468] ? proc_cpuset_show+0x95/0x8d0 [ 326.175755] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.181262] proc_cpuset_show+0x95/0x8d0 [ 326.185378] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.190768] ? get_pid_task+0x10f/0x1a0 [ 326.194810] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.200292] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.205776] proc_single_show+0x1b1/0x300 [ 326.209960] ? proc_single_open+0x90/0x90 [ 326.214132] seq_read+0xb10/0x1e80 [ 326.217727] ? iov_iter_advance+0x496/0x1eb0 [ 326.222221] do_iter_read+0xb87/0xe20 [ 326.226071] ? seq_open+0x390/0x390 [ 326.229758] do_preadv+0x38e/0x570 [ 326.233388] ? syscall_return_slowpath+0xdb/0x700 [ 326.238310] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 326.243750] ? fput+0x257/0x2e0 [ 326.247056] __x64_sys_preadv+0x120/0x170 [ 326.251259] ? __ia32_sys_writev+0x120/0x120 [ 326.255707] do_syscall_64+0x15b/0x220 [ 326.259627] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.264836] RIP: 0033:0x457089 [ 326.268086] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.287020] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 326.294872] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 326.302195] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 326.309497] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:05 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c29ca688791f64809b840da0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100"], &(0x7f0000000000)) r0 = creat(&(0x7f0000000040)='./file0/file0\x00', 0x80) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)="c92d6375c63605a07184381515b242ee7fba17b07b39462b593271f209ce688fe091269305090b68b50777154b30abf1fef394df7b22c8388dd8b47d7eb9ddafbb8601c07c45bf1603cec7e96b68edfba7f3825a52bbc8dc9740b19cabd7678a1b0a419d9d8d67121e0bb915ff57bc1e173eb27110ddaf7704f9542ffdec0a3814fffacce35cc06187758e462bfdc2ca7c453679e1ed953e8838b5a8c0eb17520104275653430aaaa7f1c75f1ad9767af859d36ccefbf7074e211e29196fea0ad10431a8b239c45a6d7f815cabe391f61f4d4194d8a12ec80c1d51c6a4be8a98506afec77d1b1d9d7a6cac74a0afe9419a9bda3a05cbb26439") r1 = geteuid() setfsuid(r1) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)) [ 326.317143] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 326.324462] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000e 19:18:05 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x2, &(0x7f0000000480)='./file0\x00', r0, &(0x7f0000000300)="04b7da0b6a4cc056462bef66a313b53c043c4da264a8ce2e1b200402") mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x6aa, 0x40000) futimesat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r1, 0xc0505510, &(0x7f0000000400)={0xfff, 0x3, 0x8, 0x8, &(0x7f0000000340)=[{}, {}, {}]}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x20000000000000, &(0x7f000000a000)) 19:18:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) r2 = request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000300)='nfs\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, r2) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000001c0)={'gre0\x00', 0xffffffff}) 19:18:05 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='nfs\x00', 0x2000, &(0x7f0000000240)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:05 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)=ANY=[@ANYBLOB="0000000000000000000000008100300008004500005c0000000000019078ac1414bbac14141105029078000000007200000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e0000001000000000000000004f90000"], &(0x7f0000000000)={0x0, 0x0, [0x0, 0xc49, 0xfffffffffffffffe]}) 19:18:05 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) chmod(&(0x7f0000000100)='./file0\x00', 0x9) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:05 executing program 4 (fault-call:8 fault-nth:15): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:05 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000000001a789e16a8025740d40e8adb9e0f66dc94c86b9fafb7cef4327d0b754f0ae1cb29d4a4900640e3d60db391c806e0f1b8efc1417ce0205933ace19199e742d2bdafdd390a5ff125d60c9327c98f3d58bd3ae7976fea83db096569f20753bc56000000000000000000"], &(0x7f0000000000)) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x4498, 0x80) r1 = socket$inet(0x2b, 0x400000000000801, 0x0) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0x10) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @broadcast}, 0x10) setsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000440)={@remote}, 0xc) r2 = getpgrp(0x0) capget(&(0x7f00000000c0)={0x399f1336, r2}, &(0x7f0000000100)={0xff, 0x3, 0xffffffffffffff65, 0x3c, 0x3, 0x9}) mlock2(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) socket$inet6(0xa, 0x800, 0x401) r4 = getgid() write$FUSE_ENTRY(r0, &(0x7f00000001c0)={0x90, 0x0, 0x5, {0x0, 0x3, 0x1, 0x1, 0x3ff, 0x7fff, {0x3, 0x6, 0x8, 0x5, 0x0, 0x80000001, 0x4c8, 0x80000000, 0x3, 0x1, 0x100000001, r3, r4, 0x401, 0x26d}}}, 0x90) accept4(r0, &(0x7f0000000280)=@pptp={0x18, 0x2, {0x0, @multicast2}}, &(0x7f0000000300)=0x80, 0x800) [ 326.790394] FAULT_INJECTION: forcing a failure. [ 326.790394] name failslab, interval 1, probability 0, space 0, times 0 [ 326.801936] CPU: 1 PID: 11178 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 326.809245] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 326.818621] Call Trace: [ 326.821274] dump_stack+0x14b/0x190 [ 326.824989] should_fail+0xa98/0xaa0 [ 326.828772] __should_failslab+0x278/0x2a0 [ 326.833065] should_failslab+0x29/0x70 [ 326.836994] __kmalloc+0xbe/0x350 19:18:05 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x100, 0x0) prctl$getreaper(0x19, &(0x7f0000000140)) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @broadcast}, 0x10) [ 326.840493] ? proc_cpuset_show+0x64/0x8d0 [ 326.844763] ? proc_cpuset_show+0x95/0x8d0 [ 326.849057] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.854554] proc_cpuset_show+0x95/0x8d0 [ 326.858672] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 326.864089] ? get_pid_task+0x10f/0x1a0 [ 326.868107] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.873599] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 326.879122] proc_single_show+0x1b1/0x300 [ 326.883342] ? proc_single_open+0x90/0x90 [ 326.887563] seq_read+0xb10/0x1e80 [ 326.891176] ? iov_iter_advance+0x496/0x1eb0 [ 326.895717] do_iter_read+0xb87/0xe20 [ 326.899591] ? seq_open+0x390/0x390 [ 326.903286] do_preadv+0x38e/0x570 [ 326.906970] ? syscall_return_slowpath+0xdb/0x700 [ 326.911905] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 326.917348] ? fput+0x257/0x2e0 [ 326.920717] __x64_sys_preadv+0x120/0x170 [ 326.924924] ? __ia32_sys_writev+0x120/0x120 [ 326.929377] do_syscall_64+0x15b/0x220 [ 326.933321] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 326.938548] RIP: 0033:0x457089 [ 326.941797] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 326.960735] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 326.968490] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 326.975784] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 326.983092] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 326.990399] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 326.997711] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000000f 19:18:06 executing program 4 (fault-call:8 fault-nth:16): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:06 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000200)=ANY=[@ANYBLOB="0180c2000003ffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000000000baa8b5c1a0e43895e8fade91960ba4bc86eab025135e2bbe8925648171b01dd5cdac7b9152e606071ee31d6bd7e647b9808919775c04f5c2269fa87406776ff48972431124f437755823c46e50bfe1f2c215dba25a65d95914adf175a72086eadb722530bd05147e2a7d0dfa32f2c5703eb84d81a604cf2298353b2a9b23f971c28b53b5c8b7db37a9caad811c785059fc2ab937243dc20e68ce3be46cf7cd9663bc32ad5341227d653c1adf4d9b9b6dd7f2bf3ba68aba9928a21"], &(0x7f0000000000)={0x1, 0x4}) 19:18:06 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3ff, 0x40a00) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f0000000180)={0x0, 0x8000}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:06 executing program 2: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x200000, 0x0) fchmodat(r0, &(0x7f00000001c0)='./file0\x00', 0x80) mkdir(&(0x7f0000000180)='./file0/file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 327.290205] FAULT_INJECTION: forcing a failure. [ 327.290205] name failslab, interval 1, probability 0, space 0, times 0 [ 327.301805] CPU: 1 PID: 11200 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 327.309115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 327.318507] Call Trace: [ 327.321186] dump_stack+0x14b/0x190 [ 327.325023] should_fail+0xa98/0xaa0 [ 327.328837] __should_failslab+0x278/0x2a0 [ 327.333143] should_failslab+0x29/0x70 [ 327.337128] __kmalloc+0xbe/0x350 [ 327.340682] ? proc_cpuset_show+0x64/0x8d0 [ 327.345007] ? proc_cpuset_show+0x95/0x8d0 [ 327.349305] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 327.354839] proc_cpuset_show+0x95/0x8d0 [ 327.358998] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 327.359034] ? get_pid_task+0x10f/0x1a0 [ 327.359071] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 327.359169] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 327.379417] proc_single_show+0x1b1/0x300 [ 327.379458] ? proc_single_open+0x90/0x90 19:18:06 executing program 0: syz_emit_ethernet(0x6e, &(0x7f0000000040)={@local, @dev={[], 0x15}, [{[], {0x8100, 0x1000, 0x4, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0xc99]}) [ 327.379524] seq_read+0xb10/0x1e80 [ 327.379562] ? iov_iter_advance+0x496/0x1eb0 [ 327.379658] do_iter_read+0xb87/0xe20 [ 327.379751] ? seq_open+0x390/0x390 [ 327.379799] do_preadv+0x38e/0x570 [ 327.379883] ? syscall_return_slowpath+0xdb/0x700 [ 327.379952] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 327.380009] ? fput+0x257/0x2e0 [ 327.380047] __x64_sys_preadv+0x120/0x170 [ 327.380082] ? __ia32_sys_writev+0x120/0x120 [ 327.380111] do_syscall_64+0x15b/0x220 [ 327.380172] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 327.380199] RIP: 0033:0x457089 [ 327.380236] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 327.380254] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 327.380292] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 327.380313] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 327.380333] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 327.380352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 327.380385] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000010 