3b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r24) ptrace$setopts(0x4206, r24, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r19, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r18, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r17, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r12, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r11, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0xc) [ 1759.280105] net_ratelimit: 23 callbacks suppressed [ 1759.280110] protocol 88fb is buggy, dev hsr_slave_0 [ 1759.290253] protocol 88fb is buggy, dev hsr_slave_1 [ 1760.480142] protocol 88fb is buggy, dev hsr_slave_0 [ 1760.485403] protocol 88fb is buggy, dev hsr_slave_1 [ 1760.490531] protocol 88fb is buggy, dev hsr_slave_0 [ 1760.495566] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.280132] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.280144] protocol 88fb is buggy, dev hsr_slave_0 [ 1761.285243] protocol 88fb is buggy, dev hsr_slave_1 [ 1761.290275] protocol 88fb is buggy, dev hsr_slave_1 09:37:22 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) r4 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r5 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r7 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r8 = gettid() r9 = gettid() kcmp(r9, r9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r6, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r10}, 0x30) r11 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r11, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r14 = accept$alg(r13, 0x0, 0x0) dup(r14) r15 = getpid() r16 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r17 = getpid() sched_setattr(r17, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r18 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r19 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r19, 0x0, 0x0) r20 = getpgrp(0x0) ptrace$getregs(0xe, r20, 0x9, &(0x7f00000001c0)=""/68) r21 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r22 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r22, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r24) ptrace$setopts(0x4206, r24, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r19, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r18, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r17, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r12, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r11, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0xc) 09:37:22 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @timestamp, @timestamp, @window, @window], 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 1761.841543] selinux_nlmsg_perm: 46 callbacks suppressed [ 1761.841555] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 [ 1761.868817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 09:37:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 1761.903365] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 [ 1761.925987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 [ 1761.940912] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 09:37:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 1761.955835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 [ 1761.971493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 [ 1761.985976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23789 comm=syz-executor.2 09:37:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) close(r3) r4 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r5 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r7 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r8 = gettid() r9 = gettid() kcmp(r9, r9, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r9, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r8, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r7, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r6, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r5, 0x0, 0x1, &(0x7f0000000000)='\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r10}, 0x30) r11 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r11, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r14 = accept$alg(r13, 0x0, 0x0) dup(r14) r15 = getpid() r16 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r17 = getpid() sched_setattr(r17, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r18 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r19 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r19, 0x0, 0x0) r20 = getpgrp(0x0) ptrace$getregs(0xe, r20, 0x9, &(0x7f00000001c0)=""/68) r21 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r22 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r22, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r24) ptrace$setopts(0x4206, r24, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r21, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r19, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r18, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r17, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r16, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r15, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r12, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r11, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r10}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r10}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r10}, 0xc) [ 1762.127135] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23808 comm=syz-executor.2 [ 1762.142754] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23808 comm=syz-executor.2 09:37:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r2, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:23 executing program 2: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r1, 0x30, 0x0, @ib}}, 0x90) 09:37:23 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket(0x100000000011, 0x2, 0x0) bind(r1, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@loopback, 0x0, r2}) [ 1764.640122] net_ratelimit: 15 callbacks suppressed [ 1764.640126] protocol 88fb is buggy, dev hsr_slave_0 [ 1764.650211] protocol 88fb is buggy, dev hsr_slave_1 [ 1764.655281] protocol 88fb is buggy, dev hsr_slave_0 [ 1764.660362] protocol 88fb is buggy, dev hsr_slave_1 09:37:26 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:26 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000000a000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000000200036158, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='nfs\x00\xac\xa0\xa7\x11:c7\x06\xbc5\xbc\nG\xf9\x00\x9coV\xf0\xffkK\x1a#Q.\x8d\x88\\,\xdc\xcd\x9e\x96<\xf8G\x1d\x85\x87\x8dB\xa69\xf6\x96\xcd\xba\x9f\xd6\xeeZ\x1b\x18\x9c\x18\x95Q\x10\xd1M\xf2u5\xd7-\xfe[\x9e\xcdj\x10\x1f:\xf7\x9d\xe7\x8eG\xa0kE\xa4t\xe81\x8f\x91\x11\xab\xd6\xd5G\xc2\xc3\x8eb\x8e\xcd\xb1QCX\x84\xb8\xc9\x1d\xdc\xb7\xf3\x94&X\xafm]#\x8cpz\x0f\xe1;\xc3N]\xbc\xffQ\x85\xa4\xc4\xf1G\x89\xb7\x04\xe85A\x04\xeb\xa8\xee%?\xf4!\x95\x80XA\xa2\x8c\xfbiJ#\x89I\xb6\xe2\'\xffs\x89:O\xbfS\x14\xc1ZK\xe3\xa6P\xe0\x7f\x84\x03\x14\xbf\xf5\xe0\xcc\xeb\b,\'g\xb0s%\x15\xab\xc1\x9b\xc9\x96\\A\xecPh\x85\xb3\xc18\xa3S \x9f\x13\xeeOfb\xfa\xe1Zr\xf5~\xd8\x02\"\xa2LU1\x01\x8f\xc8\xa8\xc3Dt\x98\xcc\xf7H\xc7x\xda1-*\x8c%\x17B\x0e\x8bQhn\xcb7\x1a\xc1L\x99\xb6\xca\x1f\x8e \xe5S\xc9\r\xbb\xce\x05\xd4\x8av\xe7E\x990~\xee\xb6-\\\xb8\xfb\x87\x12S\x05\xe2!\r\xbd\xce$\x11\xde\xb6X\fXA\x9a\xc4\x9b\x8b\xcf\x03(\xac\x9d\xe3\x1d\xeb5\xe1}X5FU\x88\x03\xf0BH\xf5#\xc9{\x8f\xe1\xac\x82\xd7\xe6\xe8\x11\xe0\xf6\"f\x96\x84\xe8_\x15\xe5\x05\xba9\xb34\xcc\xfd`\xe2\xfdv\xdc\xfb\x81\x06\x8b\xae\xf5\xd8d\xe3_3\x93\xdd\xf2\x92\x94\x98v\x8f\xdd\xf3s\x8d1j)\xc6\xa3\xef\xf5r\xdf\xd1J^\x19\x10\b\f2\xaeeY\x7f\xae>h\xba[\xb5H\xb6\xa0\xc4\x01~\x1f\xa8\xaf\x9c\xf4\x80\x80\xea\xac\xa3R\x18\x94\x11l\xf5\xe3`Ml\xc7V[s\xff\xc2\xf3\x1e~bt\xca\xf2Ymq\xcb\xa6)wV[\xda\xf8&@\xaf\xae\xc5\x0f\xc5u\x86\xbc\xef', 0x0, &(0x7f000000a000)) 09:37:26 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x73, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c0000000706e700000000000f00002eceff200005000100df5ac3f5"], 0x1c}}, 0x0) 09:37:26 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:26 executing program 5: getsockopt$bt_BT_FLUSHABLE(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r0) setsockopt$bt_BT_CHANNEL_POLICY(0xffffffffffffffff, 0x112, 0xa, 0x0, 0x0) socket$inet6_sctp(0xa, 0xa, 0x84) bind$unix(0xffffffffffffffff, &(0x7f00000006c0)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(0xffffffffffffffff, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x0) 09:37:26 executing program 2: r0 = socket(0x1e, 0x5, 0x0) r1 = socket(0x1e, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind(r1, &(0x7f0000d80f80)=@generic={0x1e, "0103000000000000000000000000000009a979f321b30c7bc8790405c7bad62e0a43a632ed4938d36d73fb8f8401a3ff59829a2b0afe7ce43a4b2470a0c5216669ca021f6f65dcf160e7e58f358c0002f0000158d19bcb31f1314a8ef151622ca5bdb9c8ead2000077aeb81c90001d6d7c980ee590c8b9f70dc136cb184a"}, 0x80) connect$tipc(r0, &(0x7f0000000000)=@name, 0x10) close(r1) 09:37:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x9, 0x3f}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2b, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/.yz1\x00', 0x1ff) r1 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000005c0)={0xfe, "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"}) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x5452, 0x0) write(0xffffffffffffffff, &(0x7f0000000280), 0x0) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x50) 09:37:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:26 executing program 2: [ 1765.440123] protocol 88fb is buggy, dev hsr_slave_0 [ 1765.445243] protocol 88fb is buggy, dev hsr_slave_1 [ 1765.450391] protocol 88fb is buggy, dev hsr_slave_0 [ 1765.450481] protocol 88fb is buggy, dev hsr_slave_0 [ 1765.455437] protocol 88fb is buggy, dev hsr_slave_1 [ 1765.460651] protocol 88fb is buggy, dev hsr_slave_1 09:37:29 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:29 executing program 2: 09:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:29 executing program 5: 09:37:29 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:29 executing program 2: 09:37:29 executing program 5: 09:37:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:29 executing program 2: 09:37:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:29 executing program 5: 09:37:29 executing program 2: [ 1769.680133] net_ratelimit: 24 callbacks suppressed [ 1769.680139] protocol 88fb is buggy, dev hsr_slave_0 [ 1769.690186] protocol 88fb is buggy, dev hsr_slave_1 [ 1770.880125] protocol 88fb is buggy, dev hsr_slave_0 [ 1770.885209] protocol 88fb is buggy, dev hsr_slave_1 [ 1770.890423] protocol 88fb is buggy, dev hsr_slave_0 [ 1770.895459] protocol 88fb is buggy, dev hsr_slave_1 09:37:32 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:32 executing program 5: 09:37:32 executing program 2: 09:37:32 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x6) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:32 executing program 2: 09:37:32 executing program 5: 09:37:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb856) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) [ 1771.155789] audit: type=1400 audit(1576921052.307:307): avc: denied { name_bind } for pid=23929 comm="syz-executor.2" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 [ 1771.203392] audit: type=1400 audit(1576921052.307:308): avc: denied { node_bind } for pid=23929 comm="syz-executor.2" src=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:node_t:s0 tclass=dccp_socket permissive=1 [ 1771.227182] audit: type=1400 audit(1576921052.307:309): avc: denied { name_connect } for pid=23929 comm="syz-executor.2" dest=20003 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:port_t:s0 tclass=dccp_socket permissive=1 09:37:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:32 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0x1}) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) getsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000580)=""/143, &(0x7f0000000340)=0xfee5) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340), &(0x7f0000000380)=0x14) setsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000480)={0x0, @rand_addr, @local}, 0xc) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000000000/0x1000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb, 0x0, 0x0, 0x0, 0x400000000000000]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYRES16=0x0], 0x1}}, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 09:37:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 1771.680171] protocol 88fb is buggy, dev hsr_slave_0 [ 1771.685310] protocol 88fb is buggy, dev hsr_slave_1 [ 1771.690088] protocol 88fb is buggy, dev hsr_slave_0 [ 1771.695495] protocol 88fb is buggy, dev hsr_slave_1 09:37:35 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:35 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) listen(r0, 0x5eb856) r1 = socket$inet_dccp(0x2, 0x6, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e23}, 0x10) r2 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg(r2, &(0x7f0000000c00), 0x4000000000001e6, 0x0) 09:37:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:35 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003400000034000000060000000400000000000081238b670000000000000000010000ffff0400000000000000010000850200000004000000020000000000000100000000da003ed9aed616aa94f92417f9e857d1d45b54da920bfbed77cff360afa7996df6a1309418eec5f97cebdc661626027c1bb39852ffbb5b1884c5"], &(0x7f0000000340)=""/142, 0x52, 0x8e, 0x8}, 0x20) 09:37:35 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:35 executing program 5: syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x106}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x111}}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r1, r0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000300)={0x0, 'gre0\x00', {}, 0x4}) r2 = socket$inet6_sctp(0xa, 0x0, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000040)={0x0, 0xc}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000100)={r3, 0x78, &(0x7f0000000240)=[@in={0x2, 0x4e22, @multicast2}, @in={0x2, 0x800, @loopback}, @in6={0xa, 0x4e23, 0x7, @loopback, 0x3}, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1f}}, @in6={0xa, 0x4e23, 0x800, @dev={0xfe, 0x80, [], 0x23}, 0xfffffffd}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f00000002c0)=0x10) 09:37:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = gettid() kcmp(r0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000540)='{\\\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:35 executing program 2: creat(&(0x7f0000000000)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000001ed80af8eac1dd8f9f13267fcc84064d4d894cd138e9111bd73a04344cfbd4a897cb1a11bbfed987f63d419d9dd369c911742613ec8526c677070a5345dba79876e9cd5b379e6065d66fd2166d8ba8b863a2f0bc4935e69c63f88c04da48ae71000000000000ecff00000000000000", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000002c0)={r2}, 0xc) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x0) close(r0) socket$netlink(0x10, 0x3, 0xa) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000180)='security.ima\x00', &(0x7f0000001540)=@sha1={0x1, "4990e1caa1dfe5d67ec774b73ffd5a00100f49d9"}, 0x15, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x100) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) flistxattr(r4, &(0x7f0000000340)=""/212, 0xd4) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r5, 0x208200) sendfile(r0, r3, 0x0, 0x8000fffffffe) [ 1774.250671] gfs2: not a GFS2 filesystem 09:37:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) [ 1774.357372] audit: type=1804 audit(1576921055.507:310): pid=23988 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir829485223/syzkaller.TSPxZ4/1951/bus" dev="sda1" ino=16901 res=1 [ 1774.424101] gfs2: not a GFS2 filesystem [ 1774.455579] audit: type=1804 audit(1576921055.557:311): pid=23988 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir829485223/syzkaller.TSPxZ4/1951/bus" dev="sda1" ino=16901 res=1 [ 1774.488155] audit: type=1400 audit(1576921055.557:312): avc: denied { write } for pid=23987 comm="syz-executor.2" path="socket:[252593]" dev="sockfs" ino=252593 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 1775.050526] net_ratelimit: 16 callbacks suppressed [ 1775.050582] protocol 88fb is buggy, dev hsr_slave_0 [ 1775.060965] protocol 88fb is buggy, dev hsr_slave_1 [ 1775.066982] protocol 88fb is buggy, dev hsr_slave_0 [ 1775.072394] protocol 88fb is buggy, dev hsr_slave_1 [ 1775.135291] audit: type=1804 audit(1576921056.287:313): pid=23993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir829485223/syzkaller.TSPxZ4/1951/bus" dev="sda1" ino=16901 res=1 [ 1775.162192] audit: type=1804 audit(1576921056.297:314): pid=23993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="open_writers" comm="syz-executor.2" name="/root/syzkaller-testdir829485223/syzkaller.TSPxZ4/1951/bus" dev="sda1" ino=16901 res=1 [ 1775.189477] audit: type=1804 audit(1576921056.297:315): pid=23993 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.2" name="/root/syzkaller-testdir829485223/syzkaller.TSPxZ4/1951/bus" dev="sda1" ino=16901 res=1 [ 1775.840124] protocol 88fb is buggy, dev hsr_slave_0 [ 1775.840152] protocol 88fb is buggy, dev hsr_slave_0 [ 1775.845230] protocol 88fb is buggy, dev hsr_slave_1 [ 1775.850290] protocol 88fb is buggy, dev hsr_slave_1 [ 1775.855362] protocol 88fb is buggy, dev hsr_slave_0 [ 1775.865358] protocol 88fb is buggy, dev hsr_slave_1 09:37:38 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xc) 09:37:38 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x737}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(r2) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) write$FUSE_WRITE(r4, &(0x7f0000000400)={0x18, 0x0, 0x2, {0x9}}, 0x18) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r7, 0x0, 0x0) r8 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f00000008c0)="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", 0x10b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r8, r9, r8}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) 09:37:38 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x737}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(r2) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) write$FUSE_WRITE(r4, &(0x7f0000000400)={0x18, 0x0, 0x2, {0x9}}, 0x18) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r7, 0x0, 0x0) r8 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f00000008c0)="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", 0x10b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r8, r9, r8}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) 09:37:38 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:38 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xfffffff8, 0xffff93d7, 0x1c, 0x400, 0x3}, 0x14) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0xd, &(0x7f000095dff8), &(0x7f0000000180)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1b, 0x8008, 0x0, 0x2, r4}, &(0x7f0000000140)=0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8e, 0x10, 0xfffffffffffffff9, 0x3}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={r4, 0x5203, 0xff, 0x5, 0xbe5, 0x6, 0x8001, 0x0, {r8, @in6={{0xa, 0x4e22, 0x1f, @mcast1, 0x15}}, 0x99b, 0x4, 0xfffffc01, 0x4, 0x3}}, &(0x7f00000002c0)=0xb0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r1, 0x0, 0x0) 09:37:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:38 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000000580), 0x1, 0x40, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r9 = socket$inet(0x10, 0x2, 0x0) r10 = dup(r9) sendfile(r10, r8, &(0x7f0000000040)=0x103000, 0x8001) r11 = openat$cgroup_ro(r10, &(0x7f0000000580)='cpuacct.usage_all\x00', 0x7a05, 0x1700) gettid() write$cgroup_pid(r11, 0x0, 0x0) r12 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r13 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r12, r13, r12}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r14, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) 09:37:38 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x737}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x10, 0x2, 0x0) r5 = dup(r2) sendfile(r5, r4, &(0x7f0000000040)=0x103000, 0x8001) write$FUSE_WRITE(r4, &(0x7f0000000400)={0x18, 0x0, 0x2, {0x9}}, 0x18) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r6, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r7, 0x0, 0x0) r8 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r9 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f00000008c0)="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", 0x10b, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r8, r9, r8}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r10 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) [ 1777.625371] sctp: [Deprecated]: syz-executor.3 (pid 24035) Use of int in maxseg socket option. [ 1777.625371] Use struct sctp_assoc_value instead [ 1777.656561] selinux_nlmsg_perm: 6 callbacks suppressed [ 1777.656569] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.679354] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.695516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.708818] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.722433] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.739128] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.753186] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24036 comm=syz-executor.3 [ 1777.768413] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24047 comm=syz-executor.2 [ 1777.782629] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24047 comm=syz-executor.2 [ 1777.791319] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24048 comm=syz-executor.2 09:37:39 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r5, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r7, r6}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) ioctl$KVM_X86_SET_MCE(r9, 0x4040ae9e, &(0x7f0000000400)={0x9008b349eb4cd467, 0x1000, 0x5, 0x2, 0x5}) 09:37:39 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r5, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r7, r6}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) ioctl$KVM_X86_SET_MCE(r9, 0x4040ae9e, &(0x7f0000000400)={0x9008b349eb4cd467, 0x1000, 0x5, 0x2, 0x5}) [ 1780.090192] net_ratelimit: 24 callbacks suppressed [ 1780.090198] protocol 88fb is buggy, dev hsr_slave_0 [ 1780.100393] protocol 88fb is buggy, dev hsr_slave_1 09:37:41 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:41 executing program 5: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r5, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r7, r6}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) ioctl$KVM_X86_SET_MCE(r9, 0x4040ae9e, &(0x7f0000000400)={0x9008b349eb4cd467, 0x1000, 0x5, 0x2, 0x5}) 09:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:41 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:41 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xfffffff8, 0xffff93d7, 0x1c, 0x400, 0x3}, 0x14) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0xd, &(0x7f000095dff8), &(0x7f0000000180)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1b, 0x8008, 0x0, 0x2, r4}, &(0x7f0000000140)=0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8e, 0x10, 0xfffffffffffffff9, 0x3}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={r4, 0x5203, 0xff, 0x5, 0xbe5, 0x6, 0x8001, 0x0, {r8, @in6={{0xa, 0x4e22, 0x1f, @mcast1, 0x15}}, 0x99b, 0x4, 0xfffffc01, 0x4, 0x3}}, &(0x7f00000002c0)=0xb0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1780.249957] sctp: [Deprecated]: syz-executor.3 (pid 24086) Use of int in maxseg socket option. [ 1780.249957] Use struct sctp_assoc_value instead 09:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r6 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r8 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r9 = gettid() r10 = gettid() kcmp(r10, r10, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r10, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r9, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r8, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r7, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r11}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r6, 0x0, 0x1, &(0x7f0000000000)='\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r11}, 0x30) r12 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r12, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r13 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r15 = accept$alg(r14, 0x0, 0x0) dup(r15) r16 = getpid() r17 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r19 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r19, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r20 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r20, 0x0, 0x0) r21 = getpgrp(0x0) ptrace$getregs(0xe, r21, 0x9, &(0x7f00000001c0)=""/68) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r23 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r23, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r25) ptrace$setopts(0x4206, r25, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r20, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r19, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r18, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r17, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r13, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r12, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r11}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r11}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r11}, 0xc) 09:37:42 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r4, 0xc004743e, &(0x7f0000000100)=""/246) clone(0x1103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00\n\x05\xb0\xc3\xffc\x1f$\xb4m\xe1\x01\xfc\xff\xff\xd82R\xaf0\'\xe6\x96\x9f\xa5\xeb]]\'HP\xf8\x9bG\xb3\xfc^\xb6\xe8\x8f\xbf\x9a\xea\x9e\x8a\xb0)N\xcb\xcc\n\xcc\x03\x9ca\x90', 0x7a05, 0x1700) gettid() write$cgroup_pid(r5, 0x0, 0x0) r6 = add_key$user(&(0x7f0000000380)='user\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f00000005c0)="c2fc67ed1ea1925741a9460e74bf1d34ea634e26506b8ba724d6193ab0a5544ed087323b39fd673ff4be008a197896480167bfeaf6ce3fac3966788fe9633b19c55d93a7685a67e688c2d40a6b1f94128d5848203747c0be926c6bf109a79df1cf443ba6b0df0fc7f67601679f0188e02dc00000e091202beb8ac2bdc2357b21d94dcadb28a27ae6f00d19f5379791729df4a3159ccd425490eca871aec84935fc62de9992840000", 0xa8, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) ioctl$SG_SET_COMMAND_Q(r5, 0x2271, &(0x7f0000000400)=0x1) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r7, r6}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) add_key(&(0x7f0000000540)='pkcs7_test\x00', &(0x7f0000000880)={'syz', 0x1}, 0x0, 0x275, 0xfffffffffffffffe) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x2000000000000074, 0x4) bind$inet(r2, &(0x7f0000000280)={0x2, 0x5e23, @multicast1}, 0xfffffffffffffc46) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/qat_adf_ctl\x00', 0x80040, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) [ 1781.280116] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.285245] protocol 88fb is buggy, dev hsr_slave_1 [ 1781.290354] protocol 88fb is buggy, dev hsr_slave_0 [ 1781.295421] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.080150] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.085283] protocol 88fb is buggy, dev hsr_slave_1 [ 1782.090101] protocol 88fb is buggy, dev hsr_slave_0 [ 1782.095404] protocol 88fb is buggy, dev hsr_slave_1 09:37:44 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r7 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r9 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = gettid() r11 = gettid() kcmp(r11, r11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r8, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r7, 0x0, 0x1, &(0x7f0000000000)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r12}, 0x30) r13 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r13, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r14 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r16 = accept$alg(r15, 0x0, 0x0) dup(r16) r17 = getpid() r18 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r26) ptrace$setopts(0x4206, r26, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r23, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r19, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r18, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r14, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r13, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) 09:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r7 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r9 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = gettid() r11 = gettid() kcmp(r11, r11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r8, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r7, 0x0, 0x1, &(0x7f0000000000)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r12}, 0x30) r13 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r13, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r14 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r16 = accept$alg(r15, 0x0, 0x0) dup(r16) r17 = getpid() r18 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r26) ptrace$setopts(0x4206, r26, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r23, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r19, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r18, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r14, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r13, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) 09:37:44 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:44 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080)={0xfffffff8, 0xffff93d7, 0x1c, 0x400, 0x3}, 0x14) r2 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r2, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r3 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0xd, &(0x7f000095dff8), &(0x7f0000000180)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r1, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0x1b, 0x8008, 0x0, 0x2, r4}, &(0x7f0000000140)=0x10) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r5, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x8e, 0x10, 0xfffffffffffffff9, 0x3}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={r4, 0x5203, 0xff, 0x5, 0xbe5, 0x6, 0x8001, 0x0, {r8, @in6={{0xa, 0x4e22, 0x1f, @mcast1, 0x15}}, 0x99b, 0x4, 0xfffffc01, 0x4, 0x3}}, &(0x7f00000002c0)=0xb0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r1, 0x0, 0x0) [ 1783.238092] selinux_nlmsg_perm: 86 callbacks suppressed [ 1783.238104] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24125 comm=syz-executor.5 [ 1783.247709] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24128 comm=syz-executor.2 [ 1783.281363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24125 comm=syz-executor.5 [ 1783.309011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24128 comm=syz-executor.2 [ 1783.328130] sctp: [Deprecated]: syz-executor.3 (pid 24137) Use of int in maxseg socket option. [ 1783.328130] Use struct sctp_assoc_value instead [ 1783.330127] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24125 comm=syz-executor.5 [ 1783.344109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24128 comm=syz-executor.2 [ 1783.359664] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24125 comm=syz-executor.5 [ 1783.372576] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24138 comm=syz-executor.3 [ 1783.393813] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24138 comm=syz-executor.3 [ 1783.396707] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24125 comm=syz-executor.5 09:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r7 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r9 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = gettid() r11 = gettid() kcmp(r11, r11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r8, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r7, 0x0, 0x1, &(0x7f0000000000)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r12}, 0x30) r13 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r13, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r14 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r16 = accept$alg(r15, 0x0, 0x0) dup(r16) r17 = getpid() r18 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r26) ptrace$setopts(0x4206, r26, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r23, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r19, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r18, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r14, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r13, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) 09:37:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r7 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r9 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r10 = gettid() r11 = gettid() kcmp(r11, r11, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r10, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r9, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r8, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r12}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r7, 0x0, 0x1, &(0x7f0000000000)='\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r12}, 0x30) r13 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r13, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r14 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r16 = accept$alg(r15, 0x0, 0x0) dup(r16) r17 = getpid() r18 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r20 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r20, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r21 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r21, 0x0, 0x0) r22 = getpgrp(0x0) ptrace$getregs(0xe, r22, 0x9, &(0x7f00000001c0)=""/68) r23 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r24 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r24, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r26) ptrace$setopts(0x4206, r26, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r23, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r21, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r20, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r19, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r18, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r17, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r14, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r13, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r12}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r12}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r12}, 0xc) 09:37:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r7, 0x13) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r8 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r10 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r11 = gettid() r12 = gettid() kcmp(r12, r12, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r12, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r9, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r13}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r8, 0x0, 0x1, &(0x7f0000000000)='\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r13}, 0x30) r14 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r14, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r16 = socket$alg(0x26, 0x5, 0x0) bind$alg(r16, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r17 = accept$alg(r16, 0x0, 0x0) dup(r17) r18 = getpid() r19 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r21 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r21, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r22 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r22, 0x0, 0x0) r23 = getpgrp(0x0) ptrace$getregs(0xe, r23, 0x9, &(0x7f00000001c0)=""/68) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r26, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r27 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r27) ptrace$setopts(0x4206, r27, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r22, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r21, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r19, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r18, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r15, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r14, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r13}, 0xc) 09:37:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000000200)=[{&(0x7f0000000340)=""/131, 0x83}], 0x1, &(0x7f0000000a80)=[{&(0x7f0000000480)=""/126, 0x7e}, {0x0}, {0x0}], 0x3, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_FONT(r2, 0x4b61, &(0x7f0000000000)="6082fa6b645dbef5ed416d42a6ae3922208334fe5a0bddb2b7e7e6d024f4b1f045900aa0f193") r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r7, 0x13) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}}}, 0x120) getpid() r8 = syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) r10 = getpid() sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r11 = gettid() r12 = gettid() kcmp(r12, r12, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r12, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r11, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r10, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r9, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r13}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r13}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r8, 0x0, 0x1, &(0x7f0000000000)='\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r13}, 0x30) r14 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r14, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) r15 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f0000000040)='clear_refs\x00') r16 = socket$alg(0x26, 0x5, 0x0) bind$alg(r16, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) r17 = accept$alg(r16, 0x0, 0x0) dup(r17) r18 = getpid() r19 = getpid() pipe2(&(0x7f0000000140), 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0), 0x9d, 0x8}}, 0x20) r20 = getpid() sched_setattr(r20, &(0x7f0000000040)={0x30}, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r21 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r21, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r22 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r22, 0x0, 0x0) r23 = getpgrp(0x0) ptrace$getregs(0xe, r23, 0x9, &(0x7f00000001c0)=""/68) r24 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') gettid() r25 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r25, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r26 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r26, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r27 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r27) ptrace$setopts(0x4206, r27, 0x0, 0x0) syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r24, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, r22, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r21, 0x0, 0x5, &(0x7f0000000080)='em0-\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r20, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r19, 0xffffffffffffffff, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r18, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r15, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r14, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00'}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0), 0xffffffffffffff93) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r13}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r13}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r13}, 0xc) 09:37:45 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffffffffff4c, 0x2, 0x87, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) socket(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000180)) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000400)) 09:37:45 executing program 5 (fault-call:18 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1785.450122] net_ratelimit: 16 callbacks suppressed [ 1785.450126] protocol 88fb is buggy, dev hsr_slave_0 [ 1785.460195] protocol 88fb is buggy, dev hsr_slave_1 [ 1785.465284] protocol 88fb is buggy, dev hsr_slave_0 [ 1785.470373] protocol 88fb is buggy, dev hsr_slave_1 09:37:47 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffbdf9, 0x0, 0x0, 0x10000c) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:47 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffffffffff4c, 0x2, 0x87, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) socket(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000180)) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000400)) 09:37:47 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1786.240108] protocol 88fb is buggy, dev hsr_slave_0 [ 1786.240169] protocol 88fb is buggy, dev hsr_slave_0 [ 1786.245310] protocol 88fb is buggy, dev hsr_slave_1 [ 1786.250330] protocol 88fb is buggy, dev hsr_slave_1 [ 1786.255379] protocol 88fb is buggy, dev hsr_slave_0 [ 1786.265412] protocol 88fb is buggy, dev hsr_slave_1 09:37:47 executing program 3 (fault-call:3 fault-nth:0): clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:37:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r3, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:47 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000040)={0x7, 0x800, 0xe0000000, 0x81000}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000080)) 09:37:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0xd9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x26c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) r2 = socket$inet(0x10, 0x6, 0x0) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) write$binfmt_script(r3, 0x0, 0xfffffffffffffee3) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:47 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000000)) 09:37:48 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, r1}, 0x0, 0x1, 0x0, 0x0, 0x1000000000, 0x10001, 0x0, 0x4}) 09:37:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xb01611d5c9d45e27) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) r3 = syz_open_procfs(r1, &(0x7f0000000000)='net/netstat\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r3, 0x0, 0xfd1f) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r4, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:50 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:50 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = msgget(0x3, 0x6be) msgrcv(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000080000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004b9fdbdd440463bf0000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"/238], 0xee, 0x7, 0x1000) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:37:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r4 = gettid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r13 = socket$inet(0x10, 0x2, 0x0) r14 = dup(r13) sendfile(r14, r12, &(0x7f0000000040)=0x103000, 0x8001) r15 = socket$inet(0x10, 0x2, 0x0) dup(r15) dup(r15) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r16 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r16, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x40000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r17 = getpid() sched_setattr(r17, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r5, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:50 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0xfffffdaf) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x6}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x2a) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0xffffffffffffff4c, 0x2, 0x87, 0xfffffffc, 0x3, 0x0, 0x0, 0x0, 0x4}, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r7 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r7, &(0x7f00000005c0)=""/223, 0xfc61) socket(0x0, 0x0, 0x0) open(0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, &(0x7f00000000c0)=@can, &(0x7f0000000140)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000180)) ioctl$TIOCSLCKTRMIOS(r6, 0x5457, &(0x7f0000000400)) 09:37:50 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1789.350414] selinux_nlmsg_perm: 110 callbacks suppressed [ 1789.350441] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.372870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.386932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.401895] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.406611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24249 comm=syz-executor.5 [ 1789.416516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.433359] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24249 comm=syz-executor.5 [ 1789.441072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24241 comm=syz-executor.5 [ 1789.457691] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24249 comm=syz-executor.5 [ 1789.465250] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24252 comm=syz-executor.5 09:37:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x272) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0xc7, 0xfd, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x1ba) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) syz_open_procfs(r3, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1790.490115] net_ratelimit: 24 callbacks suppressed [ 1790.490118] protocol 88fb is buggy, dev hsr_slave_0 [ 1790.500383] protocol 88fb is buggy, dev hsr_slave_1 [ 1791.680118] protocol 88fb is buggy, dev hsr_slave_0 [ 1791.685253] protocol 88fb is buggy, dev hsr_slave_1 [ 1791.690381] protocol 88fb is buggy, dev hsr_slave_0 [ 1791.695445] protocol 88fb is buggy, dev hsr_slave_1 09:37:53 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = perf_event_open(0x0, r3, 0x0, r0, 0xe09816979ef2ac62) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r5 = gettid() kcmp(r5, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0xe3, 0x0}, 0x26c) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r4 = gettid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) r12 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r13 = socket$inet(0x10, 0x2, 0x0) r14 = dup(r13) sendfile(r14, r12, &(0x7f0000000040)=0x103000, 0x8001) r15 = socket$inet(0x10, 0x2, 0x0) dup(r15) dup(r15) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r16 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r16, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x40000) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r17 = getpid() sched_setattr(r17, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r5, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:53 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x10001, 0x1c000) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000040)={0x8, 0x2, 0x10003, 0x4, 0x9}, 0x14) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={0x0, 0x10000, 0x9}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000240)={r1, @in6={{0xa, 0x4e21, 0x7, @local, 0x1}}, 0x8, 0x7fff}, 0x90) r2 = msgget$private(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000005d40)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r6, &(0x7f0000005e80)={0x0, 0x0, &(0x7f0000005e40)={&(0x7f00000005c0)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="337900000000000000000700000030000100080002000000000014000300ac141400000000000000000000000000080004000000000008b3a110267222a21a0da19b99b3bd36e32a39cec56cde69f1b185a529d9992f7848c7e2e27aaad392c8c50b674a1eb4d00795600a7c6efd91811fa72cc2bfbfc74a25c3bf2d5739b33df761115ba45de2276fdb7634c76f3f921f26da68668c83e860d76e183bf88ecd49d62a1d4d2f14170adfb0c7c82a7585d1f0da82b779c3ec11155f80c27fa4093d16d4de6faeae6ef8e9efa9b262d451deb3746aef0f4db35b2097b20b4f1d5a00000000abd9bfa5c3f82dab4fc2403d797375bf741bc0ef62"], 0x44}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4200c94}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="2c0c2cbd7000ffdbdf25040000000c000300080083000300000008000400080000000800040001000080"], 0x30}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000180)={0x58004002}) msgrcv(r2, 0x0, 0x0, 0x0, 0x0) getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, r8, 0x40}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800}) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PIO_SCRNMAP(r11, 0x4b41, &(0x7f0000000300)="d077344ba76f579333d403f384bd15d36ea3877e062c21876f4b7e33") r12 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r13 = socket$inet(0x10, 0x2, 0x0) r14 = dup(r13) sendfile(r14, r12, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$sock_linger(r12, 0x1, 0xd, &(0x7f00000004c0)={0x1, 0xffffcba4}, 0x8) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x2002, 0x0) 09:37:53 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1792.427484] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:37:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x4000000}, 0x0, 0x0, 0x101, 0x0, 0x0, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1792.480149] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.485246] protocol 88fb is buggy, dev hsr_slave_1 [ 1792.490098] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.490351] protocol 88fb is buggy, dev hsr_slave_0 [ 1792.565511] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 09:37:54 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:37:54 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) getcwd(&(0x7f0000000100)=""/13, 0xd) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x7664d67d2371d162, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f00000000c0)={0xd, {0x7fffffff, 0x20, 0x8000, 0x138}, {0xff, 0x6, 0x9, 0x9244}, {0x8, 0x7}}) r2 = getpgrp(0x0) setpriority(0x0, r2, 0xff53) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x200000, 0x0) ptrace$cont(0x1f, r2, 0x4, 0x0) ioctl$VIDIOC_DQEVENT(0xffffffffffffffff, 0x80885659, &(0x7f0000000200)={0x0, @src_change}) 09:37:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x4000000000000016, &(0x7f0000000600)) syz_open_dev$cec(0x0, 0x2, 0x2) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0xffffffffffffffff, 0x7, r2, &(0x7f0000000000)={r0, r5, 0x1}) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r6 = gettid() r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r8 = socket$inet(0x10, 0x2, 0x0) r9 = dup(r8) sendfile(r9, r7, &(0x7f0000000040)=0x103000, 0x8001) kcmp(r6, 0xffffffffffffffff, 0x0, r7, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) [ 1792.908042] FAULT_INJECTION: forcing a failure. [ 1792.908042] name failslab, interval 1, probability 0, space 0, times 0 [ 1792.949032] CPU: 0 PID: 24328 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1792.956969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1792.966331] Call Trace: [ 1792.968906] dump_stack+0x142/0x197 [ 1792.972532] should_fail.cold+0x10f/0x159 [ 1792.976679] should_failslab+0xdb/0x130 [ 1792.980634] kmem_cache_alloc_node+0x287/0x780 [ 1792.985204] ? get_pid_task+0x98/0x140 [ 1792.989083] copy_process.part.0+0x17d5/0x6a70 [ 1792.993659] ? debug_smp_processor_id+0x1c/0x20 [ 1792.998305] ? perf_trace_lock+0x109/0x500 [ 1793.002518] ? check_preemption_disabled+0x3c/0x250 [ 1793.007513] ? save_trace+0x290/0x290 [ 1793.011297] ? SOFTIRQ_verbose+0x10/0x10 [ 1793.015348] ? debug_smp_processor_id+0x1c/0x20 [ 1793.020007] ? __f_unlock_pos+0x19/0x20 [ 1793.023969] ? find_held_lock+0x35/0x130 [ 1793.028011] ? __cleanup_sighand+0x50/0x50 [ 1793.032222] ? lock_downgrade+0x740/0x740 [ 1793.036363] _do_fork+0x19e/0xce0 [ 1793.039811] ? fork_idle+0x280/0x280 [ 1793.043516] ? fput+0xd4/0x150 [ 1793.046688] ? SyS_write+0x15e/0x230 [ 1793.050388] SyS_clone+0x37/0x50 [ 1793.053734] ? sys_vfork+0x30/0x30 [ 1793.057274] do_syscall_64+0x1e8/0x640 [ 1793.061143] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1793.065968] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1793.071138] RIP: 0033:0x45a919 [ 1793.074313] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1793.082098] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1793.089347] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 09:37:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x1) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:54 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1793.096597] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1793.103860] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1793.111108] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1793.189706] FAULT_INJECTION: forcing a failure. [ 1793.189706] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1793.202303] CPU: 0 PID: 24345 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1793.210203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1793.219557] Call Trace: [ 1793.222154] dump_stack+0x142/0x197 [ 1793.225799] should_fail.cold+0x10f/0x159 [ 1793.229954] ? __might_sleep+0x93/0xb0 [ 1793.233854] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1793.238530] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1793.243545] ? rcu_read_lock_sched_held+0x110/0x130 [ 1793.243570] copy_process.part.0+0x26a/0x6a70 [ 1793.243581] ? debug_smp_processor_id+0x1c/0x20 [ 1793.243593] ? perf_trace_lock+0x109/0x500 [ 1793.253078] ? check_preemption_disabled+0x3c/0x250 [ 1793.253089] ? save_trace+0x290/0x290 [ 1793.253101] ? SOFTIRQ_verbose+0x10/0x10 [ 1793.253109] ? debug_smp_processor_id+0x1c/0x20 [ 1793.253121] ? __f_unlock_pos+0x19/0x20 [ 1793.253131] ? find_held_lock+0x35/0x130 [ 1793.253147] ? __cleanup_sighand+0x50/0x50 [ 1793.253159] ? lock_downgrade+0x740/0x740 [ 1793.295873] _do_fork+0x19e/0xce0 [ 1793.299312] ? fork_idle+0x280/0x280 [ 1793.303019] ? fput+0xd4/0x150 [ 1793.306193] ? SyS_write+0x15e/0x230 [ 1793.309891] SyS_clone+0x37/0x50 [ 1793.313251] ? sys_vfork+0x30/0x30 [ 1793.316776] do_syscall_64+0x1e8/0x640 [ 1793.320642] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1793.325487] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1793.330665] RIP: 0033:0x45a919 [ 1793.333844] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1793.341558] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1793.348814] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1793.356063] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1793.363355] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1793.370617] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:37:56 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() kcmp(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:56 executing program 2 (fault-call:3 fault-nth:2): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:37:56 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$IMGETVERSION(r0, 0x80044942, &(0x7f0000000000)) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:37:56 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:56 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1795.452906] FAULT_INJECTION: forcing a failure. [ 1795.452906] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1795.459173] selinux_nlmsg_perm: 118 callbacks suppressed [ 1795.459184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.464746] CPU: 1 PID: 24362 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1795.464754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1795.464758] Call Trace: [ 1795.464782] dump_stack+0x142/0x197 [ 1795.464799] should_fail.cold+0x10f/0x159 [ 1795.464816] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1795.464827] ? ____cache_alloc_node+0x162/0x1d0 [ 1795.464842] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1795.464851] ? ____cache_alloc_node+0x162/0x1d0 [ 1795.464873] cache_grow_begin+0x80/0x400 [ 1795.464887] ____cache_alloc_node+0x17c/0x1d0 [ 1795.464901] kmem_cache_alloc_node+0xe3/0x780 [ 1795.464911] ? get_pid_task+0x98/0x140 [ 1795.464930] copy_process.part.0+0x17d5/0x6a70 [ 1795.464948] ? debug_smp_processor_id+0x1c/0x20 [ 1795.473167] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.482446] ? perf_trace_lock+0x109/0x500 [ 1795.482458] ? check_preemption_disabled+0x3c/0x250 [ 1795.482468] ? save_trace+0x290/0x290 [ 1795.482478] ? SOFTIRQ_verbose+0x10/0x10 [ 1795.482487] ? debug_smp_processor_id+0x1c/0x20 [ 1795.482496] ? __f_unlock_pos+0x19/0x20 [ 1795.482507] ? find_held_lock+0x35/0x130 [ 1795.501826] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.502390] ? __cleanup_sighand+0x50/0x50 [ 1795.502403] ? lock_downgrade+0x740/0x740 [ 1795.502417] _do_fork+0x19e/0xce0 [ 1795.521051] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.524495] ? fork_idle+0x280/0x280 [ 1795.524511] ? fput+0xd4/0x150 [ 1795.524521] ? SyS_write+0x15e/0x230 09:37:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x20) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x28c) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:56 executing program 2 (fault-call:3 fault-nth:3): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1795.532508] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.533222] SyS_clone+0x37/0x50 [ 1795.533230] ? sys_vfork+0x30/0x30 [ 1795.533244] do_syscall_64+0x1e8/0x640 [ 1795.533252] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.533270] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1795.541930] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.542221] RIP: 0033:0x45a919 [ 1795.549445] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.550646] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1795.550659] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1795.550666] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1795.550672] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1795.550678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1795.550684] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1795.646974] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24361 comm=syz-executor.3 [ 1795.696582] FAULT_INJECTION: forcing a failure. [ 1795.696582] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1795.746861] CPU: 0 PID: 24380 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1795.761369] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1795.761375] Call Trace: [ 1795.761391] dump_stack+0x142/0x197 [ 1795.761409] should_fail.cold+0x10f/0x159 [ 1795.761419] ? __might_sleep+0x93/0xb0 [ 1795.761434] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1795.761448] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1795.761458] ? ____cache_alloc_node+0x1be/0x1d0 [ 1795.761469] ? cache_grow_begin+0x335/0x400 [ 1795.761484] cache_grow_begin+0x80/0x400 [ 1795.814328] ? __cpuset_node_allowed+0xff/0x450 [ 1795.823286] fallback_alloc+0x1fd/0x2c0 [ 1795.823301] ____cache_alloc_node+0x1be/0x1d0 [ 1795.823314] kmem_cache_alloc_node+0xe3/0x780 [ 1795.823323] ? get_pid_task+0x98/0x140 [ 1795.823341] copy_process.part.0+0x17d5/0x6a70 [ 1795.854467] ? debug_smp_processor_id+0x1c/0x20 [ 1795.854479] ? perf_trace_lock+0x109/0x500 [ 1795.854491] ? check_preemption_disabled+0x3c/0x250 [ 1795.863369] ? save_trace+0x290/0x290 [ 1795.863381] ? SOFTIRQ_verbose+0x10/0x10 [ 1795.863389] ? debug_smp_processor_id+0x1c/0x20 [ 1795.863401] ? __f_unlock_pos+0x19/0x20 [ 1795.884874] ? find_held_lock+0x35/0x130 [ 1795.888949] ? __cleanup_sighand+0x50/0x50 [ 1795.893191] ? lock_downgrade+0x740/0x740 [ 1795.897376] _do_fork+0x19e/0xce0 [ 1795.900840] ? fork_idle+0x280/0x280 [ 1795.904561] ? fput+0xd4/0x150 [ 1795.907816] ? SyS_write+0x15e/0x230 [ 1795.911534] SyS_clone+0x37/0x50 [ 1795.914887] ? sys_vfork+0x30/0x30 [ 1795.921740] do_syscall_64+0x1e8/0x640 [ 1795.925643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1795.930533] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1795.935719] RIP: 0033:0x45a919 [ 1795.938893] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1795.946593] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:37:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1795.953868] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1795.961135] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1795.961142] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1795.961148] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1795.961423] net_ratelimit: 16 callbacks suppressed [ 1795.961429] protocol 88fb is buggy, dev hsr_slave_0 [ 1795.975786] protocol 88fb is buggy, dev hsr_slave_1 [ 1795.975872] protocol 88fb is buggy, dev hsr_slave_0 09:37:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xf, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000280)={0x38, 0x2, 0x0, 0x0, 0x9, 0x4000000}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x75e9753affa6c253, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r3, r4, 0x0, 0x17, &(0x7f0000000000)='mime_typenodevsecurity\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r2, r1, 0x0, 0x5, &(0x7f0000000180)='user\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000200)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000140)={r7}, 0xfffffffffffffebc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0xa9) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r8 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r8, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffc9f) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:57 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x4000, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/\x1b\x89\x00\x04\x00\x00$\xc6encer\x00', 0x400000, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000280)=0x7e) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, &(0x7f00000000c0)={0x8, 0xffff, 0x0, 'queue1\x00', 0xffff}) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = dup(0xffffffffffffffff) sendfile(r6, r5, &(0x7f0000000040)=0x103000, 0x8001) r7 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x1) open_by_handle_at(r7, &(0x7f0000000240)=ANY=[@ANYBLOB="2600000076450f74eae42562abf14dd0c34a79f3b16404d62952828c8e0ded5b34757dae796c"], 0x400003) tee(r5, 0xffffffffffffffff, 0xffe000, 0x8) 09:37:57 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1796.003122] protocol 88fb is buggy, dev hsr_slave_1 09:37:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:57 executing program 2 (fault-call:3 fault-nth:4): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1796.038381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24394 comm=syz-executor.3 09:37:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = fcntl$getown(r2, 0x9) r4 = getpgrp(r3) ptrace$getregs(0xffffffffffffffff, r4, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1796.082987] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24394 comm=syz-executor.3 [ 1796.093425] FAULT_INJECTION: forcing a failure. [ 1796.093425] name failslab, interval 1, probability 0, space 0, times 0 09:37:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1796.189075] CPU: 1 PID: 24403 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1796.197112] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1796.206488] Call Trace: [ 1796.209089] dump_stack+0x142/0x197 [ 1796.212746] should_fail.cold+0x10f/0x159 [ 1796.216912] should_failslab+0xdb/0x130 [ 1796.220896] kmem_cache_alloc+0x2d7/0x780 [ 1796.225053] ? retire_userns_sysctls+0x90/0x90 [ 1796.229636] ? kmemdup+0x47/0x60 [ 1796.233009] create_user_ns+0x3ce/0xcd0 [ 1796.236997] copy_creds+0x3e9/0x4f0 [ 1796.240630] ? lockdep_init_map+0x9/0x10 [ 1796.244705] copy_process.part.0+0x868/0x6a70 [ 1796.249208] ? debug_smp_processor_id+0x1c/0x20 [ 1796.253882] ? perf_trace_lock+0x109/0x500 [ 1796.258117] ? check_preemption_disabled+0x3c/0x250 [ 1796.263134] ? save_trace+0x290/0x290 [ 1796.266942] ? SOFTIRQ_verbose+0x10/0x10 [ 1796.271006] ? debug_smp_processor_id+0x1c/0x20 [ 1796.275693] ? __f_unlock_pos+0x19/0x20 [ 1796.279684] ? __cleanup_sighand+0x50/0x50 [ 1796.283928] ? lock_downgrade+0x740/0x740 [ 1796.283946] _do_fork+0x19e/0xce0 [ 1796.283960] ? fork_idle+0x280/0x280 [ 1796.291747] ? fput+0xd4/0x150 [ 1796.298626] ? SyS_write+0x15e/0x230 [ 1796.302347] SyS_clone+0x37/0x50 [ 1796.305715] ? sys_vfork+0x30/0x30 [ 1796.309264] do_syscall_64+0x1e8/0x640 [ 1796.313148] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1796.317998] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1796.323184] RIP: 0033:0x45a919 [ 1796.326375] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:37:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) r1 = getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffc5f) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(r1) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1796.334082] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1796.341351] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1796.348613] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1796.355868] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1796.363160] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1796.640102] protocol 