19:18:06 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:06 executing program 6: r0 = accept4$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000240)=0x6e, 0x80000) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000340)) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r1, 0x4008af60, &(0x7f0000000180)={@my=0x0}) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$SCSI_IOCTL_PROBE_HOST(r1, 0x5385, &(0x7f0000000280)={0x78, ""/120}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:06 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000180), &(0x7f0000000100)=0x6e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000004c0)='tls\x00', 0x4) connect$unix(r0, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0xb35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x80000001fffffffc, 0x800007f, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000400)='nfs\x00', 0x0, &(0x7f00000003c0)) r2 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0xff, 0x2000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r2) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000002c0), &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000003c0)={0x0, 0xffffffff, 0x10}, &(0x7f0000000440)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000480)={r3, 0x2, 0x30}, 0xc) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:06 executing program 0: r0 = open(&(0x7f0000000380)='./file0\x00', 0x10001, 0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000003c0)={0x7, 0x20a, 0xffffffffffffff94, 0x1, 0x0}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000500)={r1, 0xbc, &(0x7f0000000440)=[@in={0x2, 0x4e23, @remote}, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0xc}, 0x40}, @in={0x2, 0x4e20}, @in6={0xa, 0x4e22, 0x7f, @mcast2}, @in6={0xa, 0x4e23, 0x3ff, @local, 0x10000}, @in6={0xa, 0x4e20, 0xfffffffffffffff9, @mcast2, 0x7fff}, @in6={0xa, 0x4e24, 0x1000, @loopback, 0xd27}, @in={0x2, 0x4e23, @broadcast}]}, &(0x7f0000000540)=0x10) syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00ec0000000000ffffffff00000000e000000100000000ac14140000000000"], &(0x7f0000000000)) r2 = syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0xff, 0x2) write$sndseq(r2, &(0x7f0000000300)=[{0x0, 0x3ff, 0x0, 0x9, @tick=0x3, {0x5, 0x7fff}, {0x5, 0xfff}, @note={0x401, 0xf5c, 0x15d, 0x2000000000, 0x312f}}, {0x3, 0x40, 0xd17, 0x7fff, @time, {0x6, 0x8}, {0x8ca, 0x7}, @control={0x9, 0xffffffffffff0000, 0x1f}}], 0x60) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x1, 0x400000) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x5, 0xf7, 0x5, 0x40, 0x2, 0x4, 0x8, {0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x401, 0x9d81, 0x5, 0x2, 0x5}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x5, &(0x7f0000000200)={r4, @in={{0x2, 0x4e23, @local}}}, 0x84) 19:18:06 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:06 executing program 4 (fault-call:8 fault-nth:17): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:06 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x80) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000180)) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 327.999214] FAULT_INJECTION: forcing a failure. [ 327.999214] name failslab, interval 1, probability 0, space 0, times 0 [ 328.010969] CPU: 0 PID: 11244 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 328.018271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.027644] Call Trace: [ 328.030310] dump_stack+0x14b/0x190 [ 328.033995] should_fail+0xa98/0xaa0 [ 328.037774] __should_failslab+0x278/0x2a0 [ 328.042040] should_failslab+0x29/0x70 [ 328.045964] __kmalloc+0xbe/0x350 [ 328.049473] ? proc_cpuset_show+0x64/0x8d0 [ 328.053753] ? proc_cpuset_show+0x95/0x8d0 [ 328.058059] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.063565] proc_cpuset_show+0x95/0x8d0 [ 328.067676] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.073069] ? get_pid_task+0x10f/0x1a0 [ 328.077082] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.082564] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.088056] proc_single_show+0x1b1/0x300 [ 328.092261] ? proc_single_open+0x90/0x90 [ 328.096432] seq_read+0xb10/0x1e80 [ 328.100017] ? iov_iter_advance+0x496/0x1eb0 [ 328.104493] do_iter_read+0xb87/0xe20 [ 328.108338] ? seq_open+0x390/0x390 [ 328.112000] do_preadv+0x38e/0x570 [ 328.115581] ? kmsan_set_origin_inline+0x6b/0x120 [ 328.120434] __x64_sys_preadv+0x120/0x170 [ 328.124807] ? __ia32_sys_writev+0x120/0x120 [ 328.129223] do_syscall_64+0x15b/0x220 [ 328.133135] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.138335] RIP: 0033:0x457089 [ 328.141551] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.160477] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 328.168202] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 328.175486] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 328.182787] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 328.190071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 19:18:07 executing program 0: r0 = memfd_create(&(0x7f0000000040)='%}procselinux&\x00', 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f00000001c0)={0x1, 0x10, 0xfa00, {&(0x7f0000000080), r1}}, 0x18) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:18:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x685b, 0x200) openat(r0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x28) [ 328.197339] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000011 19:18:07 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) acct(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) link(&(0x7f0000000100)='./file1\x00', &(0x7f0000000180)='./file0\x00') 19:18:07 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x200, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x1113fe, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000280)={0x2, r1}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x20000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f00000001c0)=0xcc4, 0x8) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x24000, 0x40) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x20000) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x8400, 0x0) accept4$unix(r0, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e, 0x80000) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000000140)=r4) 19:18:07 executing program 4 (fault-call:8 fault-nth:18): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:07 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x6, 0x80001) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x1}, 0x10) [ 328.603731] FAULT_INJECTION: forcing a failure. [ 328.603731] name failslab, interval 1, probability 0, space 0, times 0 [ 328.615361] CPU: 1 PID: 11279 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 328.622690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.632068] Call Trace: [ 328.634728] dump_stack+0x14b/0x190 [ 328.638414] should_fail+0xa98/0xaa0 [ 328.642212] __should_failslab+0x278/0x2a0 [ 328.646530] should_failslab+0x29/0x70 19:18:07 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0xa0) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/171, 0xab}, {&(0x7f0000000300)=""/206, 0xce}], 0x3, &(0x7f0000000440)=""/127, 0x7f, 0x7}, 0x20) mount(&(0x7f0000000140)='./file0\x00', &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)="7366730014d192e165b7767f7e93738bb0777e2c7425990e46f9429cf37d0f3592da8a8e92c4321d8d3e5798c8b70764aa8bf2ffbbc64d394e4eb65b6e98dbfe3bc5baef40a99238be10cf416b14bb91b6704c4c6291f9fedae906f34ab11f15ae748bdb8377fa01ce667aef8e308efc06bee18a04d55083885b96c19fd9cfa3e9ed7676d9ac9a515cc8163824ef9ce2e1200ace906492b04c20be2a5ba9111387627e489db44ec27b3358013c1ca3d5", 0x10, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 328.650493] __kmalloc+0xbe/0x350 [ 328.650564] ? proc_cpuset_show+0x64/0x8d0 [ 328.650625] ? proc_cpuset_show+0x95/0x8d0 [ 328.650660] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 19:18:07 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x900, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x400000000}, 0x0, 0xf, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = socket$alg(0x26, 0x5, 0x0) lseek(r0, 0x0, 0x3) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:07 executing program 4 (fault-call:8 fault-nth:19): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 328.650704] proc_cpuset_show+0x95/0x8d0 [ 328.650751] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.650786] ? get_pid_task+0x10f/0x1a0 [ 328.650821] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.650856] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 19:18:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=@known='security.ima\x00', &(0x7f00000001c0)='nfs\x00', 0x4, 0x1) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) socket$pppoe(0x18, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, &(0x7f0000000280)=""/22) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000480)) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x12200, 0x0) ioctl$VT_DISALLOCATE(r0, 0x5608) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000003c0)={'nat\x00', 0x0, 0x3, 0xab, [], 0x3, &(0x7f00000002c0)=[{}, {}, {}], &(0x7f0000000300)=""/171}, &(0x7f0000000440)=0x78) [ 328.650917] proc_single_show+0x1b1/0x300 [ 328.650966] ? proc_single_open+0x90/0x90 [ 328.651045] seq_read+0xb10/0x1e80 [ 328.651087] ? iov_iter_advance+0x496/0x1eb0 [ 328.651139] do_iter_read+0xb87/0xe20 [ 328.651233] ? seq_open+0x390/0x390 [ 328.651292] do_preadv+0x38e/0x570 19:18:08 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x84000) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) sendmsg$alg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000180)}, {&(0x7f00000001c0)}, {&(0x7f0000000200)="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", 0xfe}], 0x3, &(0x7f0000000340)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x8}, @assoc={0x18, 0x117, 0x4, 0x100000000}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x38, 0x117, 0x2, 0x1d, "7443094e1c71a7a44929281c651f30d925584c86a4a2660501da9a09a2"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0xf8, 0x81}, 0x1) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:08 executing program 4 (fault-call:8 fault-nth:20): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 328.651374] ? syscall_return_slowpath+0xdb/0x700 [ 328.651450] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 328.651509] ? fput+0x257/0x2e0 [ 328.651601] __x64_sys_preadv+0x120/0x170 [ 328.651650] ? __ia32_sys_writev+0x120/0x120 [ 328.651710] do_syscall_64+0x15b/0x220 [ 328.651768] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.651807] RIP: 0033:0x457089 [ 328.651842] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.651859] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 328.651896] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 328.651917] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 328.651936] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 328.651954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 328.651974] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000012 [ 328.906219] FAULT_INJECTION: forcing a failure. [ 328.906219] name failslab, interval 1, probability 0, space 0, times 0 [ 328.906260] CPU: 1 PID: 11297 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 19:18:08 executing program 4 (fault-call:8 fault-nth:21): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 328.906276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 328.906289] Call Trace: [ 328.906348] dump_stack+0x14b/0x190 [ 328.906428] should_fail+0xa98/0xaa0 [ 328.906479] __should_failslab+0x278/0x2a0 [ 328.906542] should_failslab+0x29/0x70 [ 328.906621] __kmalloc+0xbe/0x350 [ 328.906715] ? proc_cpuset_show+0x64/0x8d0 [ 328.906775] ? proc_cpuset_show+0x95/0x8d0 [ 328.906814] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.906863] proc_cpuset_show+0x95/0x8d0 [ 328.906904] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 328.906940] ? get_pid_task+0x10f/0x1a0 [ 328.906984] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.907021] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 328.907083] proc_single_show+0x1b1/0x300 [ 328.907121] ? proc_single_open+0x90/0x90 [ 328.907196] seq_read+0xb10/0x1e80 19:18:08 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) uselib(&(0x7f0000000140)='./file0\x00') mount(&(0x7f00000001c0)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f0000000100)="9c4c6c5cbdffc307c9cb6e7cf282ba6a9cf09cac5c72b107138c4f5377b3a3505637aa15f554b51382e4980fe4f7686791255f1a1a2a13d43b24d07dc04500a5") mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)="6e66730075fc62d8ff7f000000000000ac38a278d402834213aec151443f01a64cadb830891b620439703cbaad1c3375fc68c856b2e3cc500de7f1cf6a9764b4129db5d5968a1069f4654109249a483f330858f4ea4c513b11bf794ede09ead393984b147b09ce5856d84537e9deb3ee738acdab624a344e3f376a6fca48765c791a66b38a1e67661f3e3543f054fc8e932541682100202bf5389083ea2944866ede211ab58edb7079b5dd94ef117e8fdb972e47cd099ac0b6b54f4515896b21d1dc042ad7d3ed550054b18d1827585d56c274d18f9463", 0x0, &(0x7f000000a000)) [ 328.907230] ? iov_iter_advance+0x496/0x1eb0 [ 328.907314] do_iter_read+0xb87/0xe20 [ 328.907373] ? seq_open+0x390/0x390 [ 328.907419] do_preadv+0x38e/0x570 [ 328.907500] ? msan_get_shadow_origin_ptr+0x1de/0x2e0 [ 328.907564] ? fput+0x257/0x2e0 [ 328.907633] __x64_sys_preadv+0x120/0x170 [ 328.907676] ? __ia32_sys_writev+0x120/0x120 [ 328.907719] do_syscall_64+0x15b/0x220 [ 328.907770] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 328.907796] RIP: 0033:0x457089 [ 328.907831] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 328.907847] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 19:18:08 executing program 4 (fault-call:8 fault-nth:22): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 328.907884] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 328.907905] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 328.907924] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 328.907956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 328.907986] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000013 [ 329.193284] FAULT_INJECTION: forcing a failure. [ 329.193284] name failslab, interval 1, probability 0, space 0, times 0 [ 329.193394] CPU: 0 PID: 11312 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 329.193412] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 19:18:08 executing program 4 (fault-call:8 fault-nth:23): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 329.193426] Call Trace: [ 329.193484] dump_stack+0x14b/0x190 [ 329.193529] should_fail+0xa98/0xaa0 [ 329.193583] __should_failslab+0x278/0x2a0 [ 329.193625] should_failslab+0x29/0x70 19:18:08 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x5, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)='./file0\x00', &(0x7f0000000240)='efs\x00', 0x0, &(0x7f000000a000)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000280)={'ah\x00'}, &(0x7f00000002c0)=0x1e) r2 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x1, 0xa2000) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={0x0, 0x3ff, 0x7fffffff, 0x1f}, &(0x7f00000001c0)=0x10) ioctl$RTC_EPOCH_SET(r2, 0x4008700e, 0x4) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000200)={0x5b4415f9, 0x8000, 0x1f, 0x0, r3}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 329.193658] __kmalloc+0xbe/0x350 [ 329.193700] ? proc_cpuset_show+0x64/0x8d0 [ 329.193735] ? proc_cpuset_show+0x95/0x8d0 [ 329.193774] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.193812] proc_cpuset_show+0x95/0x8d0 [ 329.193854] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 329.193889] ? get_pid_task+0x10f/0x1a0 [ 329.193925] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.193962] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.194010] proc_single_show+0x1b1/0x300 [ 329.194058] ? proc_single_open+0x90/0x90 [ 329.194104] seq_read+0xb10/0x1e80 [ 329.194135] ? iov_iter_advance+0x496/0x1eb0 [ 329.194223] do_iter_read+0xb87/0xe20 [ 329.194259] ? seq_open+0x390/0x390 [ 329.194309] do_preadv+0x38e/0x570 [ 329.194395] ? kmsan_set_origin_inline+0x6b/0x120 [ 329.194467] __x64_sys_preadv+0x120/0x170 [ 329.194508] ? __ia32_sys_writev+0x120/0x120 [ 329.194543] do_syscall_64+0x15b/0x220 [ 329.194588] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.194614] RIP: 0033:0x457089 [ 329.194651] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.194669] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 329.194720] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 329.194742] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 329.194762] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 329.194780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 329.194813] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000014 [ 329.436462] FAULT_INJECTION: forcing a failure. [ 329.436462] name failslab, interval 1, probability 0, space 0, times 0 [ 329.436573] CPU: 0 PID: 11319 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 329.436591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.436604] Call Trace: [ 329.436673] dump_stack+0x14b/0x190 [ 329.436715] should_fail+0xa98/0xaa0 [ 329.436783] __should_failslab+0x278/0x2a0 [ 329.436826] should_failslab+0x29/0x70 [ 329.436858] __kmalloc+0xbe/0x350 [ 329.436896] ? proc_cpuset_show+0x64/0x8d0 [ 329.436927] ? proc_cpuset_show+0x95/0x8d0 [ 329.436963] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.436998] proc_cpuset_show+0x95/0x8d0 [ 329.437037] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 329.437082] ? get_pid_task+0x10f/0x1a0 [ 329.437118] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.437152] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.437219] proc_single_show+0x1b1/0x300 [ 329.437254] ? proc_single_open+0x90/0x90 [ 329.437284] seq_read+0xb10/0x1e80 [ 329.437314] ? iov_iter_advance+0x496/0x1eb0 [ 329.437367] do_iter_read+0xb87/0xe20 [ 329.437399] ? seq_open+0x390/0x390 [ 329.437450] do_preadv+0x38e/0x570 [ 329.437526] ? syscall_return_slowpath+0xdb/0x700 [ 329.437598] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 329.437661] ? fput+0x257/0x2e0 [ 329.437704] __x64_sys_preadv+0x120/0x170 [ 329.437745] ? __ia32_sys_writev+0x120/0x120 [ 329.437777] do_syscall_64+0x15b/0x220 [ 329.437826] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.437852] RIP: 0033:0x457089 [ 329.437888] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.437906] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 329.437944] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 329.437965] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 329.437984] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 329.438002] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 329.438021] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000015 [ 329.570963] FAULT_INJECTION: forcing a failure. [ 329.570963] name failslab, interval 1, probability 0, space 0, times 0 [ 329.570998] CPU: 1 PID: 11326 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 329.571016] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.571029] Call Trace: [ 329.571086] dump_stack+0x14b/0x190 [ 329.571131] should_fail+0xa98/0xaa0 [ 329.571205] __should_failslab+0x278/0x2a0 [ 329.571270] should_failslab+0x29/0x70 [ 329.571302] __kmalloc+0xbe/0x350 [ 329.571371] ? proc_cpuset_show+0x64/0x8d0 [ 329.571434] ? proc_cpuset_show+0x95/0x8d0 [ 329.571474] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.571517] proc_cpuset_show+0x95/0x8d0 [ 329.571559] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 329.571594] ? get_pid_task+0x10f/0x1a0 [ 329.571630] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.571667] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.571739] proc_single_show+0x1b1/0x300 [ 329.571779] ? proc_single_open+0x90/0x90 [ 329.571814] seq_read+0xb10/0x1e80 [ 329.571847] ? iov_iter_advance+0x496/0x1eb0 [ 329.571905] do_iter_read+0xb87/0xe20 [ 329.571969] ? seq_open+0x390/0x390 [ 329.572018] do_preadv+0x38e/0x570 [ 329.572093] ? syscall_return_slowpath+0xdb/0x700 [ 329.572176] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 329.572240] ? fput+0x257/0x2e0 [ 329.572311] __x64_sys_preadv+0x120/0x170 [ 329.572351] ? __ia32_sys_writev+0x120/0x120 [ 329.572382] do_syscall_64+0x15b/0x220 [ 329.572426] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 329.572451] RIP: 0033:0x457089 [ 329.572485] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 329.572503] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 329.572539] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 329.572560] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 329.572579] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 329.572599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 329.572620] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000016 [ 329.772880] FAULT_INJECTION: forcing a failure. [ 329.772880] name failslab, interval 1, probability 0, space 0, times 0 [ 329.773001] CPU: 1 PID: 11334 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 