88fb is buggy, dev hsr_slave_0 [ 1796.640105] protocol 88fb is buggy, dev hsr_slave_0 [ 1796.640146] protocol 88fb is buggy, dev hsr_slave_1 [ 1796.645287] protocol 88fb is buggy, dev hsr_slave_1 [ 1796.660374] protocol 88fb is buggy, dev hsr_slave_0 [ 1796.665485] protocol 88fb is buggy, dev hsr_slave_1 09:37:59 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:37:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r7, 0x13) syz_open_procfs(r7, &(0x7f0000000040)='clear_refs\x00') r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, 0x0, 0x0) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(r10, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)}}], 0x1, 0x0, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r12 = getpid() r13 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r14, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "dc1d54e7641beb38089f0e220e5edb2656270a0adebb9653f9040bf0d60e3af6b32427b5e67c8cdf24321be0aeea1ccadcf7764dda5108ef3de9e548d063615835cb5a1be972938273709fb96c738bfe20735c851421652d688f8e4f592d0995e54dac979b265d4728f428c080e52f925ad7f01da579d10faab42de4b5aafe3c08d4751293854e5f1d25492a618ee41fd2c4d1568d54d44ebfceff8450414efaceaa9ec29fcdb8a871f512bc898e32b665ec1786c072a2121f2652d985852df3ed3daa9619cd0e39f00e8855ac0a1e2f80254b5ac0e9c2339f9b929d11117cc8579eb67af894e334a861f9272403a31398cce99035ec27d069df011fc27ef9f2", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r15}}, 0x120) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30}, 0x0) r17 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r17, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r18 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r19 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r19, 0x0, 0x0) r20 = getpgrp(0x0) waitid(0x0, r20, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r20, 0x9, &(0x7f00000001c0)=""/68) r21 = getpgid(r20) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) r24 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r25 = openat$cgroup_ro(r24, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r26 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = getpid() r28 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r28, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r28, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r29 = gettid() waitid(0x2c7c96e4f825ad55, r29, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r30 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r30, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r31 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r31, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r28, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r21, @ANYRES16, @ANYRES16=r21, @ANYRESDEC, @ANYRES32, @ANYRES64], @ANYRESOCT=r30, @ANYRES64=r31, @ANYRES64], @ANYRESDEC=r29]], 0x8}}, 0x20004850) r32 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r32) kcmp(r32, r32, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r32, 0x0, 0x0) r33 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r32, r33, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r29, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r26, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r25, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r21, r19, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r18, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r17, 0x0, 0x1, &(0x7f0000000000)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r16, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r14, 0x0, 0x1, &(0x7f0000000500)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r12, r13, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r7, r10, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r3, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00', r34}, 0x30) r35 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r36 = socket$inet(0x10, 0x2, 0x0) r37 = dup(r36) sendfile(r37, r35, &(0x7f0000000040)=0x103000, 0x8001) r38 = getpid() sched_setattr(r38, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r39 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r40 = socket$inet(0x10, 0x2, 0x0) r41 = dup(r40) sendfile(r41, r39, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r38, r41, 0x0, 0x11, &(0x7f0000000000)='cpusetGPLcpuset{\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r1, r37, 0x0, 0xfffffffffffffd88, 0x0, r42}, 0x2b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffffffffffef3) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r43 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r43, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x8a999a9faa70e163) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffff2b) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:37:59 executing program 2 (fault-call:3 fault-nth:5): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:37:59 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f0000000080)={{0x5, 0x4, 0xfffffffa, 0x1000, '\x00', 0x4}, 0x4, 0x3, 0xf55d, r1, 0x2, 0x2, 'syz0\x00', &(0x7f0000000040)=['[bdevmd5sumcpuset{ppp1.\\-system\x00', '/dev/bsg\x00'], 0x29, [], [0x0, 0x9, 0x3823, 0x8]}) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x200000, 0x0) ioctl$KVM_GET_LAPIC(r2, 0x8400ae8e, &(0x7f0000000440)={"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"}) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:37:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1798.567228] FAULT_INJECTION: forcing a failure. [ 1798.567228] name failslab, interval 1, probability 0, space 0, times 0 [ 1798.599261] CPU: 1 PID: 24431 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1798.607187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1798.616732] Call Trace: [ 1798.619332] dump_stack+0x142/0x197 [ 1798.622985] should_fail.cold+0x10f/0x159 [ 1798.627135] should_failslab+0xdb/0x130 [ 1798.631102] __kmalloc_track_caller+0x2ec/0x790 [ 1798.635772] ? check_preemption_disabled+0x3c/0x250 [ 1798.635787] ? prepare_creds+0x3c/0x390 [ 1798.635798] ? selinux_cred_prepare+0x49/0xb0 [ 1798.649259] kmemdup+0x27/0x60 [ 1798.652474] selinux_cred_prepare+0x49/0xb0 [ 1798.656804] security_prepare_creds+0x7d/0xb0 [ 1798.661298] prepare_creds+0x2d1/0x390 [ 1798.665170] copy_creds+0x7b/0x4f0 [ 1798.668692] ? lockdep_init_map+0x9/0x10 [ 1798.672735] copy_process.part.0+0x868/0x6a70 [ 1798.677233] ? debug_smp_processor_id+0x1c/0x20 [ 1798.681881] ? perf_trace_lock+0x109/0x500 [ 1798.686091] ? check_preemption_disabled+0x3c/0x250 [ 1798.691084] ? save_trace+0x290/0x290 [ 1798.694862] ? SOFTIRQ_verbose+0x10/0x10 [ 1798.698898] ? debug_smp_processor_id+0x1c/0x20 [ 1798.703550] ? __f_unlock_pos+0x19/0x20 [ 1798.707506] ? __cleanup_sighand+0x50/0x50 [ 1798.711720] ? lock_downgrade+0x740/0x740 [ 1798.715860] _do_fork+0x19e/0xce0 [ 1798.719304] ? fork_idle+0x280/0x280 [ 1798.723001] ? fput+0xd4/0x150 [ 1798.726174] ? SyS_write+0x15e/0x230 [ 1798.729871] SyS_clone+0x37/0x50 [ 1798.733216] ? sys_vfork+0x30/0x30 [ 1798.736755] do_syscall_64+0x1e8/0x640 [ 1798.740627] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1798.745460] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1798.750629] RIP: 0033:0x45a919 [ 1798.753798] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1798.761487] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1798.768736] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1798.775987] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1798.783236] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1798.790484] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:00 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:00 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) openat$cgroup_ro(r3, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:00 executing program 2 (fault-call:3 fault-nth:6): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x81, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x398) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1799.088437] FAULT_INJECTION: forcing a failure. [ 1799.088437] name failslab, interval 1, probability 0, space 0, times 0 [ 1799.142127] CPU: 0 PID: 24458 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1799.150048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1799.159406] Call Trace: [ 1799.162009] dump_stack+0x142/0x197 [ 1799.165652] should_fail.cold+0x10f/0x159 [ 1799.169817] should_failslab+0xdb/0x130 [ 1799.173793] __kmalloc_track_caller+0x2ec/0x790 [ 1799.178455] ? check_preemption_disabled+0x3c/0x250 [ 1799.183468] ? prepare_creds+0x3c/0x390 [ 1799.187441] ? selinux_cred_prepare+0x49/0xb0 [ 1799.191936] kmemdup+0x27/0x60 [ 1799.195138] selinux_cred_prepare+0x49/0xb0 [ 1799.199460] security_prepare_creds+0x7d/0xb0 [ 1799.203962] prepare_creds+0x2d1/0x390 [ 1799.207854] copy_creds+0x7b/0x4f0 [ 1799.211392] ? lockdep_init_map+0x9/0x10 [ 1799.215453] copy_process.part.0+0x868/0x6a70 [ 1799.219951] ? debug_smp_processor_id+0x1c/0x20 [ 1799.224616] ? perf_trace_lock+0x109/0x500 [ 1799.228849] ? check_preemption_disabled+0x3c/0x250 [ 1799.233867] ? save_trace+0x290/0x290 [ 1799.237667] ? SOFTIRQ_verbose+0x10/0x10 [ 1799.241723] ? debug_smp_processor_id+0x1c/0x20 [ 1799.246400] ? __f_unlock_pos+0x19/0x20 [ 1799.250390] ? __cleanup_sighand+0x50/0x50 [ 1799.254625] ? lock_downgrade+0x740/0x740 [ 1799.258780] _do_fork+0x19e/0xce0 [ 1799.262242] ? fork_idle+0x280/0x280 [ 1799.265966] ? fput+0xd4/0x150 [ 1799.269152] ? SyS_write+0x15e/0x230 [ 1799.269168] SyS_clone+0x37/0x50 [ 1799.269175] ? sys_vfork+0x30/0x30 [ 1799.269190] do_syscall_64+0x1e8/0x640 [ 1799.276243] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1799.288605] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1799.293789] RIP: 0033:0x45a919 [ 1799.296990] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1799.304699] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1799.311965] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1799.319258] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1799.326517] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1799.333775] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:02 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:02 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) syz_init_net_socket$rose(0xb, 0x5, 0x0) 09:38:02 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) r1 = getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() gettid() r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) kcmp(r1, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xee) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:02 executing program 2 (fault-call:3 fault-nth:7): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1801.593902] FAULT_INJECTION: forcing a failure. [ 1801.593902] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.608252] selinux_nlmsg_perm: 46 callbacks suppressed [ 1801.608264] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.613838] CPU: 1 PID: 24481 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1801.613846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1801.613850] Call Trace: [ 1801.613868] dump_stack+0x142/0x197 [ 1801.613886] should_fail.cold+0x10f/0x159 [ 1801.613904] should_failslab+0xdb/0x130 [ 1801.613918] __kmalloc_track_caller+0x2ec/0x790 [ 1801.628564] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.633832] ? __debug_object_init+0x171/0x8e0 [ 1801.633845] ? setup_userns_sysctls+0x50/0x180 [ 1801.633858] kmemdup+0x27/0x60 [ 1801.633868] setup_userns_sysctls+0x50/0x180 09:38:02 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) [ 1801.633881] create_user_ns+0x79c/0xcd0 [ 1801.633898] copy_creds+0x3e9/0x4f0 [ 1801.633909] ? lockdep_init_map+0x9/0x10 [ 1801.645750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.645828] copy_process.part.0+0x868/0x6a70 [ 1801.645843] ? debug_smp_processor_id+0x1c/0x20 [ 1801.645853] ? perf_trace_lock+0x109/0x500 [ 1801.645864] ? check_preemption_disabled+0x3c/0x250 [ 1801.652212] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.653628] ? save_trace+0x290/0x290 [ 1801.653640] ? SOFTIRQ_verbose+0x10/0x10 [ 1801.653649] ? debug_smp_processor_id+0x1c/0x20 [ 1801.653658] ? __f_unlock_pos+0x19/0x20 [ 1801.653676] ? __cleanup_sighand+0x50/0x50 [ 1801.659828] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.662284] ? lock_downgrade+0x740/0x740 [ 1801.662301] _do_fork+0x19e/0xce0 [ 1801.662315] ? fork_idle+0x280/0x280 [ 1801.662329] ? fput+0xd4/0x150 [ 1801.662338] ? SyS_write+0x15e/0x230 [ 1801.662352] SyS_clone+0x37/0x50 [ 1801.662359] ? sys_vfork+0x30/0x30 [ 1801.662371] do_syscall_64+0x1e8/0x640 [ 1801.662379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1801.662396] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1801.676711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.678986] RIP: 0033:0x45a919 [ 1801.678992] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1801.679003] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1801.679008] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1801.679013] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1801.679021] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1801.686085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.686872] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1801.731254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 [ 1801.779851] FAULT_INJECTION: forcing a failure. [ 1801.779851] name failslab, interval 1, probability 0, space 0, times 0 [ 1801.779862] CPU: 0 PID: 24498 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1801.921093] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1801.930423] Call Trace: [ 1801.933008] dump_stack+0x142/0x197 [ 1801.936619] should_fail.cold+0x10f/0x159 [ 1801.940766] should_failslab+0xdb/0x130 [ 1801.944721] __kmalloc_track_caller+0x2ec/0x790 [ 1801.949370] ? __debug_object_init+0x171/0x8e0 [ 1801.953931] ? setup_userns_sysctls+0x50/0x180 [ 1801.958496] kmemdup+0x27/0x60 [ 1801.961691] setup_userns_sysctls+0x50/0x180 [ 1801.966107] create_user_ns+0x79c/0xcd0 [ 1801.970074] copy_creds+0x3e9/0x4f0 [ 1801.973686] ? lockdep_init_map+0x9/0x10 [ 1801.977764] copy_process.part.0+0x868/0x6a70 [ 1801.982245] ? debug_smp_processor_id+0x1c/0x20 [ 1801.986899] ? perf_trace_lock+0x109/0x500 [ 1801.991116] ? check_preemption_disabled+0x3c/0x250 [ 1801.996120] ? save_trace+0x290/0x290 [ 1801.999914] ? SOFTIRQ_verbose+0x10/0x10 [ 1802.003955] ? debug_smp_processor_id+0x1c/0x20 [ 1802.008605] ? __f_unlock_pos+0x19/0x20 [ 1802.012578] ? __cleanup_sighand+0x50/0x50 [ 1802.016795] ? lock_downgrade+0x740/0x740 [ 1802.020926] _do_fork+0x19e/0xce0 [ 1802.024359] ? fork_idle+0x280/0x280 [ 1802.028068] ? fput+0xd4/0x150 [ 1802.031243] ? SyS_write+0x15e/0x230 [ 1802.034959] SyS_clone+0x37/0x50 [ 1802.038324] ? sys_vfork+0x30/0x30 [ 1802.041852] do_syscall_64+0x1e8/0x640 [ 1802.045725] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1802.050554] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1802.055743] RIP: 0033:0x45a919 [ 1802.058913] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1802.066605] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1802.073867] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1802.081124] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1802.088379] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 09:38:02 executing program 2 (fault-call:3 fault-nth:8): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:03 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:03 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) r1 = msgget$private(0x0, 0x0) seccomp$SECCOMP_SET_MODE_STRICT(0x0, 0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x39d, 0x1}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1f}) [ 1802.095644] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1802.131916] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 09:38:03 executing program 2 (fault-call:3 fault-nth:9): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1802.160161] net_ratelimit: 26 callbacks suppressed [ 1802.160167] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.170209] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.193675] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24486 comm=syz-executor.5 09:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1802.221987] audit: type=1326 audit(1576921083.377:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=24503 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 [ 1802.246234] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.246286] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.303361] FAULT_INJECTION: forcing a failure. [ 1802.303361] name failslab, interval 1, probability 0, space 0, times 0 [ 1802.318252] CPU: 0 PID: 24517 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1802.326157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1802.335525] Call Trace: [ 1802.338123] dump_stack+0x142/0x197 [ 1802.341767] should_fail.cold+0x10f/0x159 [ 1802.345931] should_failslab+0xdb/0x130 [ 1802.349909] __kmalloc+0x2f0/0x7a0 [ 1802.353457] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1802.358911] ? rcu_read_lock_sched_held+0x110/0x130 [ 1802.363925] ? __register_sysctl_table+0xc7/0xe50 [ 1802.363941] __register_sysctl_table+0xc7/0xe50 [ 1802.363953] ? memcpy+0x46/0x50 [ 1802.363966] setup_userns_sysctls+0xbc/0x180 [ 1802.363980] create_user_ns+0x79c/0xcd0 [ 1802.373464] copy_creds+0x3e9/0x4f0 [ 1802.373474] ? lockdep_init_map+0x9/0x10 [ 1802.373487] copy_process.part.0+0x868/0x6a70 [ 1802.373501] ? debug_smp_processor_id+0x1c/0x20 [ 1802.401919] ? perf_trace_lock+0x109/0x500 [ 1802.406155] ? check_preemption_disabled+0x3c/0x250 [ 1802.411178] ? save_trace+0x290/0x290 [ 1802.414974] ? SOFTIRQ_verbose+0x10/0x10 [ 1802.419026] ? debug_smp_processor_id+0x1c/0x20 [ 1802.423698] ? __f_unlock_pos+0x19/0x20 [ 1802.427686] ? __cleanup_sighand+0x50/0x50 [ 1802.431941] ? lock_downgrade+0x740/0x740 [ 1802.436096] _do_fork+0x19e/0xce0 [ 1802.439557] ? fork_idle+0x280/0x280 [ 1802.443279] ? fput+0xd4/0x150 [ 1802.446471] ? SyS_write+0x15e/0x230 [ 1802.450190] SyS_clone+0x37/0x50 09:38:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x68) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd9d) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffe49, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1802.453549] ? sys_vfork+0x30/0x30 [ 1802.457090] do_syscall_64+0x1e8/0x640 [ 1802.460970] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1802.465797] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1802.470965] RIP: 0033:0x45a919 [ 1802.474133] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1802.481837] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1802.489090] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1802.496346] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1802.503596] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1802.510847] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1802.880086] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.885212] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.890328] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.895400] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.960143] protocol 88fb is buggy, dev hsr_slave_0 [ 1802.965298] protocol 88fb is buggy, dev hsr_slave_1 [ 1802.985387] audit: type=1326 audit(1576921084.137:317): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=24503 comm="syz-executor.3" exe="/root/syz-executor.3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45d75a code=0x0 09:38:05 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:05 executing program 5: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4000000, 0x0, 0x0, 0x4}, r0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffa7) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffc96) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x16) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r6, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x1fe) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x6d) 09:38:05 executing program 2 (fault-call:3 fault-nth:10): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:05 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x41) recvfrom$x25(r0, &(0x7f00000001c0)=""/89, 0x59, 0x40000000, 0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="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", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000002800), 0x0, 0x4}], 0x40801, &(0x7f0000002a40)={[{@grpid='grpid'}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>'}}, {@fowner_eq={'fowner', 0x3d, r3}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) setxattr$smack_xattr_label(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)='security.SMACK64IPIN\x00', &(0x7f0000000140)={'selinux'}, 0x8, 0x3) r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="257ab9b15f29c0d90869540784acc74f289401f7e0af5fc24875504d18a95c840e5ca21f3468ad38142d240437fb00a6b1d26b3c61c796966648a025f711fd02900c935aea634c475b2b9170c81b093cd7a90f9e279436805a293af052a14fae93f8059176a90b59ae69602ec5e42d99bcfa305bfeefdddcfd", @ANYRES32=r5, @ANYBLOB="080f3f015cb3ccb640e50b1246926360b08cbb811e5c37b4716b6da7fd29e6ae83735fda8b1678eee54176241837bf8e031b69d31cfa7c8e", @ANYRES32=r5, @ANYBLOB], 0x5, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x0, 0x0, r5, r3}, 0x0, 0x1, 0x100000000, 0x0, 0x0, 0x3, 0x9, 0x0, 0x0, 0x1, 0x0, r7}) [ 1804.616186] FAULT_INJECTION: forcing a failure. [ 1804.616186] name failslab, interval 1, probability 0, space 0, times 0 [ 1804.633161] CPU: 0 PID: 24534 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1804.641062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1804.650416] Call Trace: [ 1804.653020] dump_stack+0x142/0x197 [ 1804.656658] should_fail.cold+0x10f/0x159 [ 1804.656679] should_failslab+0xdb/0x130 [ 1804.656692] kmem_cache_alloc_trace+0x2e9/0x790 [ 1804.664793] ? lock_downgrade+0x740/0x740 [ 1804.664810] alloc_fdtable+0x7f/0x280 [ 1804.664823] dup_fd+0x693/0xa40 [ 1804.664843] copy_process.part.0+0x1b5a/0x6a70 [ 1804.685257] ? debug_smp_processor_id+0x1c/0x20 [ 1804.689931] ? perf_trace_lock+0x109/0x500 [ 1804.694177] ? check_preemption_disabled+0x3c/0x250 [ 1804.699198] ? save_trace+0x290/0x290 [ 1804.703004] ? SOFTIRQ_verbose+0x10/0x10 [ 1804.707068] ? debug_smp_processor_id+0x1c/0x20 [ 1804.711753] ? __cleanup_sighand+0x50/0x50 09:38:05 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r1, 0x0, 0x135) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xf7e531223440354e) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1804.715991] ? lock_downgrade+0x740/0x740 [ 1804.720150] _do_fork+0x19e/0xce0 [ 1804.723618] ? fork_idle+0x280/0x280 [ 1804.727342] ? fput+0xd4/0x150 [ 1804.730534] ? SyS_write+0x15e/0x230 [ 1804.734254] SyS_clone+0x37/0x50 [ 1804.737617] ? sys_vfork+0x30/0x30 [ 1804.741163] do_syscall_64+0x1e8/0x640 [ 1804.745046] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1804.749889] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1804.749898] RIP: 0033:0x45a919 [ 1804.749906] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:38:05 executing program 2 (fault-call:3 fault-nth:11): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1804.766060] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1804.773327] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1804.780591] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1804.787859] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1804.795130] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1804.898432] FAULT_INJECTION: forcing a failure. [ 1804.898432] name failslab, interval 1, probability 0, space 0, times 0 [ 1804.910641] CPU: 0 PID: 24561 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1804.918622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1804.927970] Call Trace: [ 1804.930548] dump_stack+0x142/0x197 [ 1804.934174] should_fail.cold+0x10f/0x159 [ 1804.938316] should_failslab+0xdb/0x130 [ 1804.942294] kmem_cache_alloc_trace+0x2e9/0x790 [ 1804.946966] ? lock_downgrade+0x740/0x740 [ 1804.951111] alloc_fdtable+0x7f/0x280 [ 1804.954903] dup_fd+0x693/0xa40 [ 1804.958230] copy_process.part.0+0x1b5a/0x6a70 [ 1804.962804] ? debug_smp_processor_id+0x1c/0x20 [ 1804.967471] ? perf_trace_lock+0x109/0x500 [ 1804.971706] ? check_preemption_disabled+0x3c/0x250 [ 1804.976726] ? save_trace+0x290/0x290 [ 1804.980521] ? SOFTIRQ_verbose+0x10/0x10 [ 1804.984572] ? debug_smp_processor_id+0x1c/0x20 [ 1804.989230] ? __cleanup_sighand+0x50/0x50 [ 1804.993454] ? lock_downgrade+0x740/0x740 [ 1804.997589] _do_fork+0x19e/0xce0 [ 1805.001062] ? fork_idle+0x280/0x280 [ 1805.004774] ? fput+0xd4/0x150 [ 1805.007962] ? SyS_write+0x15e/0x230 [ 1805.011662] SyS_clone+0x37/0x50 [ 1805.015010] ? sys_vfork+0x30/0x30 [ 1805.018537] do_syscall_64+0x1e8/0x640 [ 1805.022410] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1805.027240] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1805.032416] RIP: 0033:0x45a919 [ 1805.035590] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1805.043280] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1805.050532] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1805.057876] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1805.065136] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1805.072405] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:06 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) r1 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) r2 = gettid() r3 = gettid() r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpgrp(r4) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r2, r1, 0x0, 0x5, &(0x7f00000000c0)='&em1\x00'}, 0x30) kcmp(r3, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:06 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:06 executing program 2 (fault-call:3 fault-nth:12): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0xfffffee9) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:06 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000000000)={0x3, 0x0, 0x10001, 0x800}) ioctl$DRM_IOCTL_SG_ALLOC(r3, 0xc0106438, &(0x7f0000000040)={0x4e, r7}) [ 1805.287633] FAULT_INJECTION: forcing a failure. [ 1805.287633] name failslab, interval 1, probability 0, space 0, times 0 [ 1805.322070] CPU: 1 PID: 24586 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1805.329995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1805.339350] Call Trace: [ 1805.341945] dump_stack+0x142/0x197 [ 1805.345598] should_fail.cold+0x10f/0x159 [ 1805.349758] should_failslab+0xdb/0x130 [ 1805.353736] kmem_cache_alloc_node_trace+0x280/0x770 [ 1805.358844] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1805.364299] __kmalloc_node+0x3d/0x80 [ 1805.368107] kvmalloc_node+0x4e/0xe0 [ 1805.371836] alloc_fdtable+0xcf/0x280 [ 1805.375649] dup_fd+0x693/0xa40 [ 1805.378938] copy_process.part.0+0x1b5a/0x6a70 [ 1805.383526] ? debug_smp_processor_id+0x1c/0x20 [ 1805.388194] ? perf_trace_lock+0x109/0x500 [ 1805.392436] ? check_preemption_disabled+0x3c/0x250 [ 1805.397459] ? save_trace+0x290/0x290 [ 1805.401259] ? SOFTIRQ_verbose+0x10/0x10 [ 1805.405319] ? debug_smp_processor_id+0x1c/0x20 [ 1805.410004] ? __cleanup_sighand+0x50/0x50 [ 1805.414247] ? lock_downgrade+0x740/0x740 [ 1805.418397] _do_fork+0x19e/0xce0 [ 1805.421852] ? fork_idle+0x280/0x280 [ 1805.421865] ? fput+0xd4/0x150 [ 1805.421875] ? SyS_write+0x15e/0x230 [ 1805.421888] SyS_clone+0x37/0x50 [ 1805.421895] ? sys_vfork+0x30/0x30 [ 1805.421908] do_syscall_64+0x1e8/0x640 [ 1805.421918] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1805.421934] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1805.421948] RIP: 0033:0x45a919 [ 1805.456580] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1805.464303] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1805.471576] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1805.478844] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1805.486109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1805.493375] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x80800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:08 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:08 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:08 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f00000000c0)="db21641438c9ded1dae46b956b43cf27463f27ee897d26456c425a9886e404f7e5dba04944d17691153beb1bb0dbe36440735c582f251ac5eb82a37e4173d8ca1a99b2898588f627db033fbd8c90690711e1846003d1f9dd59f8d3925457501ea68c810d3242c4b5240e82cfa80bfb9720da122302937b82d69028f4e4d2362c5eadd2f62a764249b7fb5d5723080120e35836db6e512b8fa0d8a2ede222661201432cbcd8a5ae") r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x38, 0x2, 0x40, 0x0, 0x9}, 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r4, 0x81, &(0x7f0000000000)=""/141) 09:38:08 executing program 2 (fault-call:3 fault-nth:13): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) r1 = socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r3 = fcntl$getown(r1, 0x9) fcntl$setown(0xffffffffffffffff, 0x8, r3) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r4, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1807.677036] selinux_nlmsg_perm: 38 callbacks suppressed [ 1807.677045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.697128] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.710914] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.723818] FAULT_INJECTION: forcing a failure. [ 1807.723818] name failslab, interval 1, probability 0, space 0, times 0 [ 1807.724983] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.752857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.757318] CPU: 1 PID: 24610 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1807.767408] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.772830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1807.772836] Call Trace: [ 1807.772855] dump_stack+0x142/0x197 [ 1807.772875] should_fail.cold+0x10f/0x159 [ 1807.772892] should_failslab+0xdb/0x130 [ 1807.772904] kmem_cache_alloc+0x2d7/0x780 [ 1807.786439] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.794286] ? dup_fd+0x533/0xa40 [ 1807.794306] copy_fs_struct+0x43/0x2d0 [ 1807.794318] copy_process.part.0+0x3974/0x6a70 [ 1807.794331] ? debug_smp_processor_id+0x1c/0x20 [ 1807.798205] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.800520] ? perf_trace_lock+0x109/0x500 [ 1807.800530] ? check_preemption_disabled+0x3c/0x250 [ 1807.800539] ? save_trace+0x290/0x290 [ 1807.800549] ? SOFTIRQ_verbose+0x10/0x10 [ 1807.800559] ? debug_smp_processor_id+0x1c/0x20 [ 1807.858521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.862669] ? __cleanup_sighand+0x50/0x50 [ 1807.862680] ? lock_downgrade+0x740/0x740 [ 1807.862701] _do_fork+0x19e/0xce0 [ 1807.871771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24609 comm=syz-executor.3 [ 1807.875225] ? fork_idle+0x280/0x280 [ 1807.875242] ? fput+0xd4/0x150 [ 1807.918009] ? SyS_write+0x15e/0x230 [ 1807.921714] SyS_clone+0x37/0x50 [ 1807.925062] ? sys_vfork+0x30/0x30 [ 1807.928592] do_syscall_64+0x1e8/0x640 [ 1807.932468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1807.937299] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1807.942485] RIP: 0033:0x45a919 [ 1807.945799] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1807.953498] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1807.960760] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1807.968036] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1807.975299] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1807.982550] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:09 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0xfffffffffffffdd9, 0xd5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:09 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000040)=0x9, 0x4) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:09 executing program 2 (fault-call:3 fault-nth:14): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1808.263376] FAULT_INJECTION: forcing a failure. [ 1808.263376] name failslab, interval 1, probability 0, space 0, times 0 [ 1808.275087] CPU: 1 PID: 24631 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1808.282987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1808.292345] Call Trace: [ 1808.294948] dump_stack+0x142/0x197 [ 1808.298594] should_fail.cold+0x10f/0x159 [ 1808.302762] should_failslab+0xdb/0x130 [ 1808.306753] kmem_cache_alloc_node_trace+0x280/0x770 09:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = dup(0xffffffffffffffff) close(0xffffffffffffffff) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r3 = gettid() kcmp(r3, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r4, 0x0, 0x0) syz_open_procfs(0x0, 0x0) r5 = gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() getpgid(r5) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r6) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1808.311868] ? kasan_unpoison_shadow+0x35/0x50 [ 1808.316458] __kmalloc_node+0x3d/0x80 [ 1808.320265] kvmalloc_node+0x4e/0xe0 [ 1808.323986] alloc_fdtable+0x13b/0x280 [ 1808.327880] dup_fd+0x693/0xa40 [ 1808.331180] copy_process.part.0+0x1b5a/0x6a70 [ 1808.335774] ? debug_smp_processor_id+0x1c/0x20 [ 1808.340446] ? perf_trace_lock+0x109/0x500 [ 1808.344687] ? check_preemption_disabled+0x3c/0x250 [ 1808.349708] ? save_trace+0x290/0x290 [ 1808.353516] ? SOFTIRQ_verbose+0x10/0x10 [ 1808.357575] ? debug_smp_processor_id+0x1c/0x20 09:38:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xff60) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1808.362260] ? __cleanup_sighand+0x50/0x50 [ 1808.366499] ? lock_downgrade+0x740/0x740 [ 1808.370756] _do_fork+0x19e/0xce0 [ 1808.374216] ? fork_idle+0x280/0x280 [ 1808.377944] ? fput+0xd4/0x150 [ 1808.381140] ? SyS_write+0x15e/0x230 [ 1808.384866] SyS_clone+0x37/0x50 [ 1808.388234] ? sys_vfork+0x30/0x30 [ 1808.391779] do_syscall_64+0x1e8/0x640 [ 1808.395673] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.400526] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1808.405717] RIP: 0033:0x45a919 [ 1808.408908] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1808.416612] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1808.416620] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1808.416626] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1808.416632] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1808.416638] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1808.424171] net_ratelimit: 26 callbacks suppressed [ 1808.424176] protocol 88fb is buggy, dev hsr_slave_0 09:38:09 executing program 2 (fault-call:3 fault-nth:15): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1808.424233] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.480111] protocol 88fb is buggy, dev hsr_slave_0 [ 1808.485220] protocol 88fb is buggy, dev hsr_slave_1 [ 1808.516520] FAULT_INJECTION: forcing a failure. [ 1808.516520] name failslab, interval 1, probability 0, space 0, times 0 [ 1808.528080] CPU: 1 PID: 24650 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1808.535995] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1808.545349] Call Trace: [ 1808.547924] dump_stack+0x142/0x197 [ 1808.551544] should_fail.cold+0x10f/0x159 [ 1808.555690] should_failslab+0xdb/0x130 [ 1808.559649] kmem_cache_alloc+0x2d7/0x780 [ 1808.563790] ? selinux_capable+0x36/0x40 [ 1808.567847] create_new_namespaces+0x34/0x720 [ 1808.572324] ? ns_capable_common+0x12c/0x160 [ 1808.576719] copy_namespaces+0x284/0x310 [ 1808.580783] copy_process.part.0+0x2603/0x6a70 [ 1808.585352] ? debug_smp_processor_id+0x1c/0x20 [ 1808.590011] ? perf_trace_lock+0x109/0x500 [ 1808.594235] ? check_preemption_disabled+0x3c/0x250 [ 1808.599241] ? debug_smp_processor_id+0x1c/0x20 [ 1808.603911] ? __cleanup_sighand+0x50/0x50 [ 1808.608135] ? lock_downgrade+0x740/0x740 [ 1808.612294] _do_fork+0x19e/0xce0 [ 1808.615731] ? fork_idle+0x280/0x280 [ 1808.619583] ? fput+0xd4/0x150 [ 1808.622776] ? SyS_write+0x15e/0x230 [ 1808.626526] SyS_clone+0x37/0x50 [ 1808.629875] ? sys_vfork+0x30/0x30 [ 1808.633400] do_syscall_64+0x1e8/0x640 [ 1808.637278] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1808.642122] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1808.647308] RIP: 0033:0x45a919 [ 1808.650488] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1808.658181] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1808.665432] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1808.672700] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1808.679988] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1808.687255] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1809.200118] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.205228] protocol 88fb is buggy, dev hsr_slave_1 [ 1809.210129] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.210440] protocol 88fb is buggy, dev hsr_slave_0 [ 1809.215416] protocol 88fb is buggy, dev hsr_slave_1 [ 1809.220399] protocol 88fb is buggy, dev hsr_slave_1 09:38:11 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:11 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x568855fa2dc19dde) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:11 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) modify_ldt$read(0x0, &(0x7f0000000000)=""/68, 0x44) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x1, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x142}, 0x0, 0x1, 0x0, 0x1}) 09:38:11 executing program 2 (fault-call:3 fault-nth:16): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:11 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1810.812191] FAULT_INJECTION: forcing a failure. [ 1810.812191] name failslab, interval 1, probability 0, space 0, times 0 [ 1810.869299] CPU: 1 PID: 24667 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1810.877235] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1810.886698] Call Trace: [ 1810.889272] dump_stack+0x142/0x197 [ 1810.892888] should_fail.cold+0x10f/0x159 [ 1810.897020] should_failslab+0xdb/0x130 [ 1810.900974] kmem_cache_alloc+0x2d7/0x780 [ 1810.905119] ? do_raw_spin_unlock+0x16b/0x260 [ 1810.909623] ? _raw_spin_unlock+0x2d/0x50 [ 1810.913754] copy_process.part.0+0x1cd5/0x6a70 [ 1810.918356] ? debug_smp_processor_id+0x1c/0x20 [ 1810.923008] ? perf_trace_lock+0x109/0x500 [ 1810.927320] ? check_preemption_disabled+0x3c/0x250 [ 1810.932349] ? save_trace+0x290/0x290 [ 1810.936129] ? SOFTIRQ_verbose+0x10/0x10 [ 1810.940170] ? debug_smp_processor_id+0x1c/0x20 [ 1810.944825] ? __cleanup_sighand+0x50/0x50 [ 1810.949045] ? lock_downgrade+0x740/0x740 [ 1810.953227] _do_fork+0x19e/0xce0 [ 1810.956696] ? fork_idle+0x280/0x280 [ 1810.960423] ? fput+0xd4/0x150 [ 1810.963596] ? SyS_write+0x15e/0x230 [ 1810.967294] SyS_clone+0x37/0x50 [ 1810.970640] ? sys_vfork+0x30/0x30 [ 1810.974164] do_syscall_64+0x1e8/0x640 [ 1810.978032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1810.982896] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1810.988065] RIP: 0033:0x45a919 [ 1810.991236] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1810.998921] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1811.006188] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1811.013449] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1811.020696] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1811.027943] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:12 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 09:38:12 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x105000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r4, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r5}}, 0x120) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000080)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x1, {0xa, 0x4e20, 0x10000, @empty, 0x31482ab}, r5}}, 0x38) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="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", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000000440)="9b738b696da53c8636cfa99ddb569adcbc5ef545909178059d8b017f92551db2dd949a071b0bf20e303d7cde8b0d72078405cab80381360e4674920a16ddc612ce8815608b57c278c7cf5efda6e3269fe14c7992579de23870ed", 0x5a, 0x4}], 0x40801, &(0x7f0000001700)={[{@biosize={'biosize', 0x3d, 0x7fff}}]}) r6 = msgget$private(0x0, 0x2c) msgctl$IPC_SET(r6, 0x1, &(0x7f00000003c0)={{0x0, r2, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0xffffff01, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:12 executing program 2 (fault-call:3 fault-nth:17): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:12 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1811.316107] FAULT_INJECTION: forcing a failure. [ 1811.316107] name failslab, interval 1, probability 0, space 0, times 0 09:38:12 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffffffffffffb1) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) fcntl$setown(r3, 0x8, r4) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r5 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r5, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x2a) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1811.395149] CPU: 0 PID: 24681 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1811.403088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1811.412444] Call Trace: [ 1811.412464] dump_stack+0x142/0x197 [ 1811.412476] ? vprintk_func+0x65/0x159 [ 1811.412492] should_fail.cold+0x10f/0x159 [ 1811.412509] should_failslab+0xdb/0x130 [ 1811.418701] kmem_cache_alloc+0x2d7/0x780 [ 1811.418713] ? do_raw_spin_unlock+0x16b/0x260 [ 1811.418727] ? _raw_spin_unlock+0x2d/0x50 [ 1811.443465] copy_process.part.0+0x1cd5/0x6a70 [ 1811.448061] ? debug_smp_processor_id+0x1c/0x20 [ 1811.452732] ? perf_trace_lock+0x109/0x500 [ 1811.456959] ? check_preemption_disabled+0x3c/0x250 [ 1811.461967] ? save_trace+0x290/0x290 [ 1811.465759] ? SOFTIRQ_verbose+0x10/0x10 [ 1811.469807] ? debug_smp_processor_id+0x1c/0x20 [ 1811.474486] ? __cleanup_sighand+0x50/0x50 [ 1811.478705] ? lock_downgrade+0x740/0x740 [ 1811.482842] _do_fork+0x19e/0xce0 [ 1811.486285] ? fork_idle+0x280/0x280 [ 1811.489984] ? fput+0xd4/0x150 [ 1811.493247] ? SyS_write+0x15e/0x230 [ 1811.496951] SyS_clone+0x37/0x50 [ 1811.500295] ? sys_vfork+0x30/0x30 [ 1811.503817] do_syscall_64+0x1e8/0x640 [ 1811.507696] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1811.512529] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1811.517701] RIP: 0033:0x45a919 [ 1811.520873] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1811.528576] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1811.535828] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1811.543106] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1811.550360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1811.557614] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:15 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:15 executing program 2 (fault-call:3 fault-nth:18): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:15 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sync() sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000000)) r3 = msgget$private(0x0, 0x0) r4 = msgget(0x2, 0x0) msgctl$MSG_STAT(r4, 0xb, 0x0) r5 = msgget$private(0x0, 0x400) msgrcv(r5, 0x0, 0xbc0e0a07, 0x0, 0x3800) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() gettid() bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r1 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r1, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1813.903121] selinux_nlmsg_perm: 6 callbacks suppressed [ 1813.903129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1813.903260] FAULT_INJECTION: forcing a failure. [ 1813.903260] name failslab, interval 1, probability 0, space 0, times 0 [ 1813.914268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1813.935694] CPU: 0 PID: 24718 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1813.952730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1813.962083] Call Trace: [ 1813.964683] dump_stack+0x142/0x197 [ 1813.968320] should_fail.cold+0x10f/0x159 [ 1813.972480] should_failslab+0xdb/0x130 [ 1813.976460] kmem_cache_alloc_node_trace+0x280/0x770 [ 1813.981566] ? ida_simple_get+0x104/0x190 [ 1813.985721] __kmalloc_node+0x3d/0x80 [ 1813.989526] kvmalloc_node+0x4e/0xe0 [ 1813.993245] bucket_table_alloc+0x3cd/0x5d0 [ 1813.997575] rhashtable_init+0x4a0/0x810 [ 1814.001637] ipc_init_ids+0xc6/0x1e0 [ 1814.005450] sem_init_ns+0x11a/0x150 [ 1814.009153] copy_ipcs+0x228/0x400 [ 1814.012681] create_new_namespaces+0x1dd/0x720 [ 1814.017251] ? ns_capable_common+0x12c/0x160 [ 1814.021648] copy_namespaces+0x284/0x310 [ 1814.025696] copy_process.part.0+0x2603/0x6a70 [ 1814.030266] ? debug_smp_processor_id+0x1c/0x20 [ 1814.034920] ? perf_trace_lock+0x109/0x500 [ 1814.039145] ? check_preemption_disabled+0x3c/0x250 [ 1814.044167] ? debug_smp_processor_id+0x1c/0x20 [ 1814.048832] ? __cleanup_sighand+0x50/0x50 [ 1814.053050] ? lock_downgrade+0x740/0x740 [ 1814.057190] _do_fork+0x19e/0xce0 [ 1814.060640] ? fork_idle+0x280/0x280 [ 1814.064349] ? fput+0xd4/0x150 [ 1814.067524] ? SyS_write+0x15e/0x230 [ 1814.071231] SyS_clone+0x37/0x50 [ 1814.074577] ? sys_vfork+0x30/0x30 [ 1814.078101] do_syscall_64+0x1e8/0x640 [ 1814.081969] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1814.086798] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1814.091968] RIP: 0033:0x45a919 [ 1814.095137] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1814.102830] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1814.110079] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1814.117329] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1814.124608] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1814.131870] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1814.166096] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1814.196768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1814.218244] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24714 comm=syz-executor.3 [ 1814.231085] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1814.246534] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1814.248194] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24714 comm=syz-executor.3 [ 1814.261411] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 [ 1814.284299] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24717 comm=syz-executor.3 09:38:15 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffe04) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:15 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 09:38:15 executing program 2 (fault-call:3 fault-nth:19): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:15 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$FS_IOC_ENABLE_VERITY(r1, 0x40806685, &(0x7f00000001c0)={0x1, 0x3, 0x1000, 0xf2, &(0x7f00000000c0)="1f18db6e47662b75b8aa63f2d4d2a58ddbd8b61ca341fb44b9252ced12f9bb260c1a171f13388e4b47e1fad7914f3b116f40d2a5c90bb4dc49b25e95df2240c50247b5285024457ba01502fc9b89e4135c6d895cb0ae79a820304cb1972309a54115ac98c5ef66c2c4b34eb5fcab3cc807a637477e5b9b69e1fdb3db943332a2af8bb4dceb4793deb54f605f665cca1f573a85c2f433621600519eac03d5075498b05cb3c853bf6d6cc14cc3b2263e70713dbe6f9b3e671c0a95e95ac7d3e71ccc5f54d49dc11f8919cad9106fc54d471ef38b6618ab3f92dd6ccf73aca4859873dc95ac4b2d4a166a2b40879b90bfd99ffe", 0x3, 0x0, &(0x7f0000000000)="b259aa"}) r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) [ 1814.373870] FAULT_INJECTION: forcing a failure. [ 1814.373870] name failslab, interval 1, probability 0, space 0, times 0 [ 1814.407016] CPU: 1 PID: 24739 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1814.414962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1814.424319] Call Trace: [ 1814.426937] dump_stack+0x142/0x197 [ 1814.430567] should_fail.cold+0x10f/0x159 [ 1814.434704] should_failslab+0xdb/0x130 [ 1814.438666] kmem_cache_alloc_node_trace+0x280/0x770 [ 1814.443751] ? ida_simple_get+0x104/0x190 [ 1814.447883] __kmalloc_node+0x3d/0x80 [ 1814.451798] kvmalloc_node+0x4e/0xe0 [ 1814.455505] bucket_table_alloc+0x3cd/0x5d0 [ 1814.459810] rhashtable_init+0x4a0/0x810 [ 1814.463865] ipc_init_ids+0xc6/0x1e0 [ 1814.467584] sem_init_ns+0x11a/0x150 09:38:15 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x49, 0x3, 0x2000) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$TCSETX(r3, 0x5433, &(0x7f0000000000)={0x1f, 0xfffd, [0x7, 0x8, 0x200, 0x4, 0x6], 0x7fff}) [ 1814.471299] copy_ipcs+0x228/0x400 [ 1814.474849] create_new_namespaces+0x1dd/0x720 [ 1814.479449] ? ns_capable_common+0x12c/0x160 [ 1814.483864] copy_namespaces+0x284/0x310 [ 1814.487933] copy_process.part.0+0x2603/0x6a70 [ 1814.492520] ? debug_smp_processor_id+0x1c/0x20 [ 1814.497188] ? perf_trace_lock+0x109/0x500 [ 1814.501513] ? check_preemption_disabled+0x3c/0x250 [ 1814.506537] ? debug_smp_processor_id+0x1c/0x20 [ 1814.511213] ? __cleanup_sighand+0x50/0x50 [ 1814.515435] ? lock_downgrade+0x740/0x740 [ 1814.519571] _do_fork+0x19e/0xce0 09:38:15 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r4, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) [ 1814.523019] ? fork_idle+0x280/0x280 [ 1814.523035] ? fput+0xd4/0x150 [ 1814.523046] ? SyS_write+0x15e/0x230 [ 1814.523059] SyS_clone+0x37/0x50 [ 1814.529937] ? sys_vfork+0x30/0x30 [ 1814.529951] do_syscall_64+0x1e8/0x640 [ 1814.529960] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1814.529977] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1814.529986] RIP: 0033:0x45a919 [ 1814.557579] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1814.565290] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:38:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffe01) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1814.572568] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1814.579855] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1814.587158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1814.594432] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:15 executing program 3: clone(0x8021238107fe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) accept4$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000040)=0x14, 0x800) bind$packet(r0, &(0x7f0000000080)={0x11, 0xf7, r3, 0x1, 0x8, 0x6, @broadcast}, 0x14) r4 = msgget$private(0x0, 0x0) msgrcv(r4, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r4, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) [ 1814.640125] net_ratelimit: 24 callbacks suppressed [ 1814.640130] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.650224] protocol 88fb is buggy, dev hsr_slave_1 09:38:15 executing program 2 (fault-call:3 fault-nth:20): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1814.720138] protocol 88fb is buggy, dev hsr_slave_0 [ 1814.725254] protocol 88fb is buggy, dev hsr_slave_1 [ 1814.813732] FAULT_INJECTION: forcing a failure. [ 1814.813732] name failslab, interval 1, probability 0, space 0, times 0 [ 1814.825433] CPU: 0 PID: 24784 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1814.833311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1814.842661] Call Trace: [ 1814.845238] dump_stack+0x142/0x197 [ 1814.848857] should_fail.cold+0x10f/0x159 [ 1814.853004] should_failslab+0xdb/0x130 [ 1814.856993] kmem_cache_alloc_node_trace+0x280/0x770 [ 1814.862086] ? trace_hardirqs_on_caller+0x400/0x590 [ 1814.867095] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1814.872213] __kmalloc_node+0x3d/0x80 [ 1814.876009] kvmalloc_node+0x4e/0xe0 [ 1814.879710] bucket_table_alloc+0x3cd/0x5d0 [ 1814.884014] rhashtable_init+0x4a0/0x810 [ 1814.888089] ipc_init_ids+0xc6/0x1e0 [ 1814.891884] msg_init_ns+0x12f/0x160 [ 1814.895592] copy_ipcs+0x317/0x400 [ 1814.899131] create_new_namespaces+0x1dd/0x720 [ 1814.903710] ? ns_capable_common+0x12c/0x160 [ 1814.908102] copy_namespaces+0x284/0x310 [ 1814.912157] copy_process.part.0+0x2603/0x6a70 [ 1814.916732] ? debug_smp_processor_id+0x1c/0x20 [ 1814.921393] ? perf_trace_lock+0x109/0x500 [ 1814.925618] ? check_preemption_disabled+0x3c/0x250 [ 1814.930644] ? debug_smp_processor_id+0x1c/0x20 [ 1814.935360] ? __cleanup_sighand+0x50/0x50 [ 1814.939581] ? lock_downgrade+0x740/0x740 [ 1814.943753] _do_fork+0x19e/0xce0 [ 1814.947251] ? fork_idle+0x280/0x280 [ 1814.950964] ? fput+0xd4/0x150 [ 1814.954160] ? SyS_write+0x15e/0x230 [ 1814.957865] SyS_clone+0x37/0x50 [ 1814.961222] ? sys_vfork+0x30/0x30 [ 1814.964771] do_syscall_64+0x1e8/0x640 [ 1814.968655] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1814.973583] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1814.978761] RIP: 0033:0x45a919 [ 1814.982032] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1814.989731] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1814.996989] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1815.004247] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1815.011506] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1815.018766] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1815.440126] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.440129] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.440193] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.445250] protocol 88fb is buggy, dev hsr_slave_1 [ 1815.450288] protocol 88fb is buggy, dev hsr_slave_0 [ 1815.455266] protocol 88fb is buggy, dev hsr_slave_0 09:38:18 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:18 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x130010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc043}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0xd) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0xffffff03) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:18 executing program 2 (fault-call:3 fault-nth:21): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:18 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r4, 0x84, 0x1e, &(0x7f00000000c0)=0x6, 0x4) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000040)={{0x7, 0x9, 0x1, 0x4c, 0x9, 0x80}, 0x200}) ioctl$KVM_SET_SREGS(r6, 0x4138ae84, &(0x7f0000000100)={{0x6000, 0x3000, 0x4, 0x3, 0x97, 0x9c, 0x2, 0x1f, 0x1, 0x40, 0x80, 0x66}, {0x5000, 0x6004, 0xe, 0x2c, 0x99, 0xf7, 0x2, 0x1, 0x80, 0x5, 0x1, 0x6}, {0x2000, 0xd000, 0xe, 0x1f, 0x9, 0x5, 0x9, 0x80, 0x0, 0xb, 0x81, 0xec}, {0x2, 0x11000, 0x0, 0x7f, 0x3, 0x7, 0x1f, 0x8, 0x0, 0x3f, 0x4, 0x5}, {0xe004, 0x5000, 0xa, 0x4, 0x80, 0x10, 0x0, 0xff, 0x0, 0x7, 0x7, 0x83}, {0x109000, 0x6000, 0xa, 0x81, 0xaf, 0x1f, 0x0, 0x4a, 0x8, 0x67, 0x8, 0x5}, {0x5000, 0x355ec8d8942f8674, 0x195f79019c83af81, 0x0, 0xed, 0x9f, 0x8, 0x5, 0xff, 0x1f, 0x0, 0x9}, {0x0, 0x1a000, 0xb, 0x7f, 0x8, 0x25, 0x5, 0x0, 0x3f, 0x6}, {0x4, 0x12000}, {0x4000, 0x2000}, 0x80000000, 0x0, 0x2000, 0x400, 0xa, 0x18901, 0x2, [0x6, 0x7ff, 0x89, 0x3]}) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) openat$fb0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fb0\x00', 0x402, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r8 = socket$inet(0x10, 0x2, 0x0) r9 = dup(r8) sendfile(r9, r7, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SCSI_IOCTL_SYNC(r7, 0x4) 09:38:18 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 1817.437838] FAULT_INJECTION: forcing a failure. [ 1817.437838] name failslab, interval 1, probability 0, space 0, times 0 [ 1817.458170] ptrace attach of "/root/syz-executor.1"[24791] was attempted by "/root/syz-executor.1"[24797] [ 1817.474254] CPU: 0 PID: 24794 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1817.482158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1817.482163] Call Trace: [ 1817.482181] dump_stack+0x142/0x197 [ 1817.482199] should_fail.cold+0x10f/0x159 [ 1817.501908] should_failslab+0xdb/0x130 [ 1817.505887] kmem_cache_alloc_node_trace+0x280/0x770 [ 1817.510993] ? trace_hardirqs_on_caller+0x400/0x590 [ 1817.516006] ? kasan_unpoison_shadow+0x35/0x50 [ 1817.520596] __kmalloc_node+0x3d/0x80 [ 1817.524423] kvmalloc_node+0x4e/0xe0 [ 1817.528143] bucket_table_alloc+0x160/0x5d0 [ 1817.532474] rhashtable_init+0x4a0/0x810 [ 1817.536559] ipc_init_ids+0xc6/0x1e0 [ 1817.540276] msg_init_ns+0x12f/0x160 [ 1817.543989] copy_ipcs+0x317/0x400 [ 1817.547539] create_new_namespaces+0x1dd/0x720 [ 1817.552146] ? ns_capable_common+0x12c/0x160 [ 1817.556562] copy_namespaces+0x284/0x310 [ 1817.560640] copy_process.part.0+0x2603/0x6a70 [ 1817.564752] ptrace attach of "/root/syz-executor.1"[24808] was attempted by "/root/syz-executor.1"[24809] [ 1817.565219] ? debug_smp_processor_id+0x1c/0x20 [ 1817.579668] ? perf_trace_lock+0x109/0x500 09:38:18 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:18 executing program 1: clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1817.583904] ? check_preemption_disabled+0x3c/0x250 [ 1817.588921] ? debug_smp_processor_id+0x1c/0x20 [ 1817.593602] ? __cleanup_sighand+0x50/0x50 [ 1817.597836] ? lock_downgrade+0x740/0x740 [ 1817.602001] _do_fork+0x19e/0xce0 [ 1817.605459] ? fork_idle+0x280/0x280 [ 1817.609181] ? fput+0xd4/0x150 [ 1817.612396] ? SyS_write+0x15e/0x230 [ 1817.616112] SyS_clone+0x37/0x50 [ 1817.619489] ? sys_vfork+0x30/0x30 [ 1817.623038] do_syscall_64+0x1e8/0x640 [ 1817.626930] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1817.631786] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1817.636970] RIP: 0033:0x45a919 [ 1817.640155] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1817.647866] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1817.648766] ptrace attach of "/root/syz-executor.1"[24813] was attempted by "/root/syz-executor.1"[24814] [ 1817.655130] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1817.655137] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1817.655143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 09:38:18 executing program 2 (fault-call:3 fault-nth:22): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1817.655149] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:18 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) dup(r0) dup(r0) close(0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1817.796216] FAULT_INJECTION: forcing a failure. [ 1817.796216] name failslab, interval 1, probability 0, space 0, times 0 [ 1817.816459] CPU: 1 PID: 24825 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1817.824384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1817.833744] Call Trace: [ 1817.836346] dump_stack+0x142/0x197 [ 1817.839995] should_fail.cold+0x10f/0x159 [ 1817.844157] should_failslab+0xdb/0x130 [ 1817.848151] kmem_cache_alloc_node_trace+0x280/0x770 [ 1817.853257] ? trace_hardirqs_on_caller+0x400/0x590 [ 1817.858287] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 1817.863393] __kmalloc_node+0x3d/0x80 [ 1817.867189] kvmalloc_node+0x4e/0xe0 [ 1817.870905] bucket_table_alloc+0x3cd/0x5d0 [ 1817.875236] rhashtable_init+0x4a0/0x810 [ 1817.879302] ipc_init_ids+0xc6/0x1e0 [ 1817.883021] shm_init_ns+0x105/0x140 [ 1817.886744] copy_ipcs+0x32b/0x400 [ 1817.890288] create_new_namespaces+0x1dd/0x720 [ 1817.894854] ? ns_capable_common+0x12c/0x160 [ 1817.899244] copy_namespaces+0x284/0x310 [ 1817.903290] copy_process.part.0+0x2603/0x6a70 [ 1817.907856] ? debug_smp_processor_id+0x1c/0x20 [ 1817.912511] ? perf_trace_lock+0x109/0x500 [ 1817.916724] ? check_preemption_disabled+0x3c/0x250 [ 1817.921725] ? debug_smp_processor_id+0x1c/0x20 [ 1817.926385] ? __cleanup_sighand+0x50/0x50 [ 1817.930611] ? lock_downgrade+0x740/0x740 [ 1817.934744] _do_fork+0x19e/0xce0 [ 1817.938208] ? fork_idle+0x280/0x280 [ 1817.941906] ? fput+0xd4/0x150 [ 1817.945079] ? SyS_write+0x15e/0x230 [ 1817.948775] SyS_clone+0x37/0x50 [ 1817.952119] ? sys_vfork+0x30/0x30 [ 1817.955653] do_syscall_64+0x1e8/0x640 [ 1817.959539] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1817.964373] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1817.969544] RIP: 0033:0x45a919 [ 1817.972715] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1817.980407] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1817.987665] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1817.994952] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1818.002204] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1818.009454] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1819.680137] net_ratelimit: 22 callbacks suppressed [ 1819.680143] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.690295] protocol 88fb is buggy, dev hsr_slave_1 [ 1819.695381] protocol 88fb is buggy, dev hsr_slave_0 [ 1819.700502] protocol 88fb is buggy, dev hsr_slave_1 09:38:21 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:21 executing program 2 (fault-call:3 fault-nth:23): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:21 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:21 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) [ 1820.509997] FAULT_INJECTION: forcing a failure. [ 1820.509997] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.515079] selinux_nlmsg_perm: 110 callbacks suppressed [ 1820.515089] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.555729] CPU: 1 PID: 24852 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1820.563639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.567932] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.572986] Call Trace: [ 1820.573019] dump_stack+0x142/0x197 [ 1820.573039] should_fail.cold+0x10f/0x159 [ 1820.573074] should_failslab+0xdb/0x130 [ 1820.573085] kmem_cache_alloc_node_trace+0x280/0x770 [ 1820.573097] ? trace_hardirqs_on_caller+0x400/0x590 [ 1820.573109] ? kasan_unpoison_shadow+0x35/0x50 [ 1820.573125] __kmalloc_node+0x3d/0x80 [ 1820.573137] kvmalloc_node+0x4e/0xe0 [ 1820.573152] bucket_table_alloc+0x160/0x5d0 [ 1820.592344] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.595516] rhashtable_init+0x4a0/0x810 [ 1820.595532] ipc_init_ids+0xc6/0x1e0 [ 1820.595544] shm_init_ns+0x105/0x140 [ 1820.595552] copy_ipcs+0x32b/0x400 [ 1820.595566] create_new_namespaces+0x1dd/0x720 [ 1820.606268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.609634] ? ns_capable_common+0x12c/0x160 [ 1820.609651] copy_namespaces+0x284/0x310 [ 1820.609665] copy_process.part.0+0x2603/0x6a70 [ 1820.609678] ? debug_smp_processor_id+0x1c/0x20 [ 1820.609690] ? perf_trace_lock+0x109/0x500 [ 1820.616444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.618043] ? check_preemption_disabled+0x3c/0x250 09:38:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1820.618058] ? debug_smp_processor_id+0x1c/0x20 [ 1820.618082] ? __cleanup_sighand+0x50/0x50 [ 1820.618093] ? lock_downgrade+0x740/0x740 [ 1820.618109] _do_fork+0x19e/0xce0 [ 1820.629768] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.638240] ? fork_idle+0x280/0x280 [ 1820.638255] ? fput+0xd4/0x150 [ 1820.638265] ? SyS_write+0x15e/0x230 [ 1820.638280] SyS_clone+0x37/0x50 [ 1820.638288] ? sys_vfork+0x30/0x30 [ 1820.638302] do_syscall_64+0x1e8/0x640 09:38:21 executing program 2 (fault-call:3 fault-nth:24): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1820.638311] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1820.638328] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1820.649211] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.649766] RIP: 0033:0x45a919 [ 1820.655079] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.657852] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1820.657865] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1820.657871] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1820.657878] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1820.657884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1820.657890] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1820.725270] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 09:38:22 executing program 3: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$SEG6_CMD_GET_TUNSRC(0xffffffffffffffff, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f00000000c0)="0f20d86635200000000f22d826d33566b91109000066b80060000066ba000000000f306766c74424000d0000006766c7442402f60000006766c744240600000000670f0114246766c74424003f8c00006766c7442402e4d400006766c744240600000000670f011424660f38827500b8dd000f00d80f21f30f01c3ddc3", 0x7d}], 0xb, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(0xffffffffffffffff, 0x4040ae75, &(0x7f00000001c0)={0x0, 0x8, 0x2}) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x7494c1, 0x0) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x24000004) listen(0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x0, 0x0) r3 = open(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0000000056ed", @ANYBLOB], 0x2}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) r7 = accept4$rose(r3, &(0x7f0000000200)=@full={0xb, @remote, @bcast, 0x0, [@rose, @rose, @remote, @bcast, @bcast, @default]}, &(0x7f0000000240)=0x40, 0x80800) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x89e2, &(0x7f0000000280)={r7}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = msgget$private(0x0, 