329.773018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 329.773031] Call Trace: [ 329.773088] dump_stack+0x14b/0x190 [ 329.773144] should_fail+0xa98/0xaa0 [ 329.773225] __should_failslab+0x278/0x2a0 [ 329.773293] should_failslab+0x29/0x70 [ 329.773349] __kmalloc+0xbe/0x350 [ 329.773420] ? proc_cpuset_show+0x64/0x8d0 [ 329.773483] ? proc_cpuset_show+0x95/0x8d0 [ 329.773521] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.773567] proc_cpuset_show+0x95/0x8d0 [ 329.773610] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 329.773643] ? get_pid_task+0x10f/0x1a0 [ 329.773675] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.773722] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 329.773785] proc_single_show+0x1b1/0x300 [ 329.773821] ? proc_single_open+0x90/0x90 [ 329.773880] seq_read+0xb10/0x1e80 [ 329.773911] ? iov_iter_advance+0x496/0x1eb0 [ 329.773992] do_iter_read+0xb87/0xe20 [ 329.774053] ? seq_open+0x390/0x390 [ 329.774115] do_preadv+0x38e/0x570 [ 329.774200] ? syscall_return_slowpath+0xdb/0x700 [ 329.774269] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 329.774330] ? fput+0x257/0x2e0 [ 329.774404] __x64_sys_preadv+0x120/0x170 [ 330.468189] ? __ia32_sys_writev+0x120/0x120 [ 330.468223] do_syscall_64+0x15b/0x220 [ 330.468266] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 330.468292] RIP: 0033:0x457089 [ 330.468325] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 330.468343] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 330.468377] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 330.468397] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 330.468415] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 330.468432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 330.468451] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000017 19:18:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_ifreq(r0, 0x89b0, &(0x7f00000000c0)={'team_slave_1\x00', @ifru_hwaddr=@broadcast}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:09 executing program 6: r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = dup2(r0, r0) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000040)={0x2e7, 0x7, 0x6fb, 0x100, 0x6, 0x8}) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000180)="ddc7d55951a67d10f5abff8fce3a44e2cc56a8d4bf7df78b375ac0cab02ab7bc64d11961fbe836211db5", 0x2a, 0xfffffffffffffffc) keyctl$instantiate(0xc, r2, &(0x7f00000001c0)="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", 0x1000, 0xfffffffffffffffb) modify_ldt$write(0x1, &(0x7f0000000080)={0x6, 0xffffffffffffffff, 0x400, 0x8, 0x0, 0x6, 0x1f, 0x0, 0x2356, 0x7}, 0xffffffffffffffea) syncfs(r1) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f00000011c0)) 19:18:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x400000, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={0x0, 0x3, 0x9, 0x3ff, 0xa3b, 0x8}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000200)={r2, 0x8000}, &(0x7f0000000240)=0x8) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:09 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x2000020, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:09 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000180)=0x0) syz_open_procfs(r0, &(0x7f00000001c0)='net/l2cap\x00') perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffdffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff6ae, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f, 0x0, 0x0, 0x0, 0x0, 0x80000000000009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x282, 0x0) ioctl$RTC_WIE_ON(r1, 0x700f) ioctl$SG_SCSI_RESET(r1, 0x2284, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000200)=""/87) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:09 executing program 4 (fault-call:8 fault-nth:24): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:09 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x101000, 0x0) ioctl$PIO_SCRNMAP(r0, 0x4b41, &(0x7f0000000140)="2a8a74fa4dfed01073fb56416bb0ee4e7adc817d37248a4a007bb28ead2af10c833d23124d7ef6d754ba40fcbe41180d11f85e9e8c5999dff614e57bae27db33546021574875bffc5fceee5d65ca122c8e73e38ac33f86a22475151942c600592493db3c757460000f2fb0b2fa3558ac3f856d60c70615a0943d7eee200171d40a298555da98a39c23d4af76a817ba5308a8130d74b50db8cacadc7ad0b0ccec041c22bc710bd8212ab2aced87cd65131e75a83083892284292c0f165d141941a71e4fba88a2e7317b2bb40d40cba57dabffa1b1c1a7c3") syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:18:09 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 330.855896] FAULT_INJECTION: forcing a failure. [ 330.855896] name failslab, interval 1, probability 0, space 0, times 0 [ 330.867349] CPU: 1 PID: 11364 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 330.874672] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 330.884099] Call Trace: [ 330.886757] dump_stack+0x14b/0x190 [ 330.890473] should_fail+0xa98/0xaa0 [ 330.894271] __should_failslab+0x278/0x2a0 [ 330.898603] should_failslab+0x29/0x70 [ 330.902526] __kmalloc+0xbe/0x350 [ 330.906067] ? proc_cpuset_show+0x64/0x8d0 [ 330.910372] ? proc_cpuset_show+0x95/0x8d0 [ 330.914653] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 330.920163] proc_cpuset_show+0x95/0x8d0 [ 330.924323] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 330.929735] ? get_pid_task+0x10f/0x1a0 [ 330.933753] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 330.939258] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 330.944766] proc_single_show+0x1b1/0x300 [ 330.948965] ? proc_single_open+0x90/0x90 [ 330.953190] seq_read+0xb10/0x1e80 [ 330.956769] ? iov_iter_advance+0x496/0x1eb0 [ 330.961242] do_iter_read+0xb87/0xe20 [ 330.965087] ? seq_open+0x390/0x390 [ 330.968790] do_preadv+0x38e/0x570 [ 330.972421] ? syscall_return_slowpath+0xdb/0x700 [ 330.977350] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 330.982799] ? fput+0x257/0x2e0 [ 330.986130] __x64_sys_preadv+0x120/0x170 [ 330.990372] ? __ia32_sys_writev+0x120/0x120 [ 330.994845] do_syscall_64+0x15b/0x220 [ 330.998788] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 331.004034] RIP: 0033:0x457089 [ 331.007308] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.026403] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 331.034185] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 331.041494] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 331.048798] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:10 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x0, [0x0, 0x0, 0x0, 0x200000000000000]}) 19:18:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffc) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') r1 = dup2(r0, r0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x9) 19:18:10 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x117, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f0000000200)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000100)=0xffffffffffff7fff, r2, 0x0, 0x0, 0x1}}, 0x20) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 331.056099] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 331.063395] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000018 19:18:10 executing program 0: r0 = socket$bt_rfcomm(0x1f, 0x1, 0x3) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000180)=0x4, &(0x7f00000001c0)=0x2) syz_emit_ethernet(0xbc52d07c8c2e375c, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c0000000000019078ac1414bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000000c201ca3aa4d641c152ca561bd6209c49dd5c015be92cd733b3947e42d6c14a2b94a986e359368d385d62e964d8be1da75042c72f459b0276"], &(0x7f0000000000)={0x0, 0xfffffffffffffffd, [0x0, 0x1]}) r1 = dup3(r0, r0, 0x80002) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x2, 0x1}}, 0x10) 19:18:10 executing program 4 (fault-call:8 fault-nth:25): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:10 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e21, @multicast2}}, 0x80000001, 0x0, 0x3, 0x1, 0xa3}, &(0x7f0000000080)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000200)={r1, 0x95, "d12ef536a6b2fc9fd7240d023e7de32c44655464b024d0958e39e58b28e1f9376dfae13242f16563ee69780aa0b5cdeffc9843c2746c9b00554c0a1dd9c70401b731adbf6986353ca9e159b2fb75c8cee25e02948faea01d70c0e26e32eaa3149afa8daeb66371ac237de4d517ccb84bba2dc7216f856d55f5cdf041924e603138a564017c6fb31b85ac6ac5917b7c5bc7224cabb2"}, &(0x7f00000002c0)=0x9d) [ 331.458086] FAULT_INJECTION: forcing a failure. [ 331.458086] name failslab, interval 1, probability 0, space 0, times 0 [ 331.469721] CPU: 0 PID: 11402 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 331.477027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 331.486408] Call Trace: [ 331.489074] dump_stack+0x14b/0x190 [ 331.492769] should_fail+0xa98/0xaa0 [ 331.496581] __should_failslab+0x278/0x2a0 [ 331.500874] should_failslab+0x29/0x70 [ 331.504808] __kmalloc+0xbe/0x350 [ 331.508333] ? proc_cpuset_show+0x64/0x8d0 [ 331.512621] ? proc_cpuset_show+0x95/0x8d0 [ 331.516901] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 331.522407] proc_cpuset_show+0x95/0x8d0 [ 331.526537] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 331.531945] ? get_pid_task+0x10f/0x1a0 [ 331.536001] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 331.541517] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 331.547036] proc_single_show+0x1b1/0x300 [ 331.551238] ? proc_single_open+0x90/0x90 [ 331.555431] seq_read+0xb10/0x1e80 [ 331.559012] ? iov_iter_advance+0x496/0x1eb0 [ 331.563498] do_iter_read+0xb87/0xe20 [ 331.567348] ? seq_open+0x390/0x390 [ 331.571024] do_preadv+0x38e/0x570 [ 331.574655] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 331.580088] ? syscall_trace_enter+0x918/0xfb0 [ 331.584768] ? kmsan_set_origin_inline+0x6b/0x120 [ 331.589662] __x64_sys_preadv+0x120/0x170 [ 331.593852] ? __ia32_sys_writev+0x120/0x120 [ 331.598295] do_syscall_64+0x15b/0x220 [ 331.602255] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 331.607480] RIP: 0033:0x457089 [ 331.610714] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 331.629656] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 331.637443] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 331.644769] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 331.652068] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 331.659382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 331.666707] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000019 19:18:10 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, &(0x7f0000000140)=0x80, 