0x0) msgrcv(r8, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r8, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(r1) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0xfffffffffffffffc, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1820.791843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24853 comm=syz-executor.3 [ 1820.812890] FAULT_INJECTION: forcing a failure. [ 1820.812890] name failslab, interval 1, probability 0, space 0, times 0 [ 1820.880119] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.885267] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.927699] CPU: 1 PID: 24873 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1820.935627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1820.944983] Call Trace: [ 1820.947576] dump_stack+0x142/0x197 [ 1820.951214] should_fail.cold+0x10f/0x159 [ 1820.955393] should_failslab+0xdb/0x130 [ 1820.959379] kmem_cache_alloc+0x2d7/0x780 [ 1820.960118] protocol 88fb is buggy, dev hsr_slave_0 [ 1820.963529] ? __lockdep_init_map+0x10c/0x570 [ 1820.963549] alloc_vfsmnt+0x28/0x7d0 09:38:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffeeb) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x19f) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1820.963563] vfs_kern_mount.part.0+0x2a/0x3d0 [ 1820.963576] kern_mount_data+0x56/0xc0 [ 1820.963589] mq_init_ns+0x167/0x220 [ 1820.968665] protocol 88fb is buggy, dev hsr_slave_1 [ 1820.973081] copy_ipcs+0x35e/0x400 [ 1820.973095] create_new_namespaces+0x1dd/0x720 [ 1820.973106] ? ns_capable_common+0x12c/0x160 [ 1820.973119] copy_namespaces+0x284/0x310 [ 1820.973131] copy_process.part.0+0x2603/0x6a70 [ 1821.014933] ? debug_smp_processor_id+0x1c/0x20 [ 1821.019614] ? perf_trace_lock+0x109/0x500 [ 1821.023859] ? check_preemption_disabled+0x3c/0x250 [ 1821.028882] ? debug_smp_processor_id+0x1c/0x20 [ 1821.028907] ? __cleanup_sighand+0x50/0x50 [ 1821.028920] ? lock_downgrade+0x740/0x740 [ 1821.041960] _do_fork+0x19e/0xce0 [ 1821.045419] ? fork_idle+0x280/0x280 [ 1821.049135] ? fput+0xd4/0x150 [ 1821.049146] ? SyS_write+0x15e/0x230 [ 1821.049162] SyS_clone+0x37/0x50 [ 1821.049170] ? sys_vfork+0x30/0x30 [ 1821.049182] do_syscall_64+0x1e8/0x640 [ 1821.049193] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1821.071680] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1821.076871] RIP: 0033:0x45a919 [ 1821.080060] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1821.087776] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1821.095046] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1821.102312] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1821.109582] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1821.116861] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1821.690110] protocol 88fb is buggy, dev hsr_slave_0 [ 1821.695345] protocol 88fb is buggy, dev hsr_slave_1 09:38:25 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 09:38:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_config_ext={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = syz_open_procfs(0x0, 0x0) socket(0x4, 0x5, 0xcc) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) dup(r0) close(0xffffffffffffffff) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r5 = gettid() kcmp(r5, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xe, r6, 0x4, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r4, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x2}) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:25 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:25 executing program 2 (fault-call:3 fault-nth:25): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:25 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:25 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) 09:38:25 executing program 0: openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, 0x0, 0x0, 0x0) [ 1824.121801] FAULT_INJECTION: forcing a failure. [ 1824.121801] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1824.134299] CPU: 1 PID: 24926 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1824.142202] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.151547] Call Trace: [ 1824.154122] dump_stack+0x142/0x197 [ 1824.157753] should_fail.cold+0x10f/0x159 [ 1824.161914] ? __might_sleep+0x93/0xb0 [ 1824.165810] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1824.170484] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1824.175514] alloc_pages_current+0xec/0x1e0 [ 1824.179843] __get_free_pages+0xf/0x40 [ 1824.183725] get_zeroed_page+0x11/0x20 [ 1824.187610] mount_fs+0x1cc/0x2a1 [ 1824.191086] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1824.195585] kern_mount_data+0x56/0xc0 [ 1824.199480] mq_init_ns+0x167/0x220 [ 1824.203118] copy_ipcs+0x35e/0x400 [ 1824.206665] create_new_namespaces+0x1dd/0x720 [ 1824.211256] ? ns_capable_common+0x12c/0x160 [ 1824.215668] copy_namespaces+0x284/0x310 09:38:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x2000, 0x0) pipe2(&(0x7f00000000c0), 0x800) creat(&(0x7f0000000100)='./file0\x00', 0x17) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, r7}) [ 1824.215683] copy_process.part.0+0x2603/0x6a70 [ 1824.215696] ? debug_smp_processor_id+0x1c/0x20 [ 1824.215707] ? perf_trace_lock+0x109/0x500 [ 1824.215716] ? check_preemption_disabled+0x3c/0x250 [ 1824.215728] ? debug_smp_processor_id+0x1c/0x20 [ 1824.229025] ? __cleanup_sighand+0x50/0x50 [ 1824.229038] ? lock_downgrade+0x740/0x740 [ 1824.229055] _do_fork+0x19e/0xce0 [ 1824.229069] ? fork_idle+0x280/0x280 [ 1824.258530] ? fput+0xd4/0x150 [ 1824.261720] ? SyS_write+0x15e/0x230 [ 1824.265439] SyS_clone+0x37/0x50 [ 1824.268805] ? sys_vfork+0x30/0x30 [ 1824.272363] do_syscall_64+0x1e8/0x640 [ 1824.276274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1824.281127] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1824.286322] RIP: 0033:0x45a919 [ 1824.289505] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1824.297220] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1824.304486] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1824.311750] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 09:38:25 executing program 2 (fault-call:3 fault-nth:26): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1824.319026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1824.326286] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:25 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x2280, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000140)={r1, 0x14cd4bb, 0x3ff}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7, 0x200801) setsockopt$inet_tcp_int(r3, 0x6, 0x12, &(0x7f0000000040)=0x8, 0x4) r4 = msgget$private(0x0, 0x0) connect$rds(r3, &(0x7f0000000240)={0x2, 0x4e24, @empty}, 0x10) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000180)={0x9, 0x8, 0x0, 'queue0\x00', 0x167}) msgrcv(0xffffffffffffffff, 0x0, 0xffffffffffffff20, 0x3, 0x1000) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r6 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x2, 0x0) bind$bt_l2cap(r6, &(0x7f00000002c0)={0x1f, 0x4, {0x83, 0x20, 0x6, 0x9, 0x64, 0x20}, 0x8, 0x35}, 0xe) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getresuid(&(0x7f0000000380)=0x0, &(0x7f0000000440), &(0x7f0000000480)) msgctl$IPC_SET(r4, 0x1, &(0x7f00000003c0)={{0x2, r8, 0x0, 0xffffffffffffffff, 0x0, 0x1, 0x200}, 0x0, 0x1, 0x0, 0x26, 0x0, 0x9, 0x0, 0x401, 0x0, 0x3, r2, r7}) r9 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ocfs2_control\x00', 0x40002, 0x0) connect$nfc_raw(r9, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x1cb9cafa32344be1}, 0x10) 09:38:25 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000040)=0x3, 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r0, 0x806c4120, &(0x7f0000000080)) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) [ 1824.438496] FAULT_INJECTION: forcing a failure. [ 1824.438496] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1824.450340] CPU: 0 PID: 24958 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1824.458263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1824.467608] Call Trace: [ 1824.470203] dump_stack+0x142/0x197 [ 1824.473836] should_fail.cold+0x10f/0x159 [ 1824.477980] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1824.482654] ? fs_reclaim_acquire+0x20/0x20 09:38:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) symlinkat(&(0x7f0000000000)='./file0\x00', r1, &(0x7f0000000040)='./file0\x00') [ 1824.487001] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1824.492033] cache_grow_begin+0x80/0x400 [ 1824.496104] kmem_cache_alloc+0x6a6/0x780 [ 1824.500261] ? __lockdep_init_map+0x10c/0x570 [ 1824.504769] alloc_vfsmnt+0x28/0x7d0 [ 1824.508489] vfs_kern_mount.part.0+0x2a/0x3d0 [ 1824.512993] kern_mount_data+0x56/0xc0 [ 1824.516894] mq_init_ns+0x167/0x220 [ 1824.520527] copy_ipcs+0x35e/0x400 [ 1824.524068] create_new_namespaces+0x1dd/0x720 [ 1824.528654] ? ns_capable_common+0x12c/0x160 [ 1824.528668] copy_namespaces+0x284/0x310 [ 1824.528680] copy_process.part.0+0x2603/0x6a70 [ 1824.541699] ? debug_smp_processor_id+0x1c/0x20 [ 1824.546369] ? perf_trace_lock+0x109/0x500 [ 1824.550602] ? check_preemption_disabled+0x3c/0x250 [ 1824.555619] ? debug_smp_processor_id+0x1c/0x20 [ 1824.560317] ? __cleanup_sighand+0x50/0x50 [ 1824.564555] ? lock_downgrade+0x740/0x740 [ 1824.568715] _do_fork+0x19e/0xce0 [ 1824.572176] ? fork_idle+0x280/0x280 [ 1824.575898] ? fput+0xd4/0x150 [ 1824.579095] ? SyS_write+0x15e/0x230 [ 1824.582815] SyS_clone+0x37/0x50 09:38:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() r3 = getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r4 = getpgrp(r3) ptrace$getregs(0xffffffffffffffff, r4, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r2, 0xffffffffffffffff, 0x0, 0xfffffffffffffe27, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x369) [ 1824.586180] ? sys_vfork+0x30/0x30 [ 1824.589734] do_syscall_64+0x1e8/0x640 [ 1824.593643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1824.598497] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1824.603687] RIP: 0033:0x45a919 [ 1824.606878] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1824.614595] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1824.621860] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1824.621867] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 09:38:25 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) r4 = socket$inet(0x10, 0x2, 0x0) dup(r4) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0xffff, 0x4}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000080)={r5, @in6={{0xa, 0x4e21, 0x8, @ipv4={[], [], @broadcast}, 0xff}}, 0x10000, 0x0, 0xde3c, 0xd9, 0x8, 0x6}, 0x9c) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) [ 1824.621873] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1824.621878] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1825.040146] net_ratelimit: 18 callbacks suppressed [ 1825.040151] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.050201] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.120152] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.125270] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.553159] selinux_nlmsg_perm: 86 callbacks suppressed [ 1825.553169] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.572012] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.585482] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.599530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.612671] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.625893] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.638849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.651771] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=24996 comm=syz-executor.3 [ 1825.850095] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.855247] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.860354] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.865387] protocol 88fb is buggy, dev hsr_slave_1 [ 1825.920107] protocol 88fb is buggy, dev hsr_slave_0 [ 1825.925196] protocol 88fb is buggy, dev hsr_slave_1 09:38:28 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, 0x0, 0x8000, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:28 executing program 2 (fault-call:3 fault-nth:27): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) ptrace$getregs(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) r5 = socket$inet(0x10, 0x2, 0x0) dup(r5) writev(r5, 0x0, 0xfffffeca) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:28 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) modify_ldt$write(0x1, &(0x7f0000000000)={0xffffffff, 0x20000000, 0x400, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1}, 0x10) r1 = msgget(0x2, 0x0) msgctl$MSG_STAT(r1, 0xb, 0x0) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, 0x0) msgrcv(r2, 0x0, 0x0, 0x3, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffc}) r3 = socket$inet(0x10, 0x2, 0x0) dup(r3) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x80000000}, @sack_perm, @window={0x3, 0x30, 0x8}, @mss, @sack_perm, @sack_perm, @window={0x3, 0x6, 0x9}], 0x7) 09:38:28 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:28 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9}, 0x0) sched_setattr(0x0, 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f00000001c0)={{}, {}, {}, {0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, [0x0, 0x80000]}) 09:38:28 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) msgctl$IPC_SET(r0, 0x1, &(0x7f00000000c0)={{0x2, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) ioctl$SNDCTL_DSP_STEREO(r4, 0xc0045003, &(0x7f0000000000)) [ 1827.194506] FAULT_INJECTION: forcing a failure. [ 1827.194506] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.225530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25006 comm=syz-executor.5 [ 1827.228410] CPU: 0 PID: 25005 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1827.245531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.254885] Call Trace: [ 1827.257476] dump_stack+0x142/0x197 [ 1827.257878] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25006 comm=syz-executor.5 [ 1827.261100] should_fail.cold+0x10f/0x159 [ 1827.261117] should_failslab+0xdb/0x130 [ 1827.261128] kmem_cache_alloc_trace+0x2e9/0x790 [ 1827.261138] ? lock_downgrade+0x740/0x740 [ 1827.261149] ? do_raw_spin_unlock+0x16b/0x260 [ 1827.261161] sget_userns+0xfe/0xc30 [ 1827.261168] ? set_anon_super+0x20/0x20 [ 1827.261178] ? __free_pages+0x54/0x90 [ 1827.261190] ? get_empty_filp.cold+0x3b/0x3b [ 1827.310417] mount_ns+0x6d/0x190 [ 1827.313768] ? mqueue_get_inode+0xaf0/0xaf0 [ 1827.318073] mqueue_mount+0xc0/0xf0 [ 1827.321684] mount_fs+0x97/0x2a1 [ 1827.325037] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1827.329514] kern_mount_data+0x56/0xc0 [ 1827.333385] mq_init_ns+0x167/0x220 [ 1827.336993] copy_ipcs+0x35e/0x400 [ 1827.340516] create_new_namespaces+0x1dd/0x720 [ 1827.345085] ? ns_capable_common+0x12c/0x160 [ 1827.349480] copy_namespaces+0x284/0x310 [ 1827.353530] copy_process.part.0+0x2603/0x6a70 [ 1827.358109] ? debug_smp_processor_id+0x1c/0x20 [ 1827.362787] ? perf_trace_lock+0x109/0x500 [ 1827.367009] ? check_preemption_disabled+0x3c/0x250 [ 1827.372010] ? debug_smp_processor_id+0x1c/0x20 [ 1827.376668] ? __cleanup_sighand+0x50/0x50 [ 1827.380883] ? lock_downgrade+0x740/0x740 [ 1827.385016] _do_fork+0x19e/0xce0 [ 1827.388461] ? fork_idle+0x280/0x280 [ 1827.392161] ? fput+0xd4/0x150 [ 1827.395335] ? SyS_write+0x15e/0x230 [ 1827.399035] SyS_clone+0x37/0x50 [ 1827.402386] ? sys_vfork+0x30/0x30 [ 1827.405913] do_syscall_64+0x1e8/0x640 [ 1827.409783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1827.414613] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1827.419783] RIP: 0033:0x45a919 [ 1827.422954] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1827.430642] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1827.437979] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1827.445238] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1827.452488] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1827.459734] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xff8a) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ptrace$getregs(0xe, r2, 0x7f9, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:28 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) writev(r0, &(0x7f00000012c0)=[{&(0x7f0000000200)="bb", 0x1}], 0x1) 09:38:28 executing program 2 (fault-call:3 fault-nth:28): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1827.593375] FAULT_INJECTION: forcing a failure. [ 1827.593375] name failslab, interval 1, probability 0, space 0, times 0 [ 1827.605753] CPU: 0 PID: 25035 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1827.613665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1827.623022] Call Trace: [ 1827.625621] dump_stack+0x142/0x197 [ 1827.629264] should_fail.cold+0x10f/0x159 [ 1827.633417] should_failslab+0xdb/0x130 [ 1827.637397] kmem_cache_alloc_trace+0x2e9/0x790 [ 1827.642069] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1827.647520] ? sget_userns+0xfe/0xc30 [ 1827.651318] ? rcu_read_lock_sched_held+0x110/0x130 [ 1827.656428] selinux_sb_alloc_security+0x46/0x220 [ 1827.661274] security_sb_alloc+0x6d/0xa0 [ 1827.665340] sget_userns+0x196/0xc30 [ 1827.669058] ? set_anon_super+0x20/0x20 [ 1827.673045] ? __free_pages+0x54/0x90 [ 1827.676859] ? get_empty_filp.cold+0x3b/0x3b [ 1827.681278] mount_ns+0x6d/0x190 [ 1827.684648] ? mqueue_get_inode+0xaf0/0xaf0 [ 1827.688970] mqueue_mount+0xc0/0xf0 [ 1827.692586] mount_fs+0x97/0x2a1 [ 1827.692600] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1827.692629] kern_mount_data+0x56/0xc0 [ 1827.692640] mq_init_ns+0x167/0x220 [ 1827.692650] copy_ipcs+0x35e/0x400 [ 1827.692665] create_new_namespaces+0x1dd/0x720 [ 1827.692676] ? ns_capable_common+0x12c/0x160 [ 1827.692689] copy_namespaces+0x284/0x310 [ 1827.692702] copy_process.part.0+0x2603/0x6a70 [ 1827.692713] ? debug_smp_processor_id+0x1c/0x20 [ 1827.692723] ? perf_trace_lock+0x109/0x500 [ 1827.692734] ? check_preemption_disabled+0x3c/0x250 09:38:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000000)) getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) syz_open_procfs(r3, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r4 = gettid() kcmp(r4, r4, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1827.711601] ? debug_smp_processor_id+0x1c/0x20 [ 1827.711623] ? __cleanup_sighand+0x50/0x50 [ 1827.729637] ? lock_downgrade+0x740/0x740 [ 1827.729653] _do_fork+0x19e/0xce0 [ 1827.729666] ? fork_idle+0x280/0x280 [ 1827.763702] ? fput+0xd4/0x150 [ 1827.766890] ? SyS_write+0x15e/0x230 [ 1827.770629] SyS_clone+0x37/0x50 [ 1827.773995] ? sys_vfork+0x30/0x30 [ 1827.777539] do_syscall_64+0x1e8/0x640 [ 1827.781427] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1827.786278] entry_SYSCALL_64_after_hwframe+0x42/0xb7 09:38:28 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='coredump_filter\x00') preadv(r0, &(0x7f00000017c0), 0x1a4, 0x0) [ 1827.791468] RIP: 0033:0x45a919 [ 1827.794673] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1827.802379] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1827.809645] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1827.816913] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1827.824535] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1827.831800] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1830.080185] net_ratelimit: 22 callbacks suppressed [ 1830.080189] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.090272] protocol 88fb is buggy, dev hsr_slave_1 [ 1830.095366] protocol 88fb is buggy, dev hsr_slave_0 [ 1830.100476] protocol 88fb is buggy, dev hsr_slave_1 09:38:31 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:31 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) 09:38:31 executing program 2 (fault-call:3 fault-nth:29): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7fffffff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x0, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) bind$bt_l2cap(r6, &(0x7f0000000080), 0xe) listen(r6, 0x0) getsockopt$bt_BT_DEFER_SETUP(r6, 0x112, 0x7, &(0x7f00000000c0), &(0x7f00000001c0)=0x4) sendmsg$key(0xffffffffffffffff, 0x0, 0x4040841) r7 = gettid() r8 = gettid() kcmp(r7, r8, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x15a) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) 09:38:31 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x80) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") r1 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000140)={{{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in=@local, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@empty, 0x0, 0x32}, 0x0, @in=@dev, 0x0, 0x0, 0x0, 0xe5}}, 0xe8) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) write(r1, 0x0, 0x0) 09:38:31 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1830.284710] FAULT_INJECTION: forcing a failure. [ 1830.284710] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1830.296566] CPU: 0 PID: 25061 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1830.304450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.313807] Call Trace: [ 1830.316403] dump_stack+0x142/0x197 [ 1830.320041] should_fail.cold+0x10f/0x159 [ 1830.324206] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1830.328883] ? ____cache_alloc_node+0x162/0x1d0 [ 1830.333561] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1830.338590] ? ____cache_alloc_node+0x162/0x1d0 [ 1830.343272] cache_grow_begin+0x80/0x400 [ 1830.347346] ____cache_alloc_node+0x17c/0x1d0 [ 1830.351850] kmem_cache_alloc_trace+0x213/0x790 [ 1830.356524] ? lock_downgrade+0x740/0x740 [ 1830.360679] sget_userns+0xfe/0xc30 [ 1830.364308] ? set_anon_super+0x20/0x20 [ 1830.364320] ? __free_pages+0x54/0x90 [ 1830.364330] ? get_empty_filp.cold+0x3b/0x3b [ 1830.364342] mount_ns+0x6d/0x190 [ 1830.379863] ? mqueue_get_inode+0xaf0/0xaf0 09:38:31 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1830.384198] mqueue_mount+0xc0/0xf0 [ 1830.387836] mount_fs+0x97/0x2a1 [ 1830.391212] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1830.395711] kern_mount_data+0x56/0xc0 [ 1830.399600] mq_init_ns+0x167/0x220 [ 1830.403242] copy_ipcs+0x35e/0x400 [ 1830.406790] create_new_namespaces+0x1dd/0x720 [ 1830.411379] ? ns_capable_common+0x12c/0x160 [ 1830.415804] copy_namespaces+0x284/0x310 [ 1830.419877] copy_process.part.0+0x2603/0x6a70 [ 1830.424462] ? debug_smp_processor_id+0x1c/0x20 [ 1830.429128] ? perf_trace_lock+0x109/0x500 [ 1830.433488] ? check_preemption_disabled+0x3c/0x250 [ 1830.438488] ? debug_smp_processor_id+0x1c/0x20 [ 1830.443143] ? __cleanup_sighand+0x50/0x50 [ 1830.447357] ? lock_downgrade+0x740/0x740 [ 1830.451489] _do_fork+0x19e/0xce0 [ 1830.455449] ? fork_idle+0x280/0x280 [ 1830.459142] ? fput+0xd4/0x150 [ 1830.462360] ? SyS_write+0x15e/0x230 [ 1830.466092] SyS_clone+0x37/0x50 [ 1830.469436] ? sys_vfork+0x30/0x30 [ 1830.472968] do_syscall_64+0x1e8/0x640 [ 1830.477195] ? trace_hardirqs_off_thunk+0x1a/0x1c 09:38:31 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = socket$inet(0x10, 0x2, 0x0) r3 = dup(r2) sendfile(r3, r1, &(0x7f0000000040)=0x103000, 0x8001) ioctl$PPPIOCGUNIT(r1, 0x80047456, &(0x7f0000000000)) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsa\x00', 0x4000, 0x0) ioctl$SNDRV_PCM_IOCTL_START(r4, 0x4142, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) socket(0x2, 0x0, 0x0) setsockopt$inet_opts(r1, 0x0, 0x4, &(0x7f00000000c0)="b96c791efaca381995cfa17553e4d1aea8d39fce2a39c1a481c5964fdadf988b6586c21e602df4075946bfc3288379eac267613a7c4fcd682c19f22b4de649cb6360b7a88608193b2d59d1f2c73e5b", 0x4f) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:31 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) 09:38:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x40) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1830.482036] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1830.482045] RIP: 0033:0x45a919 [ 1830.482050] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1830.498094] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1830.505384] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1830.505392] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1830.505398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1830.505404] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:31 executing program 2 (fault-call:3 fault-nth:30): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1830.569538] selinux_nlmsg_perm: 78 callbacks suppressed [ 1830.569547] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 09:38:31 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) [ 1830.628947] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1830.636925] FAULT_INJECTION: forcing a failure. [ 1830.636925] name failslab, interval 1, probability 0, space 0, times 0 [ 1830.649497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1830.673446] CPU: 0 PID: 25097 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1830.681345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1830.690692] Call Trace: [ 1830.693362] dump_stack+0x142/0x197 [ 1830.696974] should_fail.cold+0x10f/0x159 [ 1830.701105] should_failslab+0xdb/0x130 [ 1830.705056] __kmalloc+0x2f0/0x7a0 [ 1830.708577] ? __list_lru_init+0x6b/0x660 [ 1830.712705] __list_lru_init+0x6b/0x660 [ 1830.716664] sget_userns+0x500/0xc30 [ 1830.720360] ? set_anon_super+0x20/0x20 [ 1830.724333] ? get_empty_filp.cold+0x3b/0x3b [ 1830.728723] mount_ns+0x6d/0x190 [ 1830.732067] ? mqueue_get_inode+0xaf0/0xaf0 [ 1830.736371] mqueue_mount+0xc0/0xf0 [ 1830.740002] mount_fs+0x97/0x2a1 [ 1830.743369] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1830.747850] kern_mount_data+0x56/0xc0 [ 1830.751718] mq_init_ns+0x167/0x220 [ 1830.755322] copy_ipcs+0x35e/0x400 [ 1830.758847] create_new_namespaces+0x1dd/0x720 [ 1830.763409] ? ns_capable_common+0x12c/0x160 [ 1830.767801] copy_namespaces+0x284/0x310 [ 1830.771852] copy_process.part.0+0x2603/0x6a70 [ 1830.776417] ? debug_smp_processor_id+0x1c/0x20 [ 1830.781069] ? perf_trace_lock+0x109/0x500 [ 1830.785281] ? check_preemption_disabled+0x3c/0x250 [ 1830.790283] ? debug_smp_processor_id+0x1c/0x20 [ 1830.794957] ? __cleanup_sighand+0x50/0x50 [ 1830.799174] ? lock_downgrade+0x740/0x740 [ 1830.803307] _do_fork+0x19e/0xce0 [ 1830.806744] ? fork_idle+0x280/0x280 [ 1830.810441] ? fput+0xd4/0x150 [ 1830.813613] ? SyS_write+0x15e/0x230 [ 1830.817313] SyS_clone+0x37/0x50 [ 1830.820672] ? sys_vfork+0x30/0x30 [ 1830.824207] do_syscall_64+0x1e8/0x640 [ 1830.828072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1830.832914] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1830.838083] RIP: 0033:0x45a919 [ 1830.841257] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1830.848960] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1830.856217] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1830.863475] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1830.870728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1830.877990] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1830.907062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1830.933349] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1830.979353] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1830.998834] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1831.012422] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25088 comm=syz-executor.3 [ 1831.280111] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.285221] protocol 88fb is buggy, dev hsr_slave_1 [ 1831.360138] protocol 88fb is buggy, dev hsr_slave_0 [ 1831.365264] protocol 88fb is buggy, dev hsr_slave_1 [ 1832.080137] protocol 88fb is buggy, dev hsr_slave_0 [ 1832.085226] protocol 88fb is buggy, dev hsr_slave_1 09:38:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:34 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) 09:38:34 executing program 2 (fault-call:3 fault-nth:31): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x401}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x1a1) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffdc0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r2 = getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) dup(r3) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000000)) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getpgid(r2) r5 = getpgid(0x0) r6 = getpgrp(r5) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x5) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:34 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r1 = socket$inet(0x10, 0x2, 0x0) dup(r1) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000600)={0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x10}}, 0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@dev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@mcast1}}, &(0x7f00000007c0)=0xe8) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, r2, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) ioctl$sock_rose_SIOCDELRT(r6, 0x890c, &(0x7f0000000640)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x9, @bcast, @rose={'rose', 0x0}, 0x7, [@null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) readv(r5, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/141, 0x8d}, {&(0x7f0000000180)=""/225, 0xe1}, {&(0x7f0000000280)=""/76, 0x4c}, {&(0x7f0000000300)=""/35, 0x23}, {&(0x7f0000000440)=""/189, 0xbd}, {&(0x7f0000000340)=""/120, 0x78}, {&(0x7f0000000500)=""/77, 0x4d}], 0x7) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x7ff) 09:38:34 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) [ 1833.341686] FAULT_INJECTION: forcing a failure. [ 1833.341686] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.384888] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25127 comm=syz-executor.3 [ 1833.388284] CPU: 1 PID: 25122 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1833.404868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.409785] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25127 comm=syz-executor.3 [ 1833.414228] Call Trace: [ 1833.414246] dump_stack+0x142/0x197 [ 1833.414264] should_fail.cold+0x10f/0x159 [ 1833.414280] should_failslab+0xdb/0x130 [ 1833.414290] __kmalloc+0x2f0/0x7a0 [ 1833.444165] ? __list_lru_init+0x6b/0x660 [ 1833.448324] __list_lru_init+0x6b/0x660 [ 1833.452307] sget_userns+0x500/0xc30 [ 1833.456027] ? set_anon_super+0x20/0x20 [ 1833.460010] ? get_empty_filp.cold+0x3b/0x3b [ 1833.464424] mount_ns+0x6d/0x190 [ 1833.467791] ? mqueue_get_inode+0xaf0/0xaf0 [ 1833.472114] mqueue_mount+0xc0/0xf0 [ 1833.475742] mount_fs+0x97/0x2a1 [ 1833.479109] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1833.483602] kern_mount_data+0x56/0xc0 [ 1833.487494] mq_init_ns+0x167/0x220 [ 1833.491137] copy_ipcs+0x35e/0x400 [ 1833.494686] create_new_namespaces+0x1dd/0x720 [ 1833.499273] ? ns_capable_common+0x12c/0x160 [ 1833.503690] copy_namespaces+0x284/0x310 [ 1833.507762] copy_process.part.0+0x2603/0x6a70 [ 1833.512347] ? debug_smp_processor_id+0x1c/0x20 [ 1833.517145] ? perf_trace_lock+0x109/0x500 [ 1833.521383] ? check_preemption_disabled+0x3c/0x250 [ 1833.526396] ? debug_smp_processor_id+0x1c/0x20 [ 1833.531074] ? __cleanup_sighand+0x50/0x50 [ 1833.531085] ? lock_downgrade+0x740/0x740 [ 1833.531101] _do_fork+0x19e/0xce0 [ 1833.531114] ? fork_idle+0x280/0x280 [ 1833.546668] ? fput+0xd4/0x150 [ 1833.549867] ? SyS_write+0x15e/0x230 [ 1833.553588] SyS_clone+0x37/0x50 [ 1833.556957] ? sys_vfork+0x30/0x30 [ 1833.556972] do_syscall_64+0x1e8/0x640 [ 1833.556980] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.556996] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1833.569219] RIP: 0033:0x45a919 [ 1833.569225] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:38:34 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:34 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 09:38:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ptrace$setopts(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffffffffffffff70) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r4 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r4, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:34 executing program 2 (fault-call:3 fault-nth:32): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1833.569237] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1833.569242] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1833.569249] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1833.607083] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1833.614334] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:34 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) 09:38:34 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1833.779860] FAULT_INJECTION: forcing a failure. [ 1833.779860] name failslab, interval 1, probability 0, space 0, times 0 [ 1833.826964] CPU: 1 PID: 25158 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1833.834894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1833.844249] Call Trace: [ 1833.846848] dump_stack+0x142/0x197 [ 1833.850502] should_fail.cold+0x10f/0x159 [ 1833.854669] should_failslab+0xdb/0x130 [ 1833.858656] kmem_cache_alloc_trace+0x2e9/0x790 [ 1833.863328] ? lock_downgrade+0x740/0x740 [ 1833.867494] ? do_raw_spin_unlock+0x16b/0x260 [ 1833.871995] sget_userns+0xfe/0xc30 [ 1833.875629] ? set_anon_super+0x20/0x20 [ 1833.879606] ? __free_pages+0x54/0x90 [ 1833.883408] ? get_empty_filp.cold+0x3b/0x3b [ 1833.887822] mount_ns+0x6d/0x190 [ 1833.891192] ? mqueue_get_inode+0xaf0/0xaf0 [ 1833.895514] mqueue_mount+0xc0/0xf0 [ 1833.899133] mount_fs+0x97/0x2a1 [ 1833.902494] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1833.906978] kern_mount_data+0x56/0xc0 [ 1833.910852] mq_init_ns+0x167/0x220 [ 1833.914464] copy_ipcs+0x35e/0x400 [ 1833.917994] create_new_namespaces+0x1dd/0x720 [ 1833.922560] ? ns_capable_common+0x12c/0x160 [ 1833.926953] copy_namespaces+0x284/0x310 [ 1833.931000] copy_process.part.0+0x2603/0x6a70 [ 1833.935564] ? debug_smp_processor_id+0x1c/0x20 [ 1833.940213] ? perf_trace_lock+0x109/0x500 [ 1833.944435] ? check_preemption_disabled+0x3c/0x250 [ 1833.949434] ? debug_smp_processor_id+0x1c/0x20 [ 1833.954096] ? __cleanup_sighand+0x50/0x50 [ 1833.958342] ? lock_downgrade+0x740/0x740 [ 1833.962497] _do_fork+0x19e/0xce0 [ 1833.965948] ? fork_idle+0x280/0x280 [ 1833.969672] ? fput+0xd4/0x150 [ 1833.972850] ? SyS_write+0x15e/0x230 [ 1833.976548] SyS_clone+0x37/0x50 [ 1833.979895] ? sys_vfork+0x30/0x30 [ 1833.983423] do_syscall_64+0x1e8/0x640 [ 1833.987306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1833.992134] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1833.997306] RIP: 0033:0x45a919 [ 1834.000480] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1834.008271] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1834.015538] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 09:38:35 executing program 5: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = getpgrp(r0) r2 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) getpid() sched_setattr(r0, &(0x7f0000000040)={0x38, 0x2, 0x4, 0x0, 0x9, 0x0, 0x0, 0x4}, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r3, r2, 0x0, 0x12, &(0x7f00000000c0)=':trustedvboxnet1b\x00', 0xffffffffffffffff}, 0x30) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f00000001c0)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), &(0x7f0000000240)=0xc) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x38, 0x3, 0x0, 0x0, 0x9}, 0x0) syz_open_procfs(r8, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r9 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$cec(0x0, 0x1, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r10 = gettid() kcmp(r10, r10, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r11 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r11, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r11) r12 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r13 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r13) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r14 = inotify_init1(0x0) fcntl$setown(r14, 0x8, 0xffffffffffffffff) fcntl$getownex(r14, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r15, 0x13) syz_open_procfs(r15, &(0x7f0000000040)='clear_refs\x00') r16 = socket$alg(0x26, 0x5, 0x0) bind$alg(r16, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r16, 0x117, 0x1, 0x0, 0x0) r17 = accept$alg(r16, 0x0, 0x0) r18 = dup(r17) write$UHID_DESTROY(r18, &(0x7f0000000080), 0xfff2) recvmmsg(r18, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)}}], 0x1, 0x0, 0x0) r19 = getpid() sched_setattr(r19, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r20 = getpid() r21 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r21, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r22, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r23}}, 0x120) r24 = getpid() sched_setattr(r24, &(0x7f0000000040)={0x30}, 0x0) r25 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r25, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r26 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r26, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r27 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r27, 0x0, 0x0) r28 = getpgrp(0x0) waitid(0x0, r28, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r28, 0x9, &(0x7f00000001c0)=""/68) r29 = getpgid(r28) r30 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r30, 0x8904, &(0x7f0000000000)=0x0) r32 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r33 = openat$cgroup_ro(r32, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r34 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r35 = getpid() r36 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r36, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r36, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r37 = gettid() waitid(0x2c7c96e4f825ad55, r37, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r38 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r38, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r39 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r39, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r36, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r29, @ANYRES16, @ANYRES16=r29, @ANYRESDEC, @ANYRES32, @ANYRES64], @ANYRESOCT=r38, @ANYRES64=r39, @ANYRES64], @ANYRESDEC=r37]], 0x8}}, 0x20004850) r40 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r40) kcmp(r40, r40, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r40, 0x0, 0x0) r41 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r40, r41, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r37, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r42}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r35, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r34, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r33, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r31, r30, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r29, r27, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r42}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r26, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r42}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r25, 0x0, 0x1, &(0x7f0000000000)='\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r42}, 0x30) r43 = fcntl$getown(0xffffffffffffffff, 0x9) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r43, 0xffffffffffffffff, 0x0, 0xda, &(0x7f0000000140)='\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r22, 0x0, 0x1, &(0x7f0000000500)='\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r20, r21, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r19, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r15, r18, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r13, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r12, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00', r42}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r11, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00', r42}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000002c0)={r42}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r45 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r45, 0x4d2c, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x12) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0xfffffffffffffff5, 0xada240) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r46 = getpid() sched_setattr(r46, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x9, 0x0, 0x0, 0x401}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={r46, 0xffffffffffffffff, 0x0, 0x0, 0x0, r44}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r9, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1834.022800] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1834.030057] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1834.037310] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1834.169794] audit: type=1400 audit(1576921115.317:318): avc: denied { create } for pid=25170 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_scsitransport_socket permissive=1 09:38:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0xffffffffffffffff, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:35 executing program 0: syz_emit_ethernet(0x0, 0x0, 0x0) [ 1835.440111] net_ratelimit: 18 callbacks suppressed [ 1835.440115] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.450141] protocol 88fb is buggy, dev hsr_slave_1 [ 1835.690117] protocol 88fb is buggy, dev hsr_slave_0 [ 1835.695332] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.240120] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.245241] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.250351] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.255413] protocol 88fb is buggy, dev hsr_slave_1 [ 1836.320130] protocol 88fb is buggy, dev hsr_slave_0 [ 1836.325425] protocol 88fb is buggy, dev hsr_slave_1 09:38:37 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:37 executing program 2 (fault-call:3 fault-nth:33): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, r2, 0x100}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f0000000480)="02", 0x1, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r3, r3}, &(0x7f0000000740)=""/227, 0xe3, &(0x7f0000000300)={&(0x7f0000000700)={'md5\x00'}}) keyctl$revoke(0x3, r3) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000100)={r3, 0x88, 0xa2}, &(0x7f0000000140)={'enc=', 'oaep', ' hash=', {'xxhash64-generic\x00'}}, &(0x7f00000001c0)="c0fe71acc797f9672dced960ae10cbc112690122af41ded8a5c4181ec7c4ba05a7673c945b0e6a0544b14eabc62d1e4f98115b2b28fa597f1b18b937ffb57bec86b344495e7feb71ac26608341502115605f1a6758cdfc3315176448672d3fc2cfe4a6cf0e5ad6c8c1b95793a816ce73e1c92e9b535734f00e09c57299dddf3ad182b58dbf1ecc7d", &(0x7f0000000280)=""/162) 09:38:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:37 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) 09:38:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) r3 = fcntl$getown(r0, 0x9) r4 = perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0x9) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r5 = gettid() kcmp(r5, r5, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r7 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(r6) getpid() getpid() pipe2(0x0, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0xc40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r8 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r8, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r9 = getpid() sched_setattr(r9, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={r9, r4, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:38 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) 09:38:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1836.856038] FAULT_INJECTION: forcing a failure. [ 1836.856038] name failslab, interval 1, probability 0, space 0, times 0 [ 1836.885760] selinux_nlmsg_perm: 30 callbacks suppressed [ 1836.885773] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 09:38:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) faccessat(r1, &(0x7f0000000040)='./file0\x00', 0x160, 0x180) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000080)=0x0) r4 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="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", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000002800), 0x0, 0x4}], 0x40801, &(0x7f0000002a40)={[{@grpid='grpid'}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>'}}, {@fowner_eq={'fowner', 0x3d, r5}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r6 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="fa9b53d6c56038a2c9015647f2c743cf02f8b716c73d6b89d480bca5539d207ad16d82ee016aec8400e136310256e063ed1c8f048967696242d33df4e6d78b4611412c9739cb86e12097676b22dae2f0acc59ae6e5022a1c048dfcacd878190f994deb2ee52e7447bc94857c6797e66ab5aec7fc3fa711313056f6e653916cc8eaaa47c4b2107e1d319ab354d055ad40306411a99a493e28c138618ae4b6c58bdd174fbba7152c7c3b885a3dd05f053c81829e3e0370e8a184ccaf89504548dd87b4f355a5d7a5bedf13b8ee262c00b01145df7cbf5bf225b16fd5d12a6714f80958d2da02f622c6ccdda3535fb3bdba8bb801822fbbace066fb5113d1eac98c575f6c95a1d4fa237f79929a5f2f0a1f6cc588e4541b356fb481d7cc3a291b710e3eea1f5a71f3a7570c9a4a33811dbd5441a66863534cb7ef053629ce8c2e25f7d269e884d970b2f85af470904c855e1c7fd71451e0f7d41b9bf07839dd75d60b4c287e03b418eb400fb2b399f2a5430d7b11c8528f9bc3d18196650ddd72bd792f6581b5281547e05a7ec1911e695f523e1260f35c39736b7b51e363dd5fb27a525bb881aad74759162a496217339c3360411c69ed610e317c35f327ec3753a3b893c7367fc2249f0e29625606922de899fb9ab80688317a61311426da9e6b1eb94308626dde66858cfbec4a194c556f2e71099990fa3d2fa0f99dcfee7a151b9be53295660831d05191efc587a68a09054f80a597827a60c249de85b2796718b9aa9631830b8af7b91c2f446b14ec4e90f135c76d05103e81465f83990587bc95fbb1cec2def0cbecd6706b61fcfa48957e236369f067054cc30269ecab7ff970559d758a82c0d672e3e23f7dad77cec262efbb6e3eec6bfdb40551ba6c76b18f6a12333f139ba507b399bcee405fd90834efe91e8b581a1e4e65981d657ba07ed54b2c7a3d590ad3e673bd46cd0c78153941baacc6dcd456c303c17c27cce91f8e274bde351ea3b6f89d8a0e57ec016ab5d26e48b0f37a96f57df4c2ce7dd8305eadaa3724bacc2eb5026ad31bcfcf2f62dd52a196a09ee717dfa310a4296dbfea181ec50d35c68addcafdd42afb98b9d9e8a37d078cfe80dbe2340d652d3efc5af5584b55628d19b06f0a85628aadf73569f223a8bdfacc8b479658641d44216af32bea33d2eee2d4a6134154903fbe172a6c7aa244eb1d00a75b35ed545ab42b1ff85d8c70e097e62232730c18448154a9b8aaf93641ad3e1e0b5beebcb5b8e2bc61af1596f90647e8876e78c1b857f7cd667ff603a1db318125ea13373243f1b9c859d083b20e8fdfb21d7b81fb7892262c234e59f5fa4b1f51321cd959a0933cf6d29707ec87095df567bf3448fbe8e1b6e6a206a0391c067afccbd01b67ec6afb848f914df957879c5d2121bbeb91510ae4aa8f351d1119dfca8696222be8e48829e8f0b7c93079f6d6acd889afdc530680d33eb1fc7d05b73427ceb42b81106765a1a69a27e331e9c63b4ec7399713fbe07cd0c3bf2ed64aa8f08043f00098d7d18a2e49f5b9d560e3aed44cb52a038425286372e77fa4948d57702c24f1ac9075ac72967d0cc52f01bff659a934d0b67ad8ed3229756bd4abdb25d1ee18852dc435f1f05ddc828a1f473c4da6edaa2a67bf54173f65cb818df53457b309c5904470c2ef774c9ce322e55bcdb0675522b9c1d6cf7511f8cc5d9d74f2501507b0aee325cbd9dd8a9cfeaaeb9cbc904fab34bf0204a08d5b1762de70c3b20e1b20c982470e53d2d8f4bb5ca5d95056d68986ddaaaf9c5ff0a401d9c29f9037bdcb483eb5621c90cf5fadd6feab5b6da2904f06bd467accf2f61ea296f817d628313b9e77f5aa9a08130e21293969fdef5918581c3d8fa4d7f3b843137e25e7424a1f9b48fe79c198a96678c0b0a6ce52396e71291561d45ce5050c1b9436ce49c9915beeed50b27d79be89ef2a060d942a9801aaf3715f40d3942ffef3b49e8c1c0cdc6606e29980f03636891d06580aa9d5812fbe7ba573dbef3d8b5db79a19945d39ad37ece5780dd61e35f36ede764033895cdff01fa7d2d1763f10f8d060b2af29a16db597436cd976e1f646faceb2aae525d20af7e8e58abb5fa37f78f1fec1cab9084b8814c98f2396c8bb80749b16cc24223fd5f8c308f38ee9ca091f2f590a8fb93e7c110d2083d43b31b763e11aa134b0ad3ce2017b862f9f3f9863752856f2454fd7c159b552ea91e0f98c0ed4423fb011b01505dfde3d9026d4f974e8a9a6169416403515d9fefe1077f126f5afd1650f92a06330fc9aeb988a567c215e28f245dbcb3292dd96cb718ad4c99dd00cea6b556ab1a18d3d1aab1775facc3f9cd1d6a348070ee2f7388bc79a6d98dca02535b9e429e0b7797a1e9e30dc3404cb247751055689c38a4188bb1e3fbcc1ac95b690790664474a5ae41b6eebeca620d9ebb54ea992c8d0e944c986da8b9c5ccbe2216cee47ff47d00fcb2792e79bd583af8d81082dc708069129a359be16e1f96e170aa2bfc47b4ad28111b90bd9bc9b6fdcb91aa964c03f511f2cd8f02fda05ca37496faa95752550396811c43f6d0d8d38d8e1ac6622eb2f8f4397342b5a93d2aaee233726169c9ffb1955911b509283eaa5d06185b78de7fc5d7f519359437584bb410ed7788f35cd423965aa11edf6def24d392ea7f5593b1ba582dfa4a2be37d1e9d428d6aea199bb106814c5b784746978d3cac6a7189b708d53e87c2c76ad96004a22611d1fcd12b909e1da19e6ce634aa1a167204871d89e4d5d192cf8d3370b63a558c010d185b09aabaefc483409388f53715167794607ec969992392c88e3d991bc8487d1e593b7f1a33f646311a224d11c4e291975fd141659512822687146b925c0a1abbe00936b4dcedfe724e1c0f5b7e92948c1444267b9acbb17af8a90e974b90fb1d2db02929d909d0ea322e58c8bbb201fec13f6ea117704751e639c0c0aa264218d0461ee34a61be7747e47ceefd11d14973021b53e90687baeadc3ef6e8296062bb78ae14d98c08692dbc5e312a94799ae5ddb995abf29d9e06ed469cee78dbcb044fc7524f47a8090863bbfb9b6a72ea89052a7c5d7679a794957105bed7b11105937fafe1042b6e3acda4920719411f40868da47eaab873193463b8dffaa9fedf9fd764f5e07c406c9e9f970c94ae49a2280a7961a52b2e5abc6cc6e1d68dc73124689686f35823397c5d0c9474c213e7e705717d8f8488cf25a9e4b3bed5af6a902df3ad1a32d79f235d0faae7cc0ea7bc13f00045f58ed88280b4f9c059833aeea6241a46209c0415360d2b982958b5e785e5d80b109fdeb212c5d9a8748b2d3aecc6dc104867e4b2ba5129ccb077a4c1b43e7a2be26893442c218c1532ecda209dd51ad6d21955712842fbfa2c2df1ce765e717cf09f53d703a0963e3afaa739c48a7e8f802ba8cd5f755fd76d154e56f5608f69f69a4c7ad515b58b2c08339aba23a48c20d6adace0f9d42e9d99162ec913d7395fef8f28352d8563fd74a59b27ac83ec99ed56bc2ee31e63bc64470d9a1180e95d8addbf1bfa8126206f40337455e1b8ebc2bb8758c7487b8d86ac6fac2b5de1dcb837db927ede9145fdb475f4a70fda65b922d93c1be93acc5f943061b0c33a4da39dc978d910a7f01708526703c493869917ddc995cb6154b9f204584f47ad1eaed9ad20fe5598a682943501c9dc2e3c3ac21bc3e7a87b4fc46c6ea081d95e36cf7c4055165b4478a080db76812c689e2074a29faac420914720f0ac28a0cc41cab2641873d3e70759ee1af84f58426732bdacafcf52a83cfc2a15daebfab5d16665798df99ba1e04d6b6d3a3fd24de14e7eb959c23796c49f1a5efea33a2c370bb2eca3c92344915901c43392afdfa27dabdd596fc1ff0ee3425f30d39f117a90ca9d590d5bfa3eb0b40e6fd96938e265fe99aaa754f400a9646aafc1dc6b5070583c9d179ef99c831a2c0f8d3f89500785dc7da9982fa08674422a7351c84d7eed96920c169329abff6b9567a13f7aba322d60856dbef1a24f02dbd8b8efb1e1457494bb6c493895de5a9aef429fd0582b36a9c57327bc9e7999a67f4950b6fb606c0077967e1aaa648a625d9c0c35d5e2c94ffffe1743205ca4cb86c711f766b30557996b2da3dc35d724b67ec16855dfe861340c0d4fcd316400d04a68e235e4d0727977d7235a3716dcb6fc432dc6291fcab7c65c29850f1f9bb46bb4b67482aaeae5d76a839ecfb834197a0c359c8cdb2f9fc35f7293277812a51f906ef654af8dffadfce9a61d06e9af531f4d136e1a12a8e4c91f7d07b97eef435fc32ee0c3bf6032810c44442e9e444dfd31fe2d392661363c82b2b1e34fe6c68f68ef2fcaf9f31d85944621abeeae5febb5a43b1c79b07fc30770a9898d2640feca58695e17e1bb9e2e41e5b368bd81a4a27d689e4bed36f9cfe5057a85e8c11f580833bda58856b91561147e40b659bf19e9d4ac87f9b262ddaeead63b2587e9bfc39f6b9250a7fe2e4b72c3b8801a5dab0f348c9b130acfd795d09e166c639d7031f300e6c6dcb28fd3f2432ddcfe86a3b441b8c81ae4b7ab8fc8d798a60533129a067e2615fc4efcba607590c81cf9e53b272245bf0668b1a49f6bd0d4e5cbc6f7f0954ef376caa950be1fc76af776d32ca2f47ee097daf913bbf7f2d4653485a28cec13ae5ac5067ada41e9513d249e41e84a85e6f70710169342c1c8708508e4eac0f259b5d7859476e585efb6690d04cc892abbf21c68d6a5527f8dcfca7c70318419d5baae83bb8f1952e66f3364b8e203f57ce5bc4792bc85853528d2250aaa05b5ead6c38cea110507b5622126ddd4a1574db7f74f89a34ee1928e973e077076a89e8cec0ecd0a803ddc6502a3e1e10ff1001fa9a07d4e5e9c617fdc3ee083d948076c3355b5f07b7d590c43e59b78acd659ee8951096da8b2773db582041052306e98ff62001a2b3534b23b090563467e143d4f6f595f2c0c67da0460a8307ecba0dcba44e78bb4225fa64e21a6d051d94af0c697eac4bee011d3d9acb80d157de6b7cb35202a98aeef2782faaec247a3da0a845a058a75f64515e3a920ecc3206d417aa5dfced75c4bc4a61185b00a60c5a9287aad0c899aa580256f61b44a88d8b8dbb285ed8ef1d29d0cddda8a443cfe9eca1b8b650df8a6362252458c917437fdf2008bb14ad9c3325ad04233d066fc1769763edd50fbde44db005698de9464d34c4d613591ed317e343b6913fa272861945ca84687b68edb2f5b0d4008f1acae3deb8620a71c1e161249a78edfb67f012c285b3076643e78644c19491e352d12f3fa6577ae6f0c26579f56a0a84be2c176ae5cd65550cd2e620ea86105a726126b9ae22d17bc16b57513a524db91c670a4402575a22095fd168014b7c728a60", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000002800), 0x0, 0x4}], 0x40801, &(0x7f0000002a40)={[{@grpid='grpid'}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>'}}, {@fowner_eq={'fowner', 0x3d, r7}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) r8 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="257ab9b15f29c0d90869540784acc74f289401f7e0af5fc24875504d18a95c840e5ca21f3468ad38142d240437fb00a6b1d26b3c61c796966648a025f711fd02900c935aea634c475b2b9170c81b093cd7a90f9e279436805a293af052a14fae93f8059176a90b59ae69602ec5e42d99bcfa305bfeefdddcfd", @ANYRES32=r9, @ANYBLOB="080f3f015cb3ccb640e50b1246926360b08cbb811e5c37b4716b6da7fd29e6ae83735fda8b1678eee54176241837bf8e031b69d31cfa7c8e", @ANYRES32=r9, @ANYBLOB], 0x5, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x2, 0x0, 0x0, r7, r9}, 0x0, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x6, 0x0, r3}) [ 1836.925120] CPU: 0 PID: 25226 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1836.933051] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1836.942410] Call Trace: [ 1836.945007] dump_stack+0x142/0x197 [ 1836.948646] should_fail.cold+0x10f/0x159 [ 1836.952825] should_failslab+0xdb/0x130 [ 1836.956816] __kmalloc+0x2f0/0x7a0 [ 1836.960362] ? __list_lru_init+0x6b/0x660 [ 1836.964530] __list_lru_init+0x6b/0x660 [ 1836.968510] sget_userns+0x4e0/0xc30 09:38:38 executing program 0: syz_emit_ethernet(0x6c, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}, {[@timestamp={0x44, 0x4}]}}, @gre}}}}, 0x0) [ 1836.972222] ? set_anon_super+0x20/0x20 [ 1836.976209] ? get_empty_filp.cold+0x3b/0x3b [ 1836.980620] mount_ns+0x6d/0x190 [ 1836.983990] ? mqueue_get_inode+0xaf0/0xaf0 [ 1836.988313] mqueue_mount+0xc0/0xf0 [ 1836.991947] mount_fs+0x97/0x2a1 [ 1836.995318] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1836.999825] kern_mount_data+0x56/0xc0 [ 1837.003721] mq_init_ns+0x167/0x220 [ 1837.007352] copy_ipcs+0x35e/0x400 [ 1837.010899] create_new_namespaces+0x1dd/0x720 [ 1837.015483] ? ns_capable_common+0x12c/0x160 [ 1837.019900] copy_namespaces+0x284/0x310 09:38:38 executing program 0: syz_emit_ethernet(0x68, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}}, @gre}}}}, 0x0) [ 1837.023961] copy_process.part.0+0x2603/0x6a70 [ 1837.028545] ? debug_smp_processor_id+0x1c/0x20 [ 1837.033217] ? perf_trace_lock+0x109/0x500 [ 1837.037469] ? check_preemption_disabled+0x3c/0x250 [ 1837.042488] ? debug_smp_processor_id+0x1c/0x20 [ 1837.047174] ? __cleanup_sighand+0x50/0x50 [ 1837.051526] ? lock_downgrade+0x740/0x740 [ 1837.055284] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.055675] _do_fork+0x19e/0xce0 [ 1837.071161] ? fork_idle+0x280/0x280 [ 1837.074890] ? fput+0xd4/0x150 [ 1837.078084] ? SyS_write+0x15e/0x230 [ 1837.078351] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.081804] SyS_clone+0x37/0x50 [ 1837.081812] ? sys_vfork+0x30/0x30 [ 1837.081827] do_syscall_64+0x1e8/0x640 [ 1837.081837] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1837.081853] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1837.081861] RIP: 0033:0x45a919 [ 1837.081866] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1837.081876] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1837.081882] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1837.081887] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1837.081893] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1837.081898] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1837.198634] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.216154] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.237915] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.262753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 [ 1837.278542] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25225 comm=syz-executor.5 09:38:41 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:41 executing program 2 (fault-call:3 fault-nth:34): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:41 executing program 0: syz_emit_ethernet(0x68, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}}, @gre}}}}, 0x0) 09:38:41 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x3, 0x70, 0xd9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:41 executing program 0: syz_emit_ethernet(0x68, &(0x7f0000000380)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @local={0xac, 0x14, 0xffffffffffffffff}}, @gre}}}}, 0x0) [ 1839.863114] FAULT_INJECTION: forcing a failure. [ 1839.863114] name failslab, interval 1, probability 0, space 0, times 0 [ 1839.898048] CPU: 0 PID: 25289 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1839.905983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1839.915335] Call Trace: [ 1839.917932] dump_stack+0x142/0x197 [ 1839.921604] should_fail.cold+0x10f/0x159 [ 1839.925768] should_failslab+0xdb/0x130 [ 1839.929753] kmem_cache_alloc+0x2d7/0x780 [ 1839.933910] ? lock_downgrade+0x740/0x740 [ 1839.938062] ? mqueue_i_callback+0x30/0x30 [ 1839.942304] mqueue_alloc_inode+0x1c/0x40 [ 1839.946451] alloc_inode+0x64/0x180 [ 1839.950086] new_inode_pseudo+0x19/0xf0 [ 1839.954063] new_inode+0x1f/0x40 [ 1839.957436] mqueue_get_inode+0x89/0xaf0 09:38:41 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f00006dc000)=[{0x6, 0x0, 0x0, 0xa1}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x4e23}, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="c3401c344654f3c7d9b41ba48c8e319aa4eedc3d6bd8ebd65c856a27d61154adc2b2a9763ae0001c0d32e11f38e9dd18c58f6bd779650fc30f93653bdaecf323c9f6502ceab47e58114347b289546465a5eb278de12b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d08d4154004997e317b79", 0x82, 0x0, 0x0, 0xa6) shutdown(r0, 0x2) [ 1839.961523] mqueue_fill_super+0x113/0x1f0 [ 1839.965768] mount_ns+0xec/0x190 [ 1839.969133] ? mqueue_get_inode+0xaf0/0xaf0 [ 1839.973451] mqueue_mount+0xc0/0xf0 [ 1839.977074] mount_fs+0x97/0x2a1 [ 1839.980447] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1839.984949] kern_mount_data+0x56/0xc0 [ 1839.988844] mq_init_ns+0x167/0x220 [ 1839.992477] copy_ipcs+0x35e/0x400 [ 1839.996025] create_new_namespaces+0x1dd/0x720 [ 1840.000608] ? ns_capable_common+0x12c/0x160 [ 1840.005018] copy_namespaces+0x284/0x310 [ 1840.009080] copy_process.part.0+0x2603/0x6a70 09:38:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xf7838b12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1840.013666] ? debug_smp_processor_id+0x1c/0x20 [ 1840.018344] ? perf_trace_lock+0x109/0x500 [ 1840.022584] ? check_preemption_disabled+0x3c/0x250 [ 1840.027606] ? debug_smp_processor_id+0x1c/0x20 [ 1840.032400] ? __cleanup_sighand+0x50/0x50 [ 1840.036725] ? lock_downgrade+0x740/0x740 [ 1840.040884] _do_fork+0x19e/0xce0 [ 1840.044343] ? fork_idle+0x280/0x280 [ 1840.048062] ? fput+0xd4/0x150 [ 1840.051258] ? SyS_write+0x15e/0x230 [ 1840.054977] SyS_clone+0x37/0x50 [ 1840.058335] ? sys_vfork+0x30/0x30 09:38:41 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1840.061884] do_syscall_64+0x1e8/0x640 [ 1840.065779] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1840.070655] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1840.075843] RIP: 0033:0x45a919 [ 1840.079034] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1840.086741] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1840.094009] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1840.101276] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1840.108542] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1840.115810] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x140, 0x0) r1 = msgget(0x2, 0x0) msgctl$MSG_STAT(r1, 0xb, 0x0) msgsnd(r1, &(0x7f0000000000)={0x0, "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"}, 0x107, 0x800) openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:41 executing program 2 (fault-call:3 fault-nth:35): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1840.297969] FAULT_INJECTION: forcing a failure. [ 1840.297969] name failslab, interval 1, probability 0, space 0, times 0 [ 1840.340652] CPU: 1 PID: 25330 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1840.348572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1840.357918] Call Trace: [ 1840.360506] dump_stack+0x142/0x197 [ 1840.364140] should_fail.cold+0x10f/0x159 [ 1840.368277] should_failslab+0xdb/0x130 [ 1840.372234] kmem_cache_alloc+0x2d7/0x780 [ 1840.376369] ? mqueue_alloc_inode+0x1c/0x40 [ 1840.380674] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1840.386116] selinux_inode_alloc_security+0xb6/0x2a0 [ 1840.391202] security_inode_alloc+0x94/0xd0 [ 1840.395507] inode_init_always+0x552/0xaf0 [ 1840.399720] alloc_inode+0x81/0x180 [ 1840.403349] new_inode_pseudo+0x19/0xf0 [ 1840.407308] new_inode+0x1f/0x40 [ 1840.410658] mqueue_get_inode+0x89/0xaf0 [ 1840.414701] mqueue_fill_super+0x113/0x1f0 [ 1840.418919] mount_ns+0xec/0x190 [ 1840.422267] ? mqueue_get_inode+0xaf0/0xaf0 [ 1840.426570] mqueue_mount+0xc0/0xf0 [ 1840.430181] mount_fs+0x97/0x2a1 [ 1840.433547] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1840.438023] kern_mount_data+0x56/0xc0 [ 1840.441893] mq_init_ns+0x167/0x220 [ 1840.445502] copy_ipcs+0x35e/0x400 [ 1840.449027] create_new_namespaces+0x1dd/0x720 [ 1840.453587] ? ns_capable_common+0x12c/0x160 [ 1840.457995] copy_namespaces+0x284/0x310 [ 1840.462043] copy_process.part.0+0x2603/0x6a70 [ 1840.466608] ? debug_smp_processor_id+0x1c/0x20 [ 1840.471270] ? perf_trace_lock+0x109/0x500 [ 1840.475484] ? check_preemption_disabled+0x3c/0x250 [ 1840.480492] ? debug_smp_processor_id+0x1c/0x20 [ 1840.485159] ? __cleanup_sighand+0x50/0x50 [ 1840.489371] ? lock_downgrade+0x740/0x740 [ 1840.493503] _do_fork+0x19e/0xce0 [ 1840.496940] ? fork_idle+0x280/0x280 [ 1840.500659] ? fput+0xd4/0x150 [ 1840.503834] ? SyS_write+0x15e/0x230 [ 1840.507546] SyS_clone+0x37/0x50 [ 1840.510894] ? sys_vfork+0x30/0x30 [ 1840.514413] do_syscall_64+0x1e8/0x640 [ 1840.518282] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1840.523113] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1840.528281] RIP: 0033:0x45a919 [ 1840.531447] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1840.539135] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1840.546385] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1840.553634] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1840.560880] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1840.568126] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1840.575757] net_ratelimit: 18 callbacks suppressed [ 1840.575761] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.580166] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.580770] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.585735] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.590817] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.595796] protocol 88fb is buggy, dev hsr_slave_0 [ 1840.600776] protocol 88fb is buggy, dev hsr_slave_1 [ 1840.605763] protocol 88fb is buggy, dev hsr_slave_1 [ 1841.690124] protocol 88fb is buggy, dev hsr_slave_0 [ 1841.695253] protocol 88fb is buggy, dev hsr_slave_1 09:38:44 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:44 executing program 3: syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) sendfile(r1, r2, &(0x7f00000000c0)=0x103000, 0x8001) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x2) 09:38:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) dup(r0) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagema\x19\x00') r6 = socket$inet(0x10, 0x2, 0x0) r7 = dup(r6) sendfile(r7, r5, &(0x7f0000000040)=0x103000, 0x8001) r8 = socket$inet(0x10, 0x2, 0x0) dup(r8) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r10 = socket$inet(0x10, 0x2, 0x0) r11 = dup(r10) sendfile(r11, r9, &(0x7f0000000040)=0x103000, 0x8001) kcmp(r1, 0x0, 0x6, r9, r5) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 09:38:44 executing program 2 (fault-call:3 fault-nth:36): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:44 executing program 0: clone(0x2040100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) clone(0x3102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$nl_crypto(0x10, 0x3, 0x15) pipe2(&(0x7f0000000000), 0x0) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(0xffffffffffffffff, 0x8983, 0x0) socket$inet(0x2, 0x1, 0x5) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='./file3\x00') setxattr$security_selinux(&(0x7f0000000100)='./file2\x00', 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000000)='./file2\x00', &(0x7f0000000080)=""/20, 0x14) 09:38:44 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1842.972265] FAULT_INJECTION: forcing a failure. [ 1842.972265] name failslab, interval 1, probability 0, space 0, times 0 [ 1842.983628] audit: type=1400 audit(1576921124.127:319): avc: denied { create } for pid=25356 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 09:38:44 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r1 