0x80800) bind$bt_rfcomm(r0, &(0x7f0000000180)={0x1f, {0x20, 0x81, 0xfffffffffffffff9, 0x2, 0x7, 0x4}, 0x4}, 0xa) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@broadcast, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) getgroups(0x5, &(0x7f0000000340)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) r4 = getuid() write$P9_RSTATu(r1, &(0x7f0000000380)={0x61, 0x7d, 0x1, {{0x0, 0x4c, 0x6, 0x1, {0x4, 0x4, 0x2}, 0x4010000, 0x800, 0x80, 0x191, 0x4, 'ppp0', 0x0, "", 0x1, '*', 0x14, 'selfposix_acl_access'}, 0x0, "", r2, r3, r4}}, 0x61) 19:18:10 executing program 7: r0 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1, 0x800) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000380)={0x3, 0x3, 'client1\x00', 0xffffffff80000001, "953d0e241a3661c3", "50c57663d02092c24d6fc770da3941de7aadd3d83d5fd60a2d402a752344bca6", 0x0, 0x5336}) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="079f5014321f45ea6700003048526dd2b07e5a993d2ff196914e8f42a517877d181cd13207435dae936d356c3fad4908afa6010d0aeba446ed39c0a27738916112f9e6f96839c36300cc033714deaef1aa696915"], &(0x7f00000001c0)=0xf) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) shmget$private(0x0, 0x12000, 0x7800000e, &(0x7f0000fee000/0x12000)=nil) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000280)=0x0) sched_getaffinity(r3, 0x8, &(0x7f00000002c0)) 19:18:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) chmod(&(0x7f0000000280)='./file0\x00', 0x20000000002) r1 = socket$inet6(0xa, 0x0, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x1031c0, 0x0) write$FUSE_NOTIFY_STORE(r2, &(0x7f0000000240)={0x2a, 0x4, 0x0, {0x5, 0x0, 0x2, 0x0, [0x0, 0x0]}}, 0x2a) r3 = socket(0x9, 0x80005, 0x8faa) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') accept$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000380)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r4, 0x202, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r5}, {0x3c, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) ioctl$SIOCSIFMTU(r3, 0x8922, &(0x7f0000000040)={'bridge_slave_0\x00', 0x81}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 19:18:11 executing program 4 (fault-call:8 fault-nth:26): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000340)) r1 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(r1, &(0x7f0000000380)="6b8eb74da9f173503662cd5a58efffcb43be1cc9e5b364cc30a21c9ba0ea70836f96059e9a0ffc9559c26f563abb7ddf39dd16623d1a6948cf40a470c40257346e8e6ff20370b6544c89be4632fdfbb2f072d74f00442309e5afca51b70c6140d58fe4e0bb40dc8047a29a8cce4d19e02682da8c911dffc475eedc4a3b31f2c0f0fb4000f24b3c", 0x87, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x3, 0x80800) ioctl$IOC_PR_PREEMPT(r2, 0x401870cb, &(0x7f00000004c0)={0x6, 0x80, 0x3, 0xffff}) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000180)='[#userbdev{\x00', &(0x7f00000001c0)='@ppp0\x00'], &(0x7f00000002c0)=[&(0x7f0000000240)='^\x00', &(0x7f0000000280)='nfs\x00']) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) write$eventfd(r0, &(0x7f0000000440)=0x100000001, 0x8) 19:18:11 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:11 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x1, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x7, 0xfffffffffffffff9, 0x91bc}, &(0x7f00000001c0)=0x10) [ 332.156660] FAULT_INJECTION: forcing a failure. [ 332.156660] name failslab, interval 1, probability 0, space 0, times 0 [ 332.168188] CPU: 1 PID: 11446 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 332.175931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.185481] Call Trace: [ 332.188265] dump_stack+0x14b/0x190 [ 332.192429] should_fail+0xa98/0xaa0 [ 332.196664] __should_failslab+0x278/0x2a0 [ 332.201707] should_failslab+0x29/0x70 [ 332.205666] __kmalloc+0xbe/0x350 [ 332.209218] ? proc_cpuset_show+0x64/0x8d0 [ 332.213528] ? proc_cpuset_show+0x95/0x8d0 [ 332.217823] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.223444] proc_cpuset_show+0x95/0x8d0 [ 332.227559] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 332.233250] ? get_pid_task+0x10f/0x1a0 [ 332.237264] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.242762] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.248283] proc_single_show+0x1b1/0x300 [ 332.252504] ? proc_single_open+0x90/0x90 [ 332.256765] seq_read+0xb10/0x1e80 [ 332.260354] ? iov_iter_advance+0x496/0x1eb0 [ 332.264859] do_iter_read+0xb87/0xe20 [ 332.268753] ? seq_open+0x390/0x390 [ 332.272453] do_preadv+0x38e/0x570 [ 332.276099] ? syscall_return_slowpath+0xdb/0x700 [ 332.281040] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 332.286481] ? fput+0x257/0x2e0 [ 332.289868] __x64_sys_preadv+0x120/0x170 [ 332.294067] ? __ia32_sys_writev+0x120/0x120 [ 332.298520] do_syscall_64+0x15b/0x220 [ 332.302464] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.307736] RIP: 0033:0x457089 [ 332.310996] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.330295] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 332.338052] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 332.345718] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 19:18:11 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='environ\x00') ioctl$BLKPG(r0, 0x1269, &(0x7f00000002c0)={0xd72e, 0xc6, 0xd0, &(0x7f00000001c0)="0acdd776933f71d0b306c69a771acbe52bb8c545e751da88622581f7832c052ed1c2dea622665faeb108a1b111e20112b80b4dfaa9d5d39c731c5965355a42f93126a083530f2a5df159f919f049e63fe2537ca46971805cccc0d18d97a7ec8ea41a32092524bc2110a1a4210605257628805b0184f7470f2f7f7e0bc4e6fc31dd9b024a35fafac9c4ba2606d6fe81c6b02d77047c678bd63a7538d0b23335f614d54ab79041548f7984e70719918fb3db228c62f5649bd68b30ded307d7bb482f5963d16731c69484c87f1b3f9a6fad"}) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000480)={@in6={{0xa, 0x4e23, 0x1f, @empty, 0x6}}, 0x6f64, 0x100, 0x20, "b31f9ff7fa4a25d848642d4e7e4c72f23cc2a0fdb94f359823936257dc832e244d7edd63c41e0325e7472fcfb9fba99c6c5193bb8ba830897b481abd1a3a90eb760fe853349115b81c737feb57dd7ebb"}, 0xd8) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x40, 0x4}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="01000000"], 0xfffffffffffffedb) fstat(r0, &(0x7f0000000400)) 19:18:11 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200000, 0x2) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x8001, 0x5, 0x6, 0x3, 0x0, 0xffffffffe07237fa, 0x2101, 0x2, 0xfffffffffffffff9, 0x3, 0x3, 0x1, 0x10000, 0xffffffffffffffad, 0x8000, 0x6, 0x100, 0xfff, 0x7, 0x401, 0x9, 0x7ce3, 0x100000001, 0x3, 0xffffffffffffffff, 0x60a, 0x8, 0x0, 0x6, 0x6, 0x0, 0x7, 0x7ff, 0x5, 0x5, 0x4, 0x0, 0x9, 0x1, @perf_config_ext={0x7fff}, 0x20, 0x4, 0x9, 0x7, 0x2, 0x1, 0x5}, r1, 0x7, r0, 0x2) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:11 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0xffffffffffff7fff, 0x82002) openat$cgroup_type(r0, &(0x7f0000000240)='cgroup.type\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='nfs\x00', 0xc, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000300)={0x3, r0}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000340)={0x0, 0x40}, &(0x7f0000000380)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000480)={r1, 0x88, &(0x7f00000003c0)=[@in={0x2, 0x4e23}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e22}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e21}, @in6={0xa, 0x4e22, 0x8, @empty, 0xcfd6}, @in6={0xa, 0x4e21, 0x1, @mcast2, 0xdc4b}]}, &(0x7f00000004c0)=0x10) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) llistxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/52, 0x34) [ 332.353439] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 332.360743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 332.368052] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001a 19:18:11 executing program 4 (fault-call:8 fault-nth:27): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:11 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = timerfd_create(0x7, 0x80000) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x9, 0x5}) r1 = dup2(r0, r0) r2 = accept$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, &(0x7f0000000140)=0x10) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000180)) [ 332.640096] FAULT_INJECTION: forcing a failure. [ 332.640096] name failslab, interval 1, probability 0, space 0, times 0 [ 332.651671] CPU: 1 PID: 11476 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 332.658975] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 332.668329] Call Trace: [ 332.670961] dump_stack+0x14b/0x190 [ 332.674619] should_fail+0xa98/0xaa0 [ 332.678413] __should_failslab+0x278/0x2a0 [ 332.682711] should_failslab+0x29/0x70 [ 332.686656] __kmalloc+0xbe/0x350 [ 332.690182] ? proc_cpuset_show+0x64/0x8d0 [ 332.694436] ? proc_cpuset_show+0x95/0x8d0 [ 332.698723] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.704230] proc_cpuset_show+0x95/0x8d0 [ 332.708349] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 332.713769] ? get_pid_task+0x10f/0x1a0 [ 332.717788] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.723301] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 332.728856] proc_single_show+0x1b1/0x300 [ 332.733036] ? proc_single_open+0x90/0x90 [ 332.737225] seq_read+0xb10/0x1e80 [ 332.740785] ? iov_iter_advance+0x496/0x1eb0 [ 332.745244] do_iter_read+0xb87/0xe20 [ 332.749116] ? seq_open+0x390/0x390 [ 332.752810] do_preadv+0x38e/0x570 [ 332.756413] ? syscall_return_slowpath+0xdb/0x700 [ 332.761344] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 332.766788] ? fput+0x257/0x2e0 [ 332.770164] __x64_sys_preadv+0x120/0x170 [ 332.774354] ? __ia32_sys_writev+0x120/0x120 [ 332.778807] do_syscall_64+0x15b/0x220 [ 332.782761] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 332.787972] RIP: 0033:0x457089 [ 332.791178] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 332.810118] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 332.817867] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 332.825166] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 332.832455] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 332.839758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 332.847063] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001b 19:18:11 executing program 4 (fault-call:8 fault-nth:28): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:11 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@dev={[], 0x1d}, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x0, 0x3}) prctl$setmm(0x23, 0x6, &(0x7f0000ffb000/0x4000)=nil) 19:18:12 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='tracefs\x00', 0x8000, 0x0) 19:18:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000100)='cifs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:12 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000180)={0x0, 0x9b, "e0e9cd9cd2af21748d378652f9f89dbbaf5bbd6c2dfdea8b1ec9a86aec595ee23138b5b7707c5ba341a14c898f9747119c11b2eeb52110f284d821e25fe89d83d72dc1e2e05b5963cdb4cde52fcc2604486064764de54bd104d0104671822896843efdb21fbf66d069eb92aab0cb75fa2e5d121902771af79bbdec9e800df0cd6b6b861342aff8c68ff0d3d6ae8b313a98dd9e88020b13d7e9b4d7"}, &(0x7f0000000240)=0xa3) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000280)={r2, @in={{0x2, 0x4e24, @loopback}}}, &(0x7f0000000380)=0x377) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 333.227756] FAULT_INJECTION: forcing a failure. [ 333.227756] name failslab, interval 1, probability 0, space 0, times 0 [ 333.239528] CPU: 0 PID: 11492 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 333.246844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.256223] Call Trace: [ 333.258896] dump_stack+0x14b/0x190 [ 333.262577] should_fail+0xa98/0xaa0 [ 333.266363] __should_failslab+0x278/0x2a0 [ 333.270647] should_failslab+0x29/0x70 [ 333.274571] __kmalloc+0xbe/0x350 [ 333.278067] ? proc_cpuset_show+0x64/0x8d0 [ 333.282337] ? proc_cpuset_show+0x95/0x8d0 [ 333.286618] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.292141] proc_cpuset_show+0x95/0x8d0 [ 333.296270] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 333.301671] ? get_pid_task+0x10f/0x1a0 [ 333.305703] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.311226] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.316732] proc_single_show+0x1b1/0x300 [ 333.320936] ? proc_single_open+0x90/0x90 [ 333.325135] seq_read+0xb10/0x1e80 [ 333.328746] ? iov_iter_advance+0x496/0x1eb0 [ 333.333232] do_iter_read+0xb87/0xe20 [ 333.337072] ? seq_open+0x390/0x390 [ 333.340759] do_preadv+0x38e/0x570 [ 333.344388] ? task_kmsan_context_state+0xd5/0x110 [ 333.349365] __x64_sys_preadv+0x120/0x170 [ 333.353561] ? __ia32_sys_writev+0x120/0x120 [ 333.358022] do_syscall_64+0x15b/0x220 [ 333.361970] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.367208] RIP: 0033:0x457089 [ 333.370438] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.389376] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 333.397126] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 333.404461] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 333.411766] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 333.419075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 19:18:12 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005c00000000000114bbac14141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac1414000000000075d551c3972d15d2290086865c3bb6b506f686fb5578ca1093d3d66b77bbe3749cde1113fab296ccb1b7f3525a9ac5d8c05cd8a0f29be4543cb7d32de7e036b27bec730861b7851632335d022afa9a00000000"], &(0x7f0000000000)) [ 333.426370] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001c 19:18:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000000180)={r0, r1+30000000}, &(0x7f00000001c0)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:12 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) fsetxattr(r0, &(0x7f0000000100)=@random={'trusted.', 'nfs\x00'}, &(0x7f0000000180)='nfs\x00', 0x4, 0x1) 19:18:12 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = accept(0xffffffffffffffff, &(0x7f0000000200)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000000280)=0x80) bind$vsock_dgram(r0, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:12 executing program 4 (fault-call:8 fault-nth:29): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:12 executing program 0: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x98, 0x101800) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="d9a2dd82b8eca1ca12414740bfbd39ee8f759af0c36a") syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 333.773587] FAULT_INJECTION: forcing a failure. [ 333.773587] name failslab, interval 1, probability 0, space 0, times 0 [ 333.785074] CPU: 1 PID: 11527 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 333.792383] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 333.801763] Call Trace: [ 333.804419] dump_stack+0x14b/0x190 [ 333.808108] should_fail+0xa98/0xaa0 [ 333.811907] __should_failslab+0x278/0x2a0 [ 333.816232] should_failslab+0x29/0x70 [ 333.820211] __kmalloc+0xbe/0x350 [ 333.823754] ? proc_cpuset_show+0x64/0x8d0 [ 333.828066] ? proc_cpuset_show+0x95/0x8d0 [ 333.832351] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.837880] proc_cpuset_show+0x95/0x8d0 [ 333.842000] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 333.847414] ? get_pid_task+0x10f/0x1a0 [ 333.851434] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.857012] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 333.862505] proc_single_show+0x1b1/0x300 [ 333.866730] ? proc_single_open+0x90/0x90 [ 333.870963] seq_read+0xb10/0x1e80 [ 333.874552] ? iov_iter_advance+0x496/0x1eb0 [ 333.879029] do_iter_read+0xb87/0xe20 [ 333.882911] ? seq_open+0x390/0x390 [ 333.886606] do_preadv+0x38e/0x570 [ 333.890243] ? syscall_return_slowpath+0xdb/0x700 [ 333.895184] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 333.900624] ? fput+0x257/0x2e0 [ 333.904019] __x64_sys_preadv+0x120/0x170 [ 333.908237] ? __ia32_sys_writev+0x120/0x120 [ 333.912718] do_syscall_64+0x15b/0x220 [ 333.916672] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 333.921910] RIP: 0033:0x457089 [ 333.925188] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 333.944119] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 333.951899] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 333.959206] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 333.966508] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:13 executing program 0: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000000, 0x30, r0, 0x100000000) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) [ 333.973808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 333.981111] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001d 19:18:13 executing program 4 (fault-call:8 fault-nth:30): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x20000, &(0x7f00000001c0)="499043c85df5fa66e97a1510bff717c5f4953c2f3a5d8551e3c702f7ddf070c0235e3635da7960cbcc16886a3a1032cbe83146645f8a41b608212b22a911f34d91ff00a0f6e045ff03a72758531244976bfd7769a6c7371bf4cef36b92f5f6d4930293567fb7e0954e42427f04de9bebb016d4b2fa1cb38b32898c7380f892e4dd6ab72c38a6432a42db08ffd2e32a950ca0bbdb") r0 = getpgid(0x0) ptrace$peek(0x2, r0, &(0x7f0000000180)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:13 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x20, 0x5, 0x1ba, 0x2}) 19:18:13 executing program 7: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x20080) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={r1, 0x29, "98a56416b3d9c6fe2d813af8b5c6bbfeb37cd7e162536053eb880aa6aea00f30ba621d1563d620ffea"}, &(0x7f0000000280)=0x31) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:13 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) lsetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='com.apple.FinderInfo\x00', &(0x7f0000000200)='nfs\x00', 0x4, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x940, 0x0) [ 334.314856] FAULT_INJECTION: forcing a failure. [ 334.314856] name failslab, interval 1, probability 0, space 0, times 0 [ 334.326575] CPU: 0 PID: 11554 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 334.333883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.343263] Call Trace: [ 334.345918] dump_stack+0x14b/0x190 [ 334.349600] should_fail+0xa98/0xaa0 [ 334.353379] __should_failslab+0x278/0x2a0 [ 334.357666] should_failslab+0x29/0x70 [ 334.361596] __kmalloc+0xbe/0x350 [ 334.365094] ? proc_cpuset_show+0x64/0x8d0 [ 334.369378] ? proc_cpuset_show+0x95/0x8d0 [ 334.373658] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.379170] proc_cpuset_show+0x95/0x8d0 [ 334.383296] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.388709] ? get_pid_task+0x10f/0x1a0 [ 334.392755] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.398253] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.403751] proc_single_show+0x1b1/0x300 [ 334.407956] ? proc_single_open+0x90/0x90 [ 334.412143] seq_read+0xb10/0x1e80 [ 334.415765] ? iov_iter_advance+0x496/0x1eb0 [ 334.420244] do_iter_read+0xb87/0xe20 [ 334.424092] ? seq_open+0x390/0x390 [ 334.427783] do_preadv+0x38e/0x570 [ 334.431409] ? syscall_return_slowpath+0xdb/0x700 [ 334.436331] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 334.441768] ? fput+0x257/0x2e0 [ 334.445101] __x64_sys_preadv+0x120/0x170 [ 334.449307] ? __ia32_sys_writev+0x120/0x120 [ 334.453765] do_syscall_64+0x15b/0x220 [ 334.457712] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.462938] RIP: 0033:0x457089 [ 334.466161] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 334.485086] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 334.492855] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 334.500166] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 334.507463] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 334.514747] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 334.522052] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001e 19:18:13 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500005ce4ffffff00039078ac1414bb141105029078000000008000000000000000002f0000ac1414aaac141400082c000000000000000000007f00000100000000ffffffff00000000e000000100000000ac14140000000004"], &(0x7f0000000000)) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000180)={0x19, 0x31, 0x6, 0x3, 0x5, 0x0, 0x5, 0x3c, 0x1}) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000140), 0x4) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000240)) sysfs$2(0x2, 0x81, &(0x7f00000001c0)=""/119) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x404000, 0x0) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000080)=0x40) 19:18:13 executing program 4 (fault-call:8 fault-nth:31): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:13 executing program 6: perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r0, 0x40045542, &(0x7f0000000180)=0xbc) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:13 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x8000082}, 0x0, 0x0, 0xffffffffffffffff, 0xa) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = open(&(0x7f0000000100)='./file0\x00', 0x2a03, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000180)={0x2, 