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') socket$inet(0x2, 0x3, 0x7f) r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) r9 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x0, 0x0) ioctl$USBDEVFS_CLAIM_PORT(r9, 0x80045518, &(0x7f0000000280)=0xf9c7a565) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$IP6T_SO_GET_ENTRIES(r5, 0x29, 0x41, &(0x7f0000002900)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=0xf0) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="fa9b53d6c56038a2c9015647f2c743cf02f8b716c73d6b89d480bca5539d207ad16d82ee016aec8400e136310256e063ed1c8f048967696242d33df4e6d78b4611412c9739cb86e12097676b22dae2f0acc59ae6e5022a1c048dfcacd878190f994deb2ee52e7447bc94857c6797e66ab5aec7fc3fa711313056f6e653916cc8eaaa47c4b2107e1d319ab354d055ad40306411a99a493e28c138618ae4b6c58bdd174fbba7152c7c3b885a3dd05f053c81829e3e0370e8a184ccaf89504548dd87b4f355a5d7a5bedf13b8ee262c00b01145df7cbf5bf225b16fd5d12a6714f80958d2da02f622c6ccdda3535fb3bdba8bb801822fbbace066fb5113d1eac98c575f6c95a1d4fa237f79929a5f2f0a1f6cc588e4541b356fb481d7cc3a291b710e3eea1f5a71f3a7570c9a4a33811dbd5441a66863534cb7ef053629ce8c2e25f7d269e884d970b2f85af470904c855e1c7fd71451e0f7d41b9bf07839dd75d60b4c287e03b418eb400fb2b399f2a5430d7b11c8528f9bc3d18196650ddd72bd792f6581b5281547e05a7ec1911e695f523e1260f35c39736b7b51e363dd5fb27a525bb881aad74759162a496217339c3360411c69ed610e317c35f327ec3753a3b893c7367fc2249f0e29625606922de899fb9ab80688317a61311426da9e6b1eb94308626dde66858cfbec4a194c556f2e71099990fa3d2fa0f99dcfee7a151b9be53295660831d05191efc587a68a09054f80a597827a60c249de85b2796718b9aa9631830b8af7b91c2f446b14ec4e90f135c76d05103e81465f83990587bc95fbb1cec2def0cbecd6706b61fcfa48957e236369f067054cc30269ecab7ff970559d758a82c0d672e3e23f7dad77cec262efbb6e3eec6bfdb40551ba6c76b18f6a12333f139ba507b399bcee405fd90834efe91e8b581a1e4e65981d657ba07ed54b2c7a3d590ad3e673bd46cd0c78153941baacc6dcd456c303c17c27cce91f8e274bde351ea3b6f89d8a0e57ec016ab5d26e48b0f37a96f57df4c2ce7dd8305eadaa3724bacc2eb5026ad31bcfcf2f62dd52a196a09ee717dfa310a4296dbfea181ec50d35c68addcafdd42afb98b9d9e8a37d078cfe80dbe2340d652d3efc5af5584b55628d19b06f0a85628aadf73569f223a8bdfacc8b479658641d44216af32bea33d2eee2d4a6134154903fbe172a6c7aa244eb1d00a75b35ed545ab42b1ff85d8c70e097e62232730c18448154a9b8aaf93641ad3e1e0b5beebcb5b8e2bc61af1596f90647e8876e78c1b857f7cd667ff603a1db318125ea13373243f1b9c859d083b20e8fdfb21d7b81fb7892262c234e59f5fa4b1f51321cd959a0933cf6d29707ec87095df567bf3448fbe8e1b6e6a206a0391c067afccbd01b67ec6afb848f914df957879c5d2121bbeb91510ae4aa8f351d1119dfca8696222be8e48829e8f0b7c93079f6d6acd889afdc530680d33eb1fc7d05b73427ceb42b81106765a1a69a27e331e9c63b4ec7399713fbe07cd0c3bf2ed64aa8f08043f00098d7d18a2e49f5b9d560e3aed44cb52a038425286372e77fa4948d57702c24f1ac9075ac72967d0cc52f01bff659a934d0b67ad8ed3229756bd4abdb25d1ee18852dc435f1f05ddc828a1f473c4da6edaa2a67bf54173f65cb818df53457b309c5904470c2ef774c9ce322e55bcdb0675522b9c1d6cf7511f8cc5d9d74f2501507b0aee325cbd9dd8a9cfeaaeb9cbc904fab34bf0204a08d5b1762de70c3b20e1b20c982470e53d2d8f4bb5ca5d95056d68986ddaaaf9c5ff0a401d9c29f9037bdcb483eb5621c90cf5fadd6feab5b6da2904f06bd467accf2f61ea296f817d628313b9e77f5aa9a08130e21293969fdef5918581c3d8fa4d7f3b843137e25e7424a1f9b48fe79c198a96678c0b0a6ce52396e71291561d45ce5050c1b9436ce49c9915beeed50b27d79be89ef2a060d942a9801aaf3715f40d3942ffef3b49e8c1c0cdc6606e29980f03636891d06580aa9d5812fbe7ba573dbef3d8b5db79a19945d39ad37ece5780dd61e35f36ede764033895cdff01fa7d2d1763f10f8d060b2af29a16db597436cd976e1f646faceb2aae525d20af7e8e58abb5fa37f78f1fec1cab9084b8814c98f2396c8bb80749b16cc24223fd5f8c308f38ee9ca091f2f590a8fb93e7c110d2083d43b31b763e11aa134b0ad3ce2017b862f9f3f9863752856f2454fd7c159b552ea91e0f98c0ed4423fb011b01505dfde3d9026d4f974e8a9a6169416403515d9fefe1077f126f5afd1650f92a06330fc9aeb988a567c215e28f245dbcb3292dd96cb718ad4c99dd00cea6b556ab1a18d3d1aab1775facc3f9cd1d6a348070ee2f7388bc79a6d98dca02535b9e429e0b7797a1e9e30dc3404cb247751055689c38a4188bb1e3fbcc1ac95b690790664474a5ae41b6eebeca620d9ebb54ea992c8d0e944c986da8b9c5ccbe2216cee47ff47d00fcb2792e79bd583af8d81082dc708069129a359be16e1f96e170aa2bfc47b4ad28111b90bd9bc9b6fdcb91aa964c03f511f2cd8f02fda05ca37496faa95752550396811c43f6d0d8d38d8e1ac6622eb2f8f4397342b5a93d2aaee233726169c9ffb1955911b509283eaa5d06185b78de7fc5d7f519359437584bb410ed7788f35cd423965aa11edf6def24d392ea7f5593b1ba582dfa4a2be37d1e9d428d6aea199bb106814c5b784746978d3cac6a7189b708d53e87c2c76ad96004a22611d1fcd12b909e1da19e6ce634aa1a167204871d89e4d5d192cf8d3370b63a558c010d185b09aabaefc483409388f53715167794607ec969992392c88e3d991bc8487d1e593b7f1a33f646311a224d11c4e291975fd141659512822687146b925c0a1abbe00936b4dcedfe724e1c0f5b7e92948c1444267b9acbb17af8a90e974b90fb1d2db02929d909d0ea322e58c8bbb201fec13f6ea117704751e639c0c0aa264218d0461ee34a61be7747e47ceefd11d14973021b53e90687baeadc3ef6e8296062bb78ae14d98c08692dbc5e312a94799ae5ddb995abf29d9e06ed469cee78dbcb044fc7524f47a8090863bbfb9b6a72ea89052a7c5d7679a794957105bed7b11105937fafe1042b6e3acda4920719411f40868da47eaab873193463b8dffaa9fedf9fd764f5e07c406c9e9f970c94ae49a2280a7961a52b2e5abc6cc6e1d68dc73124689686f35823397c5d0c9474c213e7e705717d8f8488cf25a9e4b3bed5af6a902df3ad1a32d79f235d0faae7cc0ea7bc13f00045f58ed88280b4f9c059833aeea6241a46209c0415360d2b982958b5e785e5d80b109fdeb212c5d9a8748b2d3aecc6dc104867e4b2ba5129ccb077a4c1b43e7a2be26893442c218c1532ecda209dd51ad6d21955712842fbfa2c2df1ce765e717cf09f53d703a0963e3afaa739c48a7e8f802ba8cd5f755fd76d154e56f5608f69f69a4c7ad515b58b2c08339aba23a48c20d6adace0f9d42e9d99162ec913d7395fef8f28352d8563fd74a59b27ac83ec99ed56bc2ee31e63bc64470d9a1180e95d8addbf1bfa8126206f40337455e1b8ebc2bb8758c7487b8d86ac6fac2b5de1dcb837db927ede9145fdb475f4a70fda65b922d93c1be93acc5f943061b0c33a4da39dc978d910a7f01708526703c493869917ddc995cb6154b9f204584f47ad1eaed9ad20fe5598a682943501c9dc2e3c3ac21bc3e7a87b4fc46c6ea081d95e36cf7c4055165b4478a080db76812c689e2074a29faac420914720f0ac28a0cc41cab2641873d3e70759ee1af84f58426732bdacafcf52a83cfc2a15daebfab5d16665798df99ba1e04d6b6d3a3fd24de14e7eb959c23796c49f1a5efea33a2c370bb2eca3c92344915901c43392afdfa27dabdd596fc1ff0ee3425f30d39f117a90ca9d590d5bfa3eb0b40e6fd96938e265fe99aaa754f400a9646aafc1dc6b5070583c9d179ef99c831a2c0f8d3f89500785dc7da9982fa08674422a7351c84d7eed96920c169329abff6b9567a13f7aba322d60856dbef1a24f02dbd8b8efb1e1457494bb6c493895de5a9aef429fd0582b36a9c57327bc9e7999a67f4950b6fb606c0077967e1aaa648a625d9c0c35d5e2c94ffffe1743205ca4cb86c711f766b30557996b2da3dc35d724b67ec16855dfe861340c0d4fcd316400d04a68e235e4d0727977d7235a3716dcb6fc432dc6291fcab7c65c29850f1f9bb46bb4b67482aaeae5d76a839ecfb834197a0c359c8cdb2f9fc35f7293277812a51f906ef654af8dffadfce9a61d06e9af531f4d136e1a12a8e4c91f7d07b97eef435fc32ee0c3bf6032810c44442e9e444dfd31fe2d392661363c82b2b1e34fe6c68f68ef2fcaf9f31d85944621abeeae5febb5a43b1c79b07fc30770a9898d2640feca58695e17e1bb9e2e41e5b368bd81a4a27d689e4bed36f9cfe5057a85e8c11f580833bda58856b91561147e40b659bf19e9d4ac87f9b262ddaeead63b2587e9bfc39f6b9250a7fe2e4b72c3b8801a5dab0f348c9b130acfd795d09e166c639d7031f300e6c6dcb28fd3f2432ddcfe86a3b441b8c81ae4b7ab8fc8d798a60533129a067e2615fc4efcba607590c81cf9e53b272245bf0668b1a49f6bd0d4e5cbc6f7f0954ef376caa950be1fc76af776d32ca2f47ee097daf913bbf7f2d4653485a28cec13ae5ac5067ada41e9513d249e41e84a85e6f70710169342c1c8708508e4eac0f259b5d7859476e585efb6690d04cc892abbf21c68d6a5527f8dcfca7c70318419d5baae83bb8f1952e66f3364b8e203f57ce5bc4792bc85853528d2250aaa05b5ead6c38cea110507b5622126ddd4a1574db7f74f89a34ee1928e973e077076a89e8cec0ecd0a803ddc6502a3e1e10ff1001fa9a07d4e5e9c617fdc3ee083d948076c3355b5f07b7d590c43e59b78acd659ee8951096da8b2773db582041052306e98ff62001a2b3534b23b090563467e143d4f6f595f2c0c67da0460a8307ecba0dcba44e78bb4225fa64e21a6d051d94af0c697eac4bee011d3d9acb80d157de6b7cb35202a98aeef2782faaec247a3da0a845a058a75f64515e3a920ecc3206d417aa5dfced75c4bc4a61185b00a60c5a9287aad0c899aa580256f61b44a88d8b8dbb285ed8ef1d29d0cddda8a443cfe9eca1b8b650df8a6362252458c917437fdf2008bb14ad9c3325ad04233d066fc1769763edd50fbde44db005698de9464d34c4d613591ed317e343b6913fa272861945ca84687b68edb2f5b0d4008f1acae3deb8620a71c1e161249a78edfb67f012c285b3076643e78644c19491e352d12f3fa6577ae6f0c26579f56a0a84be2c176ae5cd65550cd2e620ea86105a726126b9ae22d17bc16b57513a524db91c670a4402575a22095fd168014b7c728a60", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000002800), 0x0, 0x4}], 0x40801, &(0x7f0000002a40)=ANY=[@ANYBLOB='grpid,dont_appraise,uid>', @ANYRESDEC=0x0, @ANYBLOB=',f^wner=', @ANYRESDEC=r2, @ANYBLOB=',hash,euid=', @ANYRESDEC=0xee01, @ANYBLOB=',rootcontext=user_u,\x00']) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, r2, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x1000000, 0x0, 0x7, 0xfbff}) syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x3, 0x1c1101) [ 1843.011082] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.066231] CPU: 0 PID: 25351 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1843.073013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.074153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.074159] Call Trace: [ 1843.074178] dump_stack+0x142/0x197 [ 1843.074195] should_fail.cold+0x10f/0x159 [ 1843.074218] should_failslab+0xdb/0x130 [ 1843.093195] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.095608] __kmalloc+0x2f0/0x7a0 [ 1843.095627] ? __list_lru_init+0x6b/0x660 [ 1843.095639] __list_lru_init+0x6b/0x660 [ 1843.095654] sget_userns+0x4e0/0xc30 [ 1843.104255] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.105994] ? set_anon_super+0x20/0x20 [ 1843.106010] ? get_empty_filp.cold+0x3b/0x3b [ 1843.106023] mount_ns+0x6d/0x190 [ 1843.106036] ? mqueue_get_inode+0xaf0/0xaf0 [ 1843.114500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25372 comm=syz-executor.3 [ 1843.122040] mqueue_mount+0xc0/0xf0 [ 1843.122054] mount_fs+0x97/0x2a1 [ 1843.122069] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1843.122098] kern_mount_data+0x56/0xc0 [ 1843.122109] mq_init_ns+0x167/0x220 [ 1843.122119] copy_ipcs+0x35e/0x400 [ 1843.127207] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.129782] create_new_namespaces+0x1dd/0x720 [ 1843.129795] ? ns_capable_common+0x12c/0x160 [ 1843.129809] copy_namespaces+0x284/0x310 [ 1843.129821] copy_process.part.0+0x2603/0x6a70 [ 1843.136928] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25372 comm=syz-executor.3 [ 1843.137491] ? debug_smp_processor_id+0x1c/0x20 [ 1843.137503] ? perf_trace_lock+0x109/0x500 [ 1843.137513] ? check_preemption_disabled+0x3c/0x250 [ 1843.137523] ? debug_smp_processor_id+0x1c/0x20 [ 1843.137543] ? __cleanup_sighand+0x50/0x50 [ 1843.149782] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.153531] ? lock_downgrade+0x740/0x740 [ 1843.153548] _do_fork+0x19e/0xce0 [ 1843.153563] ? fork_idle+0x280/0x280 [ 1843.153578] ? fput+0xd4/0x150 [ 1843.153588] ? SyS_write+0x15e/0x230 [ 1843.153602] SyS_clone+0x37/0x50 [ 1843.153610] ? sys_vfork+0x30/0x30 [ 1843.153623] do_syscall_64+0x1e8/0x640 [ 1843.163958] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25347 comm=syz-executor.5 [ 1843.165671] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1843.165691] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1843.165700] RIP: 0033:0x45a919 [ 1843.165705] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1843.165718] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1843.182652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25375 comm=syz-executor.3 [ 1843.184795] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1843.184801] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1843.184807] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1843.184813] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:44 executing program 2 (fault-call:3 fault-nth:37): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0xc000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) writev(r5, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1843.528638] FAULT_INJECTION: forcing a failure. [ 1843.528638] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1843.540591] CPU: 1 PID: 25400 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1843.548478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1843.557837] Call Trace: [ 1843.557875] dump_stack+0x142/0x197 [ 1843.557894] should_fail.cold+0x10f/0x159 [ 1843.557911] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1843.568242] ? ____cache_alloc_node+0x162/0x1d0 [ 1843.568258] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1843.568266] ? ____cache_alloc_node+0x162/0x1d0 [ 1843.568287] cache_grow_begin+0x80/0x400 [ 1843.568301] ____cache_alloc_node+0x17c/0x1d0 [ 1843.595911] kmem_cache_alloc+0x1f3/0x780 [ 1843.600069] ? mqueue_i_callback+0x30/0x30 [ 1843.604313] mqueue_alloc_inode+0x1c/0x40 [ 1843.608467] alloc_inode+0x64/0x180 [ 1843.612181] new_inode_pseudo+0x19/0xf0 [ 1843.616156] new_inode+0x1f/0x40 [ 1843.619612] mqueue_get_inode+0x89/0xaf0 [ 1843.623703] mqueue_fill_super+0x113/0x1f0 [ 1843.627938] mount_ns+0xec/0x190 [ 1843.631301] ? mqueue_get_inode+0xaf0/0xaf0 [ 1843.635626] mqueue_mount+0xc0/0xf0 [ 1843.639261] mount_fs+0x97/0x2a1 [ 1843.642630] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1843.647140] kern_mount_data+0x56/0xc0 [ 1843.651030] mq_init_ns+0x167/0x220 [ 1843.654664] copy_ipcs+0x35e/0x400 [ 1843.658204] create_new_namespaces+0x1dd/0x720 [ 1843.662788] ? ns_capable_common+0x12c/0x160 [ 1843.667218] copy_namespaces+0x284/0x310 [ 1843.671287] copy_process.part.0+0x2603/0x6a70 [ 1843.675872] ? debug_smp_processor_id+0x1c/0x20 [ 1843.680543] ? perf_trace_lock+0x109/0x500 [ 1843.684773] ? check_preemption_disabled+0x3c/0x250 [ 1843.689793] ? debug_smp_processor_id+0x1c/0x20 [ 1843.694468] ? __cleanup_sighand+0x50/0x50 [ 1843.694481] ? lock_downgrade+0x740/0x740 [ 1843.694497] _do_fork+0x19e/0xce0 [ 1843.694509] ? fork_idle+0x280/0x280 [ 1843.702864] ? fput+0xd4/0x150 [ 1843.702876] ? SyS_write+0x15e/0x230 [ 1843.702892] SyS_clone+0x37/0x50 [ 1843.702897] ? sys_vfork+0x30/0x30 [ 1843.702910] do_syscall_64+0x1e8/0x640 [ 1843.727712] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1843.732589] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1843.737778] RIP: 0033:0x45a919 [ 1843.740963] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1843.748690] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1843.755956] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1843.763230] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1843.770497] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 09:38:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x9e2) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0xfffffffffffffecb) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x40000, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffd23) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:44 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='auxv\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x1) 09:38:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) r0 = dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffffe6) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0xfffffffffffffce3) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x203, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(r0, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r3, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1843.777764] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1845.840138] net_ratelimit: 22 callbacks suppressed [ 1845.840156] protocol 88fb is buggy, dev hsr_slave_0 [ 1845.850186] protocol 88fb is buggy, dev hsr_slave_1 09:38:47 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:47 executing program 2 (fault-call:3 fault-nth:38): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:47 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcsa\x00', 0x104000, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) sendmsg$can_bcm(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0x10, &(0x7f0000000240)={&(0x7f00000001c0)={0x2, 0x854, 0x4d, {}, {0x0, 0x7530}, {0x2, 0x1}, 0x1, @canfd={{0x3, 0x0, 0x0, 0x1}, 0x3f, 0x3, 0x0, 0x0, "af52f60cf068561fc1080fb2092ceaeb1bb21ac3d5419b326e0e0674577b1e6152fa1f7a8b708debc3e8fda368f967cbdae76ef6afca8f2214d1a472c0385f47"}}, 0x80}}, 0x0) 09:38:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) dup(r2) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r9 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r9, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/132, 0x84}], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xccf3, 0x0, 0x0, 0x800e00540) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r2, 0x0, 0xfd1d, 0x0, 0x0, 0x800e00507) shutdown(r1, 0x0) 09:38:47 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1846.027690] FAULT_INJECTION: forcing a failure. [ 1846.027690] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1846.039640] CPU: 0 PID: 25434 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1846.047523] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.056877] Call Trace: [ 1846.059470] dump_stack+0x142/0x197 [ 1846.063112] should_fail.cold+0x10f/0x159 [ 1846.067268] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1846.071946] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1846.076978] cache_grow_begin+0x80/0x400 [ 1846.081044] kmem_cache_alloc+0x6a6/0x780 [ 1846.085200] ? mqueue_i_callback+0x30/0x30 [ 1846.089652] mqueue_alloc_inode+0x1c/0x40 [ 1846.089664] alloc_inode+0x64/0x180 [ 1846.097442] new_inode_pseudo+0x19/0xf0 [ 1846.101421] new_inode+0x1f/0x40 [ 1846.104797] mqueue_get_inode+0x89/0xaf0 [ 1846.108861] mqueue_fill_super+0x113/0x1f0 [ 1846.113096] mount_ns+0xec/0x190 [ 1846.116462] ? mqueue_get_inode+0xaf0/0xaf0 [ 1846.120791] mqueue_mount+0xc0/0xf0 [ 1846.124417] mount_fs+0x97/0x2a1 [ 1846.127935] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1846.132445] kern_mount_data+0x56/0xc0 [ 1846.136333] mq_init_ns+0x167/0x220 [ 1846.139964] copy_ipcs+0x35e/0x400 [ 1846.143512] create_new_namespaces+0x1dd/0x720 [ 1846.148099] ? ns_capable_common+0x12c/0x160 [ 1846.152516] copy_namespaces+0x284/0x310 [ 1846.156575] copy_process.part.0+0x2603/0x6a70 [ 1846.161153] ? debug_smp_processor_id+0x1c/0x20 [ 1846.161163] ? perf_trace_lock+0x109/0x500 [ 1846.161171] ? check_preemption_disabled+0x3c/0x250 [ 1846.161182] ? debug_smp_processor_id+0x1c/0x20 [ 1846.161221] ? __cleanup_sighand+0x50/0x50 [ 1846.161231] ? lock_downgrade+0x740/0x740 [ 1846.161247] _do_fork+0x19e/0xce0 [ 1846.161261] ? fork_idle+0x280/0x280 [ 1846.161274] ? fput+0xd4/0x150 [ 1846.161284] ? SyS_write+0x15e/0x230 [ 1846.161297] SyS_clone+0x37/0x50 [ 1846.161305] ? sys_vfork+0x30/0x30 [ 1846.161317] do_syscall_64+0x1e8/0x640 [ 1846.175186] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1846.175221] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1846.223001] RIP: 0033:0x45a919 09:38:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() gettid() r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = accept4$netrom(r0, &(0x7f0000000140)={{0x3, @default}, [@remote, @default, @default, @null, @null, @remote, @bcast, @default]}, &(0x7f0000000000)=0x48, 0xb56af4011afe9ebb) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) kcmp(r4, r1, 0x3da92846647eda8f, 0xffffffffffffffff, r3) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffca9) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r5 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r5, 0x0, 0x0) r6 = syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xffe6) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r8 = socket$inet(0x10, 0x2, 0x0) r9 = dup(r8) sendfile(r9, r7, &(0x7f0000000040)=0x103000, 0x8001) r10 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r10, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r10) r11 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r12 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r12) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r13 = inotify_init1(0x0) fcntl$setown(r13, 0x8, 0xffffffffffffffff) fcntl$getownex(r13, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r14, 0x13) syz_open_procfs(r14, &(0x7f0000000040)='clear_refs\x00') r15 = socket$alg(0x26, 0x5, 0x0) bind$alg(r15, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r15, 0x117, 0x1, 0x0, 0x0) r16 = accept$alg(r15, 0x0, 0x0) r17 = dup(r16) write$UHID_DESTROY(r17, &(0x7f0000000080), 0xfff2) recvmmsg(r17, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)}}], 0x1, 0x0, 0x0) r18 = getpid() sched_setattr(r18, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r19 = getpid() r20 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r20, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r21, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r22}}, 0x120) r23 = getpid() sched_setattr(r23, &(0x7f0000000040)={0x30}, 0x0) r24 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r24, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r25 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r25, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]}, 0x177) r26 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r26, 0x0, 0x0) r27 = getpgrp(0x0) waitid(0x0, r27, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r27, 0x9, &(0x7f00000001c0)=""/68) r28 = getpgid(r27) r29 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r29, 0x8904, &(0x7f0000000000)=0x0) r31 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r32 = openat$cgroup_ro(r31, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r33 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r34 = getpid() r35 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r35, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r35, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r36 = gettid() waitid(0x2c7c96e4f825ad55, r36, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r37 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r37, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r38 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r38, &(0x7f0000000000), 0x0) sendmsg$key(r35, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r28, @ANYRES16, @ANYRES16=r28, @ANYRESDEC, @ANYRES32, @ANYRES64], @ANYRESOCT=r37, @ANYRES64=r38, @ANYRES64], @ANYRESDEC=r36]], 0x8}}, 0x20004850) r39 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r39) kcmp(r39, r39, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r39, 0x0, 0x0) r40 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r39, r40, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r36, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r41}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r41}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r41}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r34, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r41}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r41}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r33, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r32, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r30, r29, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r28, r26, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r41}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r41}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r41}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r25, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r41}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r41}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r41}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r24, 0x0, 0x1, &(0x7f0000000000)='\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r23, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r21, 0x0, 0x1, &(0x7f0000000500)='\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r19, r20, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r18, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r14, r17, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r41}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r41}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r12, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r11, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00', r41}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r10, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00', r41}, 0x30) r42 = getpid() sched_setattr(r42, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r43 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r44 = socket$inet(0x10, 0x2, 0x0) r45 = dup(r44) sendfile(r45, r43, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={r42, r45, 0x0, 0x24, &(0x7f00000001c0)='cpuset#[-(posix_acl_accessmime_type\x00', 0xffffffffffffffff}, 0x30) r46 = getpid() sched_setattr(r46, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r48 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r48, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r48) r49 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r50 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r50) ioctl$PERF_EVENT_IOC_SET_FILTER(r50, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r51 = inotify_init1(0x0) fcntl$setown(r51, 0x8, 0xffffffffffffffff) fcntl$getownex(r51, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r52, 0x13) syz_open_procfs(r52, &(0x7f0000000040)='clear_refs\x00') r53 = socket$alg(0x26, 0x5, 0x0) bind$alg(r53, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r53, 0x117, 0x1, 0x0, 0x0) r54 = accept$alg(r53, 0x0, 0x0) r55 = dup(r54) write$UHID_DESTROY(r55, &(0x7f0000000080), 0xfff2) recvmmsg(r55, &(0x7f0000002700)=[{{0x0, 0x0, &(0x7f0000000980)}}], 0x1, 0x0, 0x0) r56 = getpid() sched_setattr(r56, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r57 = getpid() r58 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r58, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r59, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r60}}, 0x120) r61 = getpid() sched_setattr(r61, &(0x7f0000000040)={0x30}, 0x0) r62 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r62, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r63 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r63, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f218000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def971300"/255]}, 0x177) r64 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r64, 0x0, 0x0) r65 = getpgrp(0x0) waitid(0x0, r65, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r65, 0x9, &(0x7f00000001c0)=""/68) r66 = getpgid(r65) r67 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r67, 0x8904, &(0x7f0000000000)=0x0) r69 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r70 = openat$cgroup_ro(r69, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r71 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r72 = getpid() r73 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r73, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r73, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r74 = gettid() waitid(0x2c7c96e4f825ad55, r74, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r75 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r75, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r76 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r76, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r73, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r66, @ANYRES16, @ANYRES16=r66, @ANYRESDEC, @ANYRES32, @ANYRES64], @ANYRESOCT=r75, @ANYRES64=r76, @ANYRES64], @ANYRESDEC=r74]], 0x8}}, 0x20004850) r77 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r77) kcmp(r77, r77, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r77, 0x0, 0x0) r78 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r77, r78, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r74, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r79}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r79}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r79}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r72, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r79}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r79}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r71, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r70, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r68, r67, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r66, r64, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r79}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r79}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r79}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r63, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r79}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r79}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r79}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r62, 0x0, 0x1, &(0x7f0000000000)='\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r61, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r59, 0x0, 0x1, &(0x7f0000000500)='\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r57, r58, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r56, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r52, r55, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r79}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r79}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r50, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r49, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r48, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00', r79}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r47, r7, 0x0, 0xfffffffffffffe7a, 0x0, r79}, 0xfda7) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xbc, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1846.226188] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1846.233900] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1846.241174] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1846.248443] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1846.255715] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1846.262989] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1846.270536] protocol 88fb is buggy, dev hsr_slave_0 09:38:47 executing program 2 (fault-call:3 fault-nth:39): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1846.275617] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.345139] FAULT_INJECTION: forcing a failure. [ 1846.345139] name failslab, interval 1, probability 0, space 0, times 0 [ 1846.356962] CPU: 0 PID: 25460 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1846.364830] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.374175] Call Trace: [ 1846.376784] dump_stack+0x142/0x197 [ 1846.380424] should_fail.cold+0x10f/0x159 [ 1846.384581] should_failslab+0xdb/0x130 [ 1846.388560] kmem_cache_alloc+0x2d7/0x780 [ 1846.392708] ? mqueue_alloc_inode+0x1c/0x40 [ 1846.397022] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1846.402477] selinux_inode_alloc_security+0xb6/0x2a0 [ 1846.407580] security_inode_alloc+0x94/0xd0 [ 1846.411909] inode_init_always+0x552/0xaf0 [ 1846.416145] alloc_inode+0x81/0x180 [ 1846.419774] new_inode_pseudo+0x19/0xf0 [ 1846.423746] new_inode+0x1f/0x40 [ 1846.427112] mqueue_get_inode+0x89/0xaf0 [ 1846.431178] mqueue_fill_super+0x113/0x1f0 [ 1846.435423] mount_ns+0xec/0x190 [ 1846.438785] ? mqueue_get_inode+0xaf0/0xaf0 [ 1846.443104] mqueue_mount+0xc0/0xf0 [ 1846.446740] mount_fs+0x97/0x2a1 [ 1846.450104] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1846.454600] kern_mount_data+0x56/0xc0 [ 1846.458483] mq_init_ns+0x167/0x220 [ 1846.462119] copy_ipcs+0x35e/0x400 [ 1846.465662] create_new_namespaces+0x1dd/0x720 [ 1846.470244] ? ns_capable_common+0x12c/0x160 [ 1846.474651] copy_namespaces+0x284/0x310 [ 1846.478715] copy_process.part.0+0x2603/0x6a70 [ 1846.483317] ? debug_smp_processor_id+0x1c/0x20 [ 1846.487995] ? perf_trace_lock+0x109/0x500 [ 1846.492243] ? check_preemption_disabled+0x3c/0x250 [ 1846.497261] ? debug_smp_processor_id+0x1c/0x20 [ 1846.501942] ? __cleanup_sighand+0x50/0x50 [ 1846.506177] ? lock_downgrade+0x740/0x740 [ 1846.510326] _do_fork+0x19e/0xce0 [ 1846.513795] ? fork_idle+0x280/0x280 [ 1846.517511] ? fput+0xd4/0x150 [ 1846.520700] ? SyS_write+0x15e/0x230 [ 1846.524410] SyS_clone+0x37/0x50 [ 1846.527773] ? sys_vfork+0x30/0x30 [ 1846.531317] do_syscall_64+0x1e8/0x640 [ 1846.535207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1846.540069] entry_SYSCALL_64_after_hwframe+0x42/0xb7 09:38:47 executing program 2 (fault-call:3 fault-nth:40): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1846.545254] RIP: 0033:0x45a919 [ 