0xfff}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 334.842660] FAULT_INJECTION: forcing a failure. [ 334.842660] name failslab, interval 1, probability 0, space 0, times 0 [ 334.854248] CPU: 1 PID: 11587 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 334.861564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 334.870942] Call Trace: [ 334.873601] dump_stack+0x14b/0x190 [ 334.877281] should_fail+0xa98/0xaa0 [ 334.881066] __should_failslab+0x278/0x2a0 [ 334.885376] should_failslab+0x29/0x70 [ 334.889302] __kmalloc+0xbe/0x350 [ 334.892837] ? proc_cpuset_show+0x64/0x8d0 [ 334.897111] ? proc_cpuset_show+0x95/0x8d0 [ 334.901365] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.906847] proc_cpuset_show+0x95/0x8d0 [ 334.910968] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 334.916368] ? get_pid_task+0x10f/0x1a0 [ 334.920379] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.925895] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 334.931429] proc_single_show+0x1b1/0x300 [ 334.935604] ? proc_single_open+0x90/0x90 [ 334.939817] seq_read+0xb10/0x1e80 [ 334.943398] ? iov_iter_advance+0x496/0x1eb0 [ 334.947897] do_iter_read+0xb87/0xe20 [ 334.951775] ? seq_open+0x390/0x390 [ 334.955471] do_preadv+0x38e/0x570 [ 334.959098] ? syscall_return_slowpath+0xdb/0x700 [ 334.964044] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 334.969501] ? fput+0x257/0x2e0 [ 334.972845] __x64_sys_preadv+0x120/0x170 [ 334.977036] ? __ia32_sys_writev+0x120/0x120 [ 334.981474] do_syscall_64+0x15b/0x220 [ 334.985393] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 334.990588] RIP: 0033:0x457089 [ 334.993827] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.012747] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 335.020657] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 335.027950] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 335.035247] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:14 executing program 2: mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) membarrier(0x10, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 335.042546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 335.049844] R13: 00000000004d3528 R14: 00000000004c839c R15: 000000000000001f 19:18:14 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000540)='/dev/audio\x00', 0x200000, 0x0) epoll_wait(r0, &(0x7f0000000580)=[{}], 0x1, 0x151) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2001, 0x0) getpeername$unix(r1, &(0x7f00000004c0), &(0x7f0000000400)=0x6e) syz_emit_ethernet(0x6a, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaff0001b0780000000080000000756741c2002f0000ac1414aaac141400082c0000000000b3000000007f00000100000000ffffffff00000000e000000100000000ac141400000000002e32422ff4de5d31e9d99b7339289772937d6f2c1a5213c20f40580ecfbb72f464d4e08a307d7fb9e753f9de92beb391785010a4df0abd937f646924ab25a808c0579d2fa48dd03788669f652b7ae19843e3ae980bbb8affe7e12146444e79782b46202deb702005f627b5a5c76b92027b4d5935685d8873e56fe1d18724b07e67dac90e2861936bcb89466ad2078360"], &(0x7f0000000000)) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)={0x0, 0x4}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r3, 0xfffffffffffffffd, 0x3, 0x7, 0x4, 0x4}, 0x14) getpeername$unix(r2, &(0x7f0000000140), &(0x7f00000000c0)=0x6e) openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) accept4(r2, &(0x7f0000000440)=@generic, &(0x7f0000000080)=0x36a, 0x80000) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000280)=@req3={0x1, 0x3, 0xd5a9, 0x55, 0x3, 0x3, 0x4}, 0x1c) 19:18:14 executing program 5: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x10080, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000200)={0x6, 0x4, {0x55, 0x2, 0x400, {0xfffffffffffffff9, 0x8}, {0xfe, 0x329}, @period={0x59, 0x80000000, 0x800, 0x100000001, 0x70192c4f, {0x9, 0x2, 0x1, 0xfffffffffffff1bd}, 0x4, &(0x7f00000001c0)=[0x7, 0x2, 0x80, 0xde96]}}, {0x55, 0x1, 0x0, {0x1}, {0x7f, 0x6}, @rumble={0xf60, 0x480000000000}}}) 19:18:14 executing program 6: mkdir(&(0x7f0000000100)='./file0\x00', 0x10) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x22000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f00000001c0)={0x101, 0x3, 0xfffffffffffff000, 0x1f, 0x959, 0x9}) 19:18:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000180)={'security\x00', 0x2, [{}, {}]}, 0x48) socketpair$inet(0x2, 0x1, 0x1, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000240), &(0x7f0000000280)=0xb) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) accept(r0, 0x0, &(0x7f0000000100)) sysfs$1(0x1, &(0x7f00000002c0)="f7a270707030252c76626f786e65743100") 19:18:14 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ext3\x00', 0x1fffffffd, &(0x7f000000a000)) 19:18:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x100) r0 = perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0x3, 0x3f, 0x200, 0x4, 0x0, 0x10000, 0x10, 0xe, 0x1, 0x40, 0x0, 0x2, 0x5, 0x5, 0x7c13, 0x1, 0x8, 0x4, 0xe085, 0x4, 0x6, 0x3, 0x1, 0x2, 0xffff, 0xfff, 0x4, 0x800cd80, 0x3d, 0x2, 0x8000, 0xfffffffffffffffe, 0x2980000000000, 0x7fffffff, 0xffffffff, 0x10000, 0x0, 0xd, 0x5, @perf_bp={&(0x7f0000000100), 0x2}, 0x20a00, 0x3, 0x4, 0x1, 0x3, 0x101, 0x1000}, r1, 0xf, r0, 0x0) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000280)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:14 executing program 0: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)) 19:18:14 executing program 4 (fault-call:8 fault-nth:32): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 335.663419] FAULT_INJECTION: forcing a failure. [ 335.663419] name failslab, interval 1, probability 0, space 0, times 0 [ 335.674900] CPU: 1 PID: 11637 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 335.682209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 335.691596] Call Trace: [ 335.694241] dump_stack+0x14b/0x190 [ 335.697925] should_fail+0xa98/0xaa0 [ 335.701721] __should_failslab+0x278/0x2a0 [ 335.706067] should_failslab+0x29/0x70 [ 335.710027] __kmalloc+0xbe/0x350 [ 335.713569] ? proc_cpuset_show+0x64/0x8d0 [ 335.717879] ? proc_cpuset_show+0x95/0x8d0 [ 335.722178] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 335.727686] proc_cpuset_show+0x95/0x8d0 [ 335.731806] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 335.737238] ? get_pid_task+0x10f/0x1a0 [ 335.741267] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 335.746768] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 335.752295] proc_single_show+0x1b1/0x300 [ 335.756498] ? proc_single_open+0x90/0x90 [ 335.760727] seq_read+0xb10/0x1e80 [ 335.764315] ? iov_iter_advance+0x496/0x1eb0 [ 335.768823] do_iter_read+0xb87/0xe20 [ 335.772710] ? seq_open+0x390/0x390 [ 335.776400] do_preadv+0x38e/0x570 [ 335.780035] ? syscall_return_slowpath+0xdb/0x700 [ 335.784962] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 335.790405] ? fput+0x257/0x2e0 [ 335.793765] __x64_sys_preadv+0x120/0x170 [ 335.797962] ? __ia32_sys_writev+0x120/0x120 [ 335.802413] do_syscall_64+0x15b/0x220 [ 335.806363] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 335.811587] RIP: 0033:0x457089 [ 335.814827] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 335.833769] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 335.841536] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 335.848844] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 335.856158] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 335.863469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 335.870777] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000020 19:18:14 executing program 4 (fault-call:8 fault-nth:33): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) 19:18:14 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x101000) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000180)=0x916) syz_emit_ethernet(0xfffffffffffffd38, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x0, {0x10, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x402f, 0x0, @local, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, &(0x7f0000000000)={0x800000000000002}) [ 336.055944] FAULT_INJECTION: forcing a failure. [ 336.055944] name failslab, interval 1, probability 0, space 0, times 0 [ 336.067636] CPU: 0 PID: 11647 Comm: syz-executor4 Not tainted 4.19.0-rc1+ #36 [ 336.074945] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.084325] Call Trace: [ 336.086984] dump_stack+0x14b/0x190 [ 336.090670] should_fail+0xa98/0xaa0 [ 336.094447] __should_failslab+0x278/0x2a0 [ 336.098731] should_failslab+0x29/0x70 [ 336.102659] __kmalloc+0xbe/0x350 [ 336.106177] ? proc_cpuset_show+0x64/0x8d0 [ 336.110452] ? proc_cpuset_show+0x95/0x8d0 [ 336.114732] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 336.120246] proc_cpuset_show+0x95/0x8d0 [ 336.124603] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 336.130024] ? get_pid_task+0x10f/0x1a0 [ 336.134038] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 336.139545] ? __cpuset_memory_pressure_bump+0x6d0/0x6d0 [ 336.145028] proc_single_show+0x1b1/0x300 [ 336.149193] ? proc_single_open+0x90/0x90 [ 336.153368] seq_read+0xb10/0x1e80 [ 336.156984] ? iov_iter_advance+0x496/0x1eb0 [ 336.161470] do_iter_read+0xb87/0xe20 [ 336.165347] ? seq_open+0x390/0x390 [ 336.169044] do_preadv+0x38e/0x570 [ 336.172670] ? syscall_return_slowpath+0xdb/0x700 [ 336.177592] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 336.183029] ? fput+0x257/0x2e0 [ 336.186363] __x64_sys_preadv+0x120/0x170 [ 336.190566] ? __ia32_sys_writev+0x120/0x120 [ 336.195015] do_syscall_64+0x15b/0x220 [ 336.198966] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.204198] RIP: 0033:0x457089 [ 336.207433] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.226368] RSP: 002b:00007f4f4d6c7c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 336.234123] RAX: ffffffffffffffda RBX: 00007f4f4d6c86d4 RCX: 0000000000457089 [ 336.241446] RDX: 10000000000001ed RSI: 0000000020000480 RDI: 0000000000000004 [ 336.248750] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 19:18:15 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xff, 0x101000) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f0000000140)={0x52c15404, 0xffffffffffffffff, 0x1f, 'queue1\x00'}) syz_emit_ethernet(0x6a, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaabfffffdabcd4c7443dffffff0800450000330000000000019095ac1414bbac14141105029078000000008000000000000000004b86a4bbc58d0cf32690f312872f0000ac1414aaac141400dea78600000000007f00000100000000ffffffff00000000e000000100000000ac14"], &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r0, 0xc0605345, &(0x7f0000000200)={0x9, 0x2, {0x1, 0x0, 0x5, 0x2, 0x2}}) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@broadcast, @remote, 0x1, 0x5, [@broadcast, @broadcast, @multicast1, @multicast2, @dev={0xac, 0x14, 0x14, 0x20}]}, 0x24) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000004, 0x20010, r0, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x121000) [ 336.256052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 336.263352] R13: 00000000004d3528 R14: 00000000004c839c R15: 0000000000000021 19:18:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000140)='./file0\x00', &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) clock_gettime(0x6, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={{r0, r1/1000+10000}}) mount(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) 19:18:15 executing program 4 (fault-call:8 fault-nth:34): socket$packet(0x11, 0x23, 0x300) pkey_alloc(0x0, 0x3) pkey_free(0xffffffffffffffff) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000180), 0xfa, &(0x7f0000ffb000/0x3000)=nil, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='cpuset\x00') preadv(r0, &(0x7f0000000480), 0x10000000000001ed, 0x0) [ 336.393367] general protection fault: 0000 [#1] SMP PTI [ 336.398818] CPU: 0 PID: 11632 Comm: syz-executor3 Not tainted 4.19.0-rc1+ #36 [ 336.406109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 336.415520] RIP: 0010:try_to_del_timer_sync+0x725/0x880 [ 336.420912] Code: 80 00 00 00 e8 6c 36 1b 00 49 83 c7 08 4d 85 f6 0f 85 40 01 00 00 4c 89 ff e8 77 2d 76 00 4c 89 20 4d 85 e4 0f 85 39 01 00 00 <4d> 89 2f eb 5a 8b 7d d0 e8 5e 36 76 00 e9 63 ff ff ff 8b 7d d0 e8 [ 336.439841] RSP: 0018:ffff8801bfe8eed8 EFLAGS: 00010046 [ 336.445238] RAX: ffffffff8a11f000 RBX: ffff880131b44400 RCX: 0000000000040000 [ 336.452533] RDX: ffffffff8a120000 RSI: 0000000000000008 RDI: dead000000000208 [ 336.459826] RBP: ffff8801bfe8ef68 R08: 0000000000480000 R09: 0000000000000000 [ 336.467115] R10: 0000000000000000 R11: 0000000080080007 R12: 0000000000000000 [ 336.474415] R13: ffff88013fd55bc8 R14: 0000000000000000 R15: dead000000000208 [ 336.481733] FS: 00007fdcde49b700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 336.489981] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 336.495884] CR2: 00007fdcde416db8 CR3: 000000012797a000 CR4: 00000000001406f0 [ 336.503181] Call Trace: [ 336.505869] del_timer_sync+0xaa/0x180 [ 336.509803] xprt_put+0x228/0x3b0 [ 336.513294] xprt_switch_put+0x35f/0x5d0 [ 336.517429] xprt_iter_destroy+0x41/0x70 [ 336.521567] rpc_free_client+0x4ca/0x630 [ 336.525680] rpc_release_client+0x2b5/0x380 [ 336.530080] rpc_shutdown_client+0x834/0x850 [ 336.534565] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 336.540004] ? put_rpccred+0x46e/0xbd0 [ 336.543963] ? rpc_put_task+0x2cc/0x350 [ 336.547973] rpc_create_xprt+0x745/0xcb0 [ 336.552081] rpc_create+0xa48/0xaf0 [ 336.555759] nfs_create_rpc_client+0x566/0x800 [ 336.560383] nfs_init_client+0xb8/0x1d0 [ 336.564392] ? nfs_init_server_rpcclient+0x430/0x430 [ 336.569519] nfs_get_client+0x153c/0x1750 [ 336.573722] nfs_create_server+0xb33/0x31c0 [ 336.578125] ? should_fail+0x53/0xaa0 [ 336.582015] ? __should_failslab+0x278/0x2a0 [ 336.586487] nfs_try_mount+0x10f3/0x14f0 [ 336.590627] ? __msan_poison_alloca+0x173/0x1f0 [ 336.595362] ? try_module_get+0x52/0x3c0 [ 336.599458] ? get_nfs_version+0x4c2/0x550 [ 336.603760] ? try_module_get+0x52/0x3c0 [ 336.607886] ? get_nfs_version+0x4c2/0x550 [ 336.612205] nfs_fs_mount+0x3765/0x3df0 [ 336.616228] ? nfs_parse_mount_options+0x5090/0x5090 [ 336.621362] ? nfs_fill_super+0xbf0/0xbf0 [ 336.625594] ? nfs_auth_info_match+0x190/0x190 [ 336.630250] ? init_once+0x570/0x570 [ 336.634095] mount_fs+0x28f/0x760 [ 336.637586] vfs_kern_mount+0x21b/0x8d0 [ 336.641653] do_mount+0xcee/0x56b0 [ 336.645280] ksys_mount+0x32e/0x3d0 [ 336.648982] __x64_sys_mount+0x157/0x1c0 [ 336.653084] ? ksys_mount+0x3d0/0x3d0 [ 336.656916] do_syscall_64+0x15b/0x220 [ 336.660846] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 336.666057] RIP: 0033:0x457089 [ 336.669281] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 336.688209] RSP: 002b:00007fdcde49ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 336.695956] RAX: ffffffffffffffda RBX: 00007fdcde49b6d4 RCX: 0000000000457089 [ 336.703252] RDX: 0000000020fb5ffc RSI: 0000000020343ff8 RDI: 0000000020000140 [ 336.710635] RBP: 00000000009300a0 R08: 000000002000a000 R09: 0000000000000000 [ 336.717937] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 336.725226] R13: 00000000004d2820 R14: 00000000004c7c5a R15: 0000000000000000 [ 336.732522] Modules linked in: [ 336.735744] Dumping ftrace buffer: [ 336.739293] (ftrace buffer empty) [ 336.743058] ---[ end trace 759db2efc8201eef ]--- [ 336.747886] RIP: 0010:try_to_del_timer_sync+0x725/0x880 [ 336.753281] Code: 80 00 00 00 e8 6c 36 1b 00 49 83 c7 08 4d 85 f6 0f 85 40 01 00 00 4c 89 ff e8 77 2d 76 00 4c 89 20 4d 85 e4 0f 85 39 01 00 00 <4d> 89 2f eb 5a 8b 7d d0 e8 5e 36 76 00 e9 63 ff ff ff 8b 7d d0 e8 [ 336.772220] RSP: 0018:ffff8801bfe8eed8 EFLAGS: 00010046 [ 336.777613] RAX: ffffffff8a11f000 RBX: ffff880131b44400 RCX: 0000000000040000 [ 336.784910] RDX: ffffffff8a120000 RSI: 0000000000000008 RDI: dead000000000208 [ 336.792211] RBP: ffff8801bfe8ef68 R08: 0000000000480000 R09: 0000000000000000 [ 336.799510] R10: 0000000000000000 R11: 0000000080080007 R12: 0000000000000000 [ 336.806803] R13: ffff88013fd55bc8 R14: 0000000000000000 R15: dead000000000208 [ 336.814103] FS: 00007fdcde49b700(0000) GS:ffff88021fc00000(0000) knlGS:0000000000000000 [ 336.822358] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 336.828261] CR2: 00007fdcde416db8 CR3: 000000012797a000 CR4: 00000000001406f0 [ 336.835566] Kernel panic - not syncing: Fatal exception [ 338.155618] Shutting down cpus with NMI [ 338.159783] ------------[ cut here ]------------ [ 338.164596] kernel BUG at mm/kmsan/kmsan_entry.c:81! [ 338.169780] invalid opcode: 0000 [#2] SMP PTI [ 338.172921] Dumping ftrace buffer: [ 338.174334] CPU: 1 PID: 11641 Comm: syz-executor2 Tainted: G D 4.19.0-rc1+ #36 [ 338.177852] (ftrace buffer empty) [ 338.186529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 338.190241] Kernel Offset: disabled [[ 3 33388..20230243234]3 R]e Rbeobootinotg iingn 8in64 8060 4s00ec osndesc.on. d s.2/. 0 x70 [ 338.211952] Code: 00 74 27 65 8b 04 25 40 92 03 00 83 c0 01 83 f8 08 7d 27 65 89 04 25 40 92 03 00 65 c6 04 25 d5 6f 0b 00 ff c3 0f 0b 90 eb fe <0f> 0b 66 90 66 2e 0f 1f 84 00 00 00 00 00 eb fe 0f 0b 66 90 66 2e [ 338.230905] RSP: 0018:fffffe0000049ea8 EFLAGS: 00010046 [ 338.236306] RAX: 0000000080000200 RBX: 0000000000000001 RCX: 00000000c0000101 [ 338.243611] RDX: 00000000ffff8802 RSI: ffffffff88c0136c RDI: ffffea000cbef380 [ 338.250907] RBP: fffffe0000049ef9 R08: 0000000000000000 R09: 0000000000000000 [ 338.258210] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000 [ 338.265517] R13: 0000000000000000 R14: 0000000116df2000 R15: 0000000000000000 [ 338.272833] FS: 00007f4050cc5700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 338.281094] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 338.287019] CR2: 00007f4050c61db8 CR3: 0000000116df2000 CR4: 00000000001406e0 [ 338.294310] Call Trace: [ 338.296952] [ 338.299172] ? end_repeat_nmi+0x19/0x8e [ 338.303209] ? end_repeat_nmi+0x7/0x8e [ 338.307170] ? xprt_release_xprt_cong+0x590/0x590 [ 338.312071] ? msan_get_shadow_origin_ptr+0x170/0x2e0 [ 338.317308] ? msan_get_shadow_origin_ptr+0x170/0x2e0 [ 338.322544] ? msan_get_shadow_origin_ptr+0x170/0x2e0 [ 338.327748] [ 338.330036] ? queued_spin_lock_slowpath+0x5e/0xac0 [ 338.335090] ? _raw_spin_lock_irqsave+0xdd/0xe0 [ 338.339860] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 338.345273] ? queued_spin_lock_slowpath+0x6b5/0xac0 [ 338.350424] ? _raw_spin_lock_irqsave+0x41/0xe0 [ 338.355191] ? _raw_spin_lock_irqsave+0xdd/0xe0 [ 338.359912] ? __mod_timer+0x87e/0x2b90 [ 338.363969] ? mod_timer+0x70/0x80 [ 338.367547] ? xprt_release+0xa05/0xfd0 [ 338.371625] ? __rpc_execute+0x9bd/0x1470 [ 338.375827] ? rpc_prepare_task+0xd0/0xd0 [ 338.380016] ? rpc_execute+0x3ed/0x660 [ 338.383989] ? rpc_run_task+0x97a/0xbd0 [ 338.388015] ? rpc_create_xprt+0x633/0xcb0 [ 338.392341] ? rpc_create+0xa48/0xaf0 [ 338.396208] ? nfs_create_rpc_client+0x566/0x800 [ 338.401015] ? nfs_init_client+0xb8/0x1d0 [ 338.405203] ? nfs_init_server_rpcclient+0x430/0x430 [ 338.410343] ? nfs_get_client+0x153c/0x1750 [ 338.414758] ? nfs_create_server+0xb33/0x31c0 [ 338.419341] ? should_fail+0x53/0xaa0 [ 338.423230] ? __should_failslab+0x278/0x2a0 [ 338.427718] ? nfs_try_mount+0x10f3/0x14f0 [ 338.432060] ? __msan_poison_alloca+0x173/0x1f0 [ 338.436830] ? try_module_get+0x52/0x3c0 [ 338.440924] ? get_nfs_version+0x4c2/0x550 [ 338.445260] ? try_module_get+0x52/0x3c0 [ 338.449398] ? get_nfs_version+0x4c2/0x550 [ 338.453716] ? nfs_fs_mount+0x3765/0x3df0 [ 338.457907] ? nfs_parse_mount_options+0x5090/0x5090 [ 338.463046] ? nfs_fill_super+0xbf0/0xbf0 [ 338.467282] ? nfs_auth_info_match+0x190/0x190 [ 338.471943] ? init_once+0x570/0x570 [ 338.475758] ? mount_fs+0x28f/0x760 [ 338.479432] ? vfs_kern_mount+0x21b/0x8d0 [ 338.483643] ? do_mount+0xcee/0x56b0 [ 338.487449] ? ksys_mount+0x32e/0x3d0 [ 338.491353] ? __x64_sys_mount+0x157/0x1c0 [ 338.495633] ? ksys_mount+0x3d0/0x3d0 [ 338.499477] ? do_syscall_64+0x15b/0x220 [ 338.503592] ? entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 338.508974] Modules linked in: [ 338.512202] Dumping ftrace buffer: [ 338.515754] (ftrace buffer empty) [ 338.519498] ---[ end trace 759db2efc8201ef0 ]--- [ 338.524314] RIP: 0010:try_to_del_timer_sync+0x725/0x880 [ 338.529735] Code: 80 00 00 00 e8 6c 36 1b 00 49 83 c7 08 4d 85 f6 0f 85 40 01 00 00 4c 89 ff e8 77 2d 76 00 4c 89 20 4d 85 e4 0f 85 39 01 00 00 <4d> 89 2f eb 5a 8b 7d d0 e8 5e 36 76 00 e9 63 ff ff ff 8b 7d d0 e8 [ 338.548673] RSP: 0018:ffff8801bfe8eed8 EFLAGS: 00010046 [ 338.554089] RAX: ffffffff8a11f000 RBX: ffff880131b44400 RCX: 0000000000040000 [ 338.561397] RDX: ffffffff8a120000 RSI: 0000000000000008 RDI: dead000000000208 [ 338.568698] RBP: ffff8801bfe8ef68 R08: 0000000000480000 R09: 0000000000000000 [ 338.575998] R10: 0000000000000000 R11: 0000000080080007 R12: 0000000000000000 [ 338.583313] R13: ffff88013fd55bc8 R14: 0000000000000000 R15: dead000000000208 [ 338.590622] FS: 00007f4050cc5700(0000) GS:ffff88021fd00000(0000) knlGS:0000000000000000 [ 338.598883] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 338.604796] CR2: 00007f4050c61db8 CR3: 0000000116df2000 CR4: 00000000001406e0