1846.548442] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1846.556147] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1846.563415] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1846.570679] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1846.577938] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1846.585287] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1846.639548] FAULT_INJECTION: forcing a failure. [ 1846.639548] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1846.651556] CPU: 1 PID: 25469 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1846.659445] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1846.668789] Call Trace: [ 1846.671364] dump_stack+0x142/0x197 [ 1846.675121] should_fail.cold+0x10f/0x159 [ 1846.679271] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1846.683922] ? fs_reclaim_acquire+0x20/0x20 [ 1846.688224] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1846.693248] cache_grow_begin+0x80/0x400 [ 1846.697293] kmem_cache_alloc+0x6a6/0x780 [ 1846.701466] ? retire_userns_sysctls+0x90/0x90 [ 1846.706043] copy_pid_ns+0x1af/0xa50 [ 1846.709754] create_new_namespaces+0x267/0x720 [ 1846.714324] copy_namespaces+0x284/0x310 [ 1846.718381] copy_process.part.0+0x2603/0x6a70 [ 1846.722945] ? debug_smp_processor_id+0x1c/0x20 [ 1846.727594] ? perf_trace_lock+0x109/0x500 [ 1846.731813] ? check_preemption_disabled+0x3c/0x250 [ 1846.736814] ? debug_smp_processor_id+0x1c/0x20 [ 1846.741482] ? __cleanup_sighand+0x50/0x50 [ 1846.745702] ? lock_downgrade+0x740/0x740 [ 1846.749842] _do_fork+0x19e/0xce0 [ 1846.753283] ? fork_idle+0x280/0x280 [ 1846.756977] ? fput+0xd4/0x150 [ 1846.760149] ? SyS_write+0x15e/0x230 [ 1846.763854] SyS_clone+0x37/0x50 [ 1846.767207] ? sys_vfork+0x30/0x30 [ 1846.770743] do_syscall_64+0x1e8/0x640 [ 1846.774610] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1846.779435] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1846.784621] RIP: 0033:0x45a919 [ 1846.787888] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1846.795590] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1846.802883] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1846.810221] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1846.817473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1846.824730] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1846.832297] protocol 88fb is buggy, dev hsr_slave_0 09:38:48 executing program 2 (fault-call:3 fault-nth:41): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1846.837368] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.840275] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.842475] protocol 88fb is buggy, dev hsr_slave_0 [ 1846.847520] protocol 88fb is buggy, dev hsr_slave_1 [ 1846.852528] protocol 88fb is buggy, dev hsr_slave_1 09:38:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) 09:38:48 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x37a588070ab220d0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f0000000080), &(0x7f0000000100)=0x68) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, 0x0) r3 = msgget(0x2, 0x0) msgctl$MSG_STAT(r3, 0xb, 0x0) msgrcv(r3, 0x0, 0x263, 0x2, 0x800) r4 = syz_init_net_socket$llc(0x1a, 0x9ee4a8668b51a3cc, 0x0) setsockopt$llc_int(r4, 0x10c, 0x9, &(0x7f0000000000), 0x4) syz_open_dev$char_usb(0xc, 0xb4, 0x100000001) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x129}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8000000000000000, 0xfffffffffffffffd}) [ 1847.012157] FAULT_INJECTION: forcing a failure. [ 1847.012157] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1847.024091] CPU: 1 PID: 25480 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1847.031968] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1847.041319] Call Trace: [ 1847.043918] dump_stack+0x142/0x197 [ 1847.047559] should_fail.cold+0x10f/0x159 [ 1847.051731] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1847.056403] ? ____cache_alloc_node+0x162/0x1d0 [ 1847.061080] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1847.066119] ? ____cache_alloc_node+0x162/0x1d0 [ 1847.070797] cache_grow_begin+0x80/0x400 [ 1847.070811] ____cache_alloc_node+0x17c/0x1d0 [ 1847.070824] kmem_cache_alloc+0x1f3/0x780 [ 1847.079372] ? retire_userns_sysctls+0x90/0x90 [ 1847.079388] copy_pid_ns+0x1af/0xa50 [ 1847.079404] create_new_namespaces+0x267/0x720 [ 1847.096372] copy_namespaces+0x284/0x310 [ 1847.100440] copy_process.part.0+0x2603/0x6a70 [ 1847.105017] ? __schedule+0x7c0/0x1cd0 [ 1847.105026] ? debug_smp_processor_id+0x1c/0x20 [ 1847.105043] ? trace_hardirqs_on_caller+0x400/0x590 [ 1847.113575] ? __cleanup_sighand+0x50/0x50 [ 1847.113594] _do_fork+0x19e/0xce0 [ 1847.113607] ? fork_idle+0x280/0x280 [ 1847.122932] ? fput+0xd4/0x150 [ 1847.122943] ? SyS_write+0x15e/0x230 [ 1847.130179] SyS_clone+0x37/0x50 [ 1847.130187] ? sys_vfork+0x30/0x30 [ 1847.130201] do_syscall_64+0x1e8/0x640 [ 1847.130209] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1847.130226] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1847.137090] RIP: 0033:0x45a919 [ 1847.137095] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1847.137108] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1847.143975] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1847.143981] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1847.143987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1847.143994] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:50 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:50 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r1 = socket$inet(0x10, 0x2, 0x0) r2 = dup(r1) sendfile(r2, r0, &(0x7f0000000040)=0x103000, 0x8001) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000000)={0xfffffff8, 0x3ff}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@initdev, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000001c0)=0xe8) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r8 = socket$inet(0x10, 0x2, 0x0) r9 = dup(r8) sendfile(r9, r7, &(0x7f0000000040)=0x103000, 0x8001) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r11 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000001700)=ANY=[@ANYBLOB="257ab9b15f29c0d90869540784acc74f289401f7e0af5fc24875504d18a95c840e5ca21f3468ad38142d240437fb00a6b1d26b3c61c796966648a025f711fd02900c935aea634c475b2b9170c81b093cd7a90f9e279436805a293af052a14fae93f8059176a90b59ae69602ec5e42d99bcfa305bfeefdddcfd", @ANYRES32=r12, @ANYBLOB="080f3f015cb3ccb640e50b1246926360b08cbb811e5c37b4716b6da7fd29e6ae83735fda8b1678eee54176241837bf8e031b69d31cfa7c8e", @ANYRES32=r12, @ANYBLOB], 0x5, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, r12, r10, 0x0, 0xe6}, 0x0, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1}) 09:38:50 executing program 0: r0 = socket$inet(0xa, 0x801, 0x84) listen(r0, 0xfc0004) recvmmsg(r0, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 09:38:50 executing program 2 (fault-call:3 fault-nth:42): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffceb) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffe1e) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:50 executing program 0: gettid() r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000280)={0x0, 0x48, "aed141b5b11f86a0250b813ff56dfe0fd30fd78fcf73bb14266293e2c73717ee4a938a049e5c6886f8c2fba832f2c4fec6cd4fa34f90adb82c706b995fa3cda457f890eb988e3a70"}, &(0x7f0000000300)=0x50) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2}}, {{@in6=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000340)={0x0, 0xd0, "fbfde4542b234d3b09350ed60e420769e5c219cf99d28640c6aef8af27da82caac3c3843ba511e01005a7facb3cc0c4ae7d550c3ff788e319acce7f4f98811be123f7d0403bd94de01b87bea9fbfd7785209bc95b0d885ded19896425978bfa10dd32095aa1bd846a876640dae1588535359952e1d458a6aa65defc344aeef191b18d979135a5cc99c8120fa18946402058f6f87191f57742bdf00e3d9490f8103d2a60b989a1c55b33b84074ff7bd563404d000534facde35e97ec683a322c2e24126df3769a405beb3b9d5b7b91422"}, &(0x7f0000000440)=0xd8) r2 = socket(0x10, 0x3, 0x0) close(r2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000002400)={0x0, 0x80}, &(0x7f0000002440)=0xc) socket(0x0, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x103, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x4000000000002, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) [ 1849.088798] selinux_nlmsg_perm: 102 callbacks suppressed [ 1849.088808] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25505 comm=syz-executor.3 [ 1849.122578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25505 comm=syz-executor.3 [ 1849.141728] FAULT_INJECTION: forcing a failure. [ 1849.141728] name failslab, interval 1, probability 0, space 0, times 0 [ 1849.159371] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25505 comm=syz-executor.3 [ 1849.162237] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25518 comm=syz-executor.3 [ 1849.171729] CPU: 1 PID: 25509 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1849.191490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.195611] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25518 comm=syz-executor.3 [ 1849.200832] Call Trace: [ 1849.200850] dump_stack+0x142/0x197 [ 1849.200867] should_fail.cold+0x10f/0x159 [ 1849.200882] should_failslab+0xdb/0x130 [ 1849.200893] kmem_cache_alloc+0x2d7/0x780 [ 1849.200905] ? lockdep_init_map+0x9/0x10 [ 1849.216077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25521 comm=syz-executor.3 [ 1849.219217] ? copy_pid_ns+0x4f/0xa50 [ 1849.219234] alloc_pid+0x5d/0xc70 [ 1849.219255] ? copy_thread_tls+0x3c8/0x7a0 [ 1849.225220] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25518 comm=syz-executor.3 [ 1849.227351] copy_process.part.0+0x272f/0x6a70 [ 1849.227367] ? debug_smp_processor_id+0x1c/0x20 [ 1849.227379] ? perf_trace_lock+0x109/0x500 [ 1849.233173] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25521 comm=syz-executor.3 [ 1849.235555] ? check_preemption_disabled+0x3c/0x250 [ 1849.235569] ? debug_smp_processor_id+0x1c/0x20 [ 1849.235594] ? __cleanup_sighand+0x50/0x50 [ 1849.249321] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25518 comm=syz-executor.3 [ 1849.251431] ? lock_downgrade+0x740/0x740 [ 1849.251449] _do_fork+0x19e/0xce0 [ 1849.251464] ? fork_idle+0x280/0x280 [ 1849.251479] ? fput+0xd4/0x150 [ 1849.256269] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25518 comm=syz-executor.3 [ 1849.259132] ? SyS_write+0x15e/0x230 [ 1849.259148] SyS_clone+0x37/0x50 [ 1849.259155] ? sys_vfork+0x30/0x30 [ 1849.259168] do_syscall_64+0x1e8/0x640 [ 1849.259178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1849.368432] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1849.373602] RIP: 0033:0x45a919 [ 1849.376778] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1849.384473] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:38:50 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) sendfile(r1, r2, &(0x7f00000000c0)=0x103000, 0x8001) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x2) 09:38:50 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = getuid() r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) getsockopt$nfc_llcp(r2, 0x118, 0x4, &(0x7f0000000100)=""/255, 0xff) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, r1}, 0x0, 0x1, 0x0, 0xbeb}) 09:38:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xfffffffffffffed7) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x84000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1849.391735] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1849.398989] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1849.406238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1849.413495] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:50 executing program 2 (fault-call:3 fault-nth:43): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:50 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) sendfile(r1, r2, &(0x7f00000000c0)=0x103000, 0x8001) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x2) [ 1849.534241] FAULT_INJECTION: forcing a failure. [ 1849.534241] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1849.546607] CPU: 1 PID: 25552 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1849.554525] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.563880] Call Trace: [ 1849.566473] dump_stack+0x142/0x197 [ 1849.570112] should_fail.cold+0x10f/0x159 [ 1849.574262] ? __might_sleep+0x93/0xb0 [ 1849.578175] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1849.582839] ? check_preemption_disabled+0x3c/0x250 [ 1849.587841] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1849.592837] ? rcu_lockdep_current_cpu_online+0xf2/0x140 [ 1849.598267] ? __alloc_pages_nodemask+0x639/0x7a0 [ 1849.603092] alloc_pages_current+0xec/0x1e0 [ 1849.607568] __get_free_pages+0xf/0x40 [ 1849.611435] get_zeroed_page+0x11/0x20 [ 1849.615304] selinux_sb_copy_data+0x2a/0x390 [ 1849.619695] security_sb_copy_data+0x75/0xb0 [ 1849.624095] mount_fs+0x1ec/0x2a1 [ 1849.627531] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1849.632017] ? rcu_read_lock_sched_held+0x110/0x130 [ 1849.637011] kern_mount_data+0x56/0xc0 [ 1849.640893] pid_ns_prepare_proc+0x1e/0x90 [ 1849.645125] alloc_pid+0x9f0/0xc70 [ 1849.648655] copy_process.part.0+0x272f/0x6a70 [ 1849.653218] ? debug_smp_processor_id+0x1c/0x20 [ 1849.657876] ? perf_trace_lock+0x109/0x500 [ 1849.662098] ? check_preemption_disabled+0x3c/0x250 [ 1849.667094] ? debug_smp_processor_id+0x1c/0x20 [ 1849.671747] ? __cleanup_sighand+0x50/0x50 [ 1849.675959] ? lock_downgrade+0x740/0x740 [ 1849.680100] _do_fork+0x19e/0xce0 [ 1849.683547] ? fork_idle+0x280/0x280 [ 1849.687240] ? fput+0xd4/0x150 [ 1849.690412] ? SyS_write+0x15e/0x230 [ 1849.694108] SyS_clone+0x37/0x50 [ 1849.697451] ? sys_vfork+0x30/0x30 [ 1849.700972] do_syscall_64+0x1e8/0x640 [ 1849.704839] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1849.709668] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1849.714837] RIP: 0033:0x45a919 [ 1849.718017] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1849.725717] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1849.732965] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1849.740216] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1849.747465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1849.754720] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1850.960134] net_ratelimit: 18 callbacks suppressed [ 1850.960140] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.960189] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.965260] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.965329] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.970375] protocol 88fb is buggy, dev hsr_slave_0 [ 1850.975346] protocol 88fb is buggy, dev hsr_slave_1 [ 1850.980359] protocol 88fb is buggy, dev hsr_slave_1 09:38:53 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:53 executing program 0: syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r0 = socket$inet(0x10, 0x2, 0x0) r1 = dup(r0) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) sendfile(r1, r2, &(0x7f00000000c0)=0x103000, 0x8001) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000000), 0x4) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x0) msgrcv(r3, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)=0x2) 09:38:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r2 = dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r3 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r3, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r4, &(0x7f0000000040)=0x103000, 0x8001) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffff13) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:53 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) write$P9_RREAD(r2, &(0x7f0000000100)={0xd9, 0x75, 0x1, {0xce, "466e332689b21ad5474ef56ce78df9b6b6ce5fb29b7dccf1d5228ac593fc4ef9378bf1d2eea23b6007b2a0e01e021f2243098463fe8d42828e9b6dd7698eb3b15a798ba796b721025a527d67c3c5168860cc4bc934d6c762662c07fab57fa6fc5895030c5b7ebeccfd4f06b23b37ffe0a7f02899cbe94f0a1b7d57b2fcec7840719d066493fdc112abc67611c7ede628eb1f9b639012db341637c75e17a4f4948440e347105802ff4608f1a9e28b15db64f67319face27bbb8b3b1fe35dfff4b48490f4b0be424fe3b3e5642e59a"}}, 0xd9) r5 = socket$inet(0x10, 0x2, 0x0) r6 = dup(r5) sendfile(r6, r1, &(0x7f0000000040)=0x103000, 0x8001) setsockopt$inet6_dccp_buf(r6, 0x21, 0xc, &(0x7f0000000080)="1da85581edf6ee899fb05721daac40bc426d093aafe687dabc4e6df82d2dca4098812b23aef132c0894d7531b6e3706cd580c5ceff9db1a57f414bedbb6eaf19db2d010efc3ee4c18940c8e1a45574edb6957487a9f7fefa811301c188ce716dae11429158454a498e9d", 0x6a) 09:38:53 executing program 2 (fault-call:3 fault-nth:44): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1852.080150] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.085242] protocol 88fb is buggy, dev hsr_slave_1 09:38:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 1852.167094] FAULT_INJECTION: forcing a failure. [ 1852.167094] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1852.202908] CPU: 0 PID: 25566 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1852.210839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.220200] Call Trace: [ 1852.222812] dump_stack+0x142/0x197 [ 1852.226455] should_fail.cold+0x10f/0x159 [ 1852.230613] ? __might_sleep+0x93/0xb0 [ 1852.234512] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1852.239199] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1852.244235] alloc_pages_current+0xec/0x1e0 [ 1852.248571] __get_free_pages+0xf/0x40 [ 1852.252467] get_zeroed_page+0x11/0x20 [ 1852.256357] mount_fs+0x1cc/0x2a1 [ 1852.259831] vfs_kern_mount.part.0+0x5e/0x3d0 09:38:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 1852.264329] ? rcu_read_lock_sched_held+0x110/0x130 [ 1852.269349] kern_mount_data+0x56/0xc0 [ 1852.273244] pid_ns_prepare_proc+0x1e/0x90 [ 1852.277479] alloc_pid+0x9f0/0xc70 [ 1852.281036] copy_process.part.0+0x272f/0x6a70 [ 1852.285626] ? debug_smp_processor_id+0x1c/0x20 [ 1852.290296] ? perf_trace_lock+0x109/0x500 [ 1852.294534] ? check_preemption_disabled+0x3c/0x250 [ 1852.299564] ? debug_smp_processor_id+0x1c/0x20 [ 1852.304246] ? __cleanup_sighand+0x50/0x50 [ 1852.308486] ? lock_downgrade+0x740/0x740 [ 1852.312644] _do_fork+0x19e/0xce0 09:38:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}) [ 1852.316104] ? fork_idle+0x280/0x280 [ 1852.319824] ? fput+0xd4/0x150 [ 1852.323020] ? SyS_write+0x15e/0x230 [ 1852.326739] SyS_clone+0x37/0x50 [ 1852.330103] ? sys_vfork+0x30/0x30 [ 1852.333648] do_syscall_64+0x1e8/0x640 [ 1852.337542] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1852.342395] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1852.347583] RIP: 0033:0x45a919 [ 1852.350770] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1852.358481] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:38:53 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 09:38:53 executing program 3: clone(0x40000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) mmap$dsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x8110, 0xffffffffffffffff, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @sack_perm, @sack_perm, @timestamp, @timestamp, @window, @window], 0x7) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1852.365750] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1852.373019] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1852.380291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1852.387565] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1852.480121] protocol 88fb is buggy, dev hsr_slave_0 [ 1852.751504] IPVS: ftp: loaded support on port[0] = 21 09:38:56 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:56 executing program 2 (fault-call:3 fault-nth:45): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfd55) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:56 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0x14) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 09:38:56 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000180)=0x6, 0x4) r2 = msgget(0x2, 0x0) msgctl$MSG_STAT(r2, 0xb, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000003c0)={{0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x1, 0x0, 0x400000000}) r3 = msgget(0x2, 0x0) msgctl$MSG_STAT(r3, 0xb, 0x0) msgrcv(r3, &(0x7f0000000080)={0x0, ""/168}, 0xb0, 0x121bd3a66e35c6c6, 0x1000) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r4, 0xae78, &(0x7f0000000040)=0x2) 09:38:56 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000080)={0x7, 0x1f, 0xfffffffffffffffa}) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) [ 1855.237110] FAULT_INJECTION: forcing a failure. [ 1855.237110] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.261340] CPU: 1 PID: 25636 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1855.269249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.278601] Call Trace: [ 1855.281201] dump_stack+0x142/0x197 [ 1855.284844] should_fail.cold+0x10f/0x159 [ 1855.289005] should_failslab+0xdb/0x130 [ 1855.292983] __kmalloc+0x2f0/0x7a0 [ 1855.296530] ? __list_lru_init+0x6b/0x660 [ 1855.300683] __list_lru_init+0x6b/0x660 [ 1855.304663] sget_userns+0x4e0/0xc30 [ 1855.308371] ? set_anon_super+0x20/0x20 [ 1855.312352] ? get_empty_filp.cold+0x3b/0x3b [ 1855.316755] mount_ns+0x6d/0x190 [ 1855.320126] ? proc_get_inode+0x620/0x620 [ 1855.324286] proc_mount+0x6a/0xa0 [ 1855.327736] mount_fs+0x97/0x2a1 [ 1855.331091] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1855.335581] ? rcu_read_lock_sched_held+0x110/0x130 [ 1855.340580] kern_mount_data+0x56/0xc0 [ 1855.344451] pid_ns_prepare_proc+0x1e/0x90 [ 1855.348664] alloc_pid+0x9f0/0xc70 [ 1855.352196] copy_process.part.0+0x272f/0x6a70 [ 1855.356759] ? debug_smp_processor_id+0x1c/0x20 [ 1855.361410] ? perf_trace_lock+0x109/0x500 [ 1855.365621] ? check_preemption_disabled+0x3c/0x250 [ 1855.370615] ? debug_smp_processor_id+0x1c/0x20 [ 1855.375273] ? __cleanup_sighand+0x50/0x50 [ 1855.379486] ? lock_downgrade+0x740/0x740 [ 1855.383618] _do_fork+0x19e/0xce0 [ 1855.387050] ? fork_idle+0x280/0x280 [ 1855.390743] ? fput+0xd4/0x150 [ 1855.393911] ? SyS_write+0x15e/0x230 [ 1855.397607] SyS_clone+0x37/0x50 [ 1855.400954] ? sys_vfork+0x30/0x30 [ 1855.404477] do_syscall_64+0x1e8/0x640 [ 1855.408343] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1855.413174] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1855.418345] RIP: 0033:0x45a919 [ 1855.421512] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1855.429202] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:38:56 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 09:38:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x3, 0x80) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1855.436452] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1855.443712] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1855.450962] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1855.458254] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:38:56 executing program 2 (fault-call:3 fault-nth:46): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1855.571848] FAULT_INJECTION: forcing a failure. [ 1855.571848] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.599567] CPU: 0 PID: 25657 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1855.607478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.616931] Call Trace: [ 1855.619517] dump_stack+0x142/0x197 [ 1855.623162] should_fail.cold+0x10f/0x159 [ 1855.627341] should_failslab+0xdb/0x130 [ 1855.631318] __kmalloc+0x2f0/0x7a0 [ 1855.634865] ? __list_lru_init+0x6b/0x660 [ 1855.639022] __list_lru_init+0x6b/0x660 [ 1855.643024] sget_userns+0x4e0/0xc30 [ 1855.646740] ? set_anon_super+0x20/0x20 [ 1855.650722] ? get_empty_filp.cold+0x3b/0x3b [ 1855.655145] mount_ns+0x6d/0x190 [ 1855.658519] ? proc_get_inode+0x620/0x620 [ 1855.662677] proc_mount+0x6a/0xa0 [ 1855.666146] mount_fs+0x97/0x2a1 [ 1855.669523] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1855.674028] ? rcu_read_lock_sched_held+0x110/0x130 [ 1855.679052] kern_mount_data+0x56/0xc0 [ 1855.682934] pid_ns_prepare_proc+0x1e/0x90 [ 1855.682945] alloc_pid+0x9f0/0xc70 [ 1855.682965] copy_process.part.0+0x272f/0x6a70 [ 1855.682976] ? debug_smp_processor_id+0x1c/0x20 [ 1855.690722] ? perf_trace_lock+0x109/0x500 [ 1855.690732] ? check_preemption_disabled+0x3c/0x250 [ 1855.690745] ? debug_smp_processor_id+0x1c/0x20 [ 1855.690766] ? __cleanup_sighand+0x50/0x50 [ 1855.690776] ? lock_downgrade+0x740/0x740 [ 1855.690792] _do_fork+0x19e/0xce0 [ 1855.690806] ? fork_idle+0x280/0x280 [ 1855.690820] ? fput+0xd4/0x150 [ 1855.690830] ? SyS_write+0x15e/0x230 [ 1855.690846] SyS_clone+0x37/0x50 [ 1855.739790] ? sys_vfork+0x30/0x30 [ 1855.743336] do_syscall_64+0x1e8/0x640 [ 1855.747222] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1855.752088] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1855.757273] RIP: 0033:0x45a919 [ 1855.760462] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 09:38:56 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1, 0x0, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(r0) close(0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xfffffffffffffcfa) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x6f) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() r3 = getpid() r4 = socket$inet(0x10, 0x2, 0x0) dup(r4) r5 = fcntl$getown(r4, 0x9) sched_setattr(r5, &(0x7f0000000040)={0x38, 0x2, 0x10000000, 0x0, 0x9}, 0x0) sched_setattr(r3, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2, 0x4c, 0x0, 0x9, 0x683}, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ptrace$getregs(0xffffffffffffffff, r7, 0x7, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0x4206, 0x0, 0x79000, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x210, 0x0}, 0x1f6) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0xfffffffffffffee8, 0x0}, 0xaa) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r1, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffff02) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1855.768173] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1855.775453] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1855.782720] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1855.789987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1855.797248] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1856.240162] net_ratelimit: 21 callbacks suppressed [ 1856.240174] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.250190] protocol 88fb is buggy, dev hsr_slave_1 [ 1856.640165] protocol 88fb is buggy, dev hsr_slave_0 [ 1856.645422] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.200142] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.200145] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.200188] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.205237] protocol 88fb is buggy, dev hsr_slave_1 [ 1857.210416] protocol 88fb is buggy, dev hsr_slave_0 [ 1857.215443] protocol 88fb is buggy, dev hsr_slave_0 09:38:59 executing program 4: creat(&(0x7f0000000140)='./file0\x00', 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window, @window, @timestamp], 0x8) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000000)) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x4800c1) ptrace$cont(0x9, r0, 0x0, 0x0) 09:38:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x6) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r3 = socket$inet(0x10, 0x2, 0x0) r4 = dup(r3) sendfile(r4, r2, &(0x7f0000000040)=0x103000, 0x8001) write$cgroup_pid(r2, 0x0, 0x389) r5 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r5, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r7 = socket$inet(0x10, 0x2, 0x0) r8 = dup(r7) sendfile(r8, r6, &(0x7f0000000040)=0x103000, 0x8001) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) 09:38:59 executing program 2 (fault-call:3 fault-nth:47): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 09:38:59 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xe0112b8a3fd60664, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{0x2, 0xff}, {0x3, 0x9}, 0x4, 0x2, 0x1f}) r1 = msgget$private(0x0, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket(0x0, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$xfs(&(0x7f0000000500)='xfs\x00', 0x0, 0x5d, 0x7, &(0x7f0000002840)=[{&(0x7f0000000580)="972939c439668469fe40b90a655f8aa314fcd03a429370cc229eabb9", 0x1c, 0x1856}, {&(0x7f0000000800)="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", 0xf00, 0xfffffffffffffffd}, {&(0x7f0000001800)="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", 0x1000, 0x9}, {&(0x7f0000000600)="1b7ad2e701e248d4e1f838d9d6eab62ed13b6e938f5059937b8cd598575b231d6e4958dfa3a1e476c5219ecdbfcf3381bf14f31be0c9ed3b6ffd2233863d1f39347f10147fcc124c4d04321b9c88b66cbb92a81ec230b9d84576728b7be4fbc29c37fd51da5247fa8b63c38577888c86a5", 0x71, 0x4}, {&(0x7f0000000680)="b50e9525c6fb8ffee50e494fdab2a528fdfbe8599febd620919c3b9b3df704c139a3879914a560c8d7ad3df9489146c495af547427c70da819453c06fc303faa23706cb839512a7a63a4758711b1906f5ddb8eec86b19f7c91b6b6d2c2efb9e2662fdc7edd9ab8c1ad7a1b4aab803de2ffd7b309007b7bdec606a3442fff1f7c40dea8a58c394ad4125249fff08abbaa", 0x90, 0xffffffffffffffc1}, {&(0x7f0000000740)="4abaf988b827d2f1d1bd438ce383bff3cf4c83de3b0414897a68cd29aa01a6d81f401a11a194e11642e310305f81f9c5beddaf81a36dcdd55f74c0b358a55d2b781cb0e18b4013a8a31af11bb9f6c121b6829e22ef3c527964c2eea56c408c16183bb5343e80b89b161ece", 0x6b, 0x3}, {&(0x7f0000002800), 0x0, 0x4}], 0x40801, &(0x7f0000002a40)={[{@grpid='grpid'}], [{@dont_appraise='dont_appraise'}, {@uid_gt={'uid>'}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@hash='hash'}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x0, r4, r2, 0xffffffffffffffff}, 0x0, 0x1}) 09:38:59 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) 09:38:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x25) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000000)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 1858.283268] FAULT_INJECTION: forcing a failure. [ 1858.283268] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1858.295121] CPU: 0 PID: 25683 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1858.303004] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1858.303817] selinux_nlmsg_perm: 54 callbacks suppressed [ 1858.303826] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25687 comm=syz-executor.5 [ 1858.312353] Call Trace: [ 1858.312374] dump_stack+0x142/0x197 [ 1858.312393] should_fail.cold+0x10f/0x159 [ 1858.312412] __alloc_pages_nodemask+0x1d6/0x7a0 [ 1858.312421] ? fs_reclaim_acquire+0x20/0x20 [ 1858.312436] ? __alloc_pages_slowpath+0x2930/0x2930 [ 1858.312459] cache_grow_begin+0x80/0x400 [ 1858.332276] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25687 comm=syz-executor.5 [ 1858.332435] kmem_cache_alloc_trace+0x6b2/0x790 [ 1858.343260] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25687 comm=syz-executor.5 [ 1858.344850] ? lock_downgrade+0x740/0x740 [ 1858.344861] ? trace_hardirqs_on_caller+0x400/0x590 [ 1858.344880] sget_userns+0xfe/0xc30 [ 1858.356961] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25692 comm=syz-executor.5 [ 1858.358241] ? set_anon_super+0x20/0x20 [ 1858.358256] ? get_empty_filp.cold+0x3b/0x3b [ 1858.358268] mount_ns+0x6d/0x190 09:38:59 executing program 2 (fault-call:3 fault-nth:48): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1858.375042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25687 comm=syz-executor.5 [ 1858.386995] ? proc_get_inode+0x620/0x620 [ 1858.387009] proc_mount+0x6a/0xa0 [ 1858.387022] mount_fs+0x97/0x2a1 [ 1858.387035] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1858.387046] ? rcu_read_lock_sched_held+0x110/0x130 [ 1858.387056] kern_mount_data+0x56/0xc0 [ 1858.387067] pid_ns_prepare_proc+0x1e/0x90 [ 1858.387076] alloc_pid+0x9f0/0xc70 [ 1858.387096] copy_process.part.0+0x272f/0x6a70 [ 1858.387109] ? debug_smp_processor_id+0x1c/0x20 [ 1858.402381] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25692 comm=syz-executor.5 [ 1858.411891] ? perf_trace_lock+0x109/0x500 [ 1858.411902] ? check_preemption_disabled+0x3c/0x250 [ 1858.411914] ? debug_smp_processor_id+0x1c/0x20 [ 1858.411936] ? __cleanup_sighand+0x50/0x50 [ 1858.411946] ? lock_downgrade+0x740/0x740 [ 1858.411962] _do_fork+0x19e/0xce0 [ 1858.411981] ? fork_idle+0x280/0x280 [ 1858.411995] ? fput+0xd4/0x150 [ 1858.412004] ? SyS_write+0x15e/0x230 [ 1858.412017] SyS_clone+0x37/0x50 [ 1858.412023] ? sys_vfork+0x30/0x30 [ 1858.412036] do_syscall_64+0x1e8/0x640 [ 1858.424132] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25687 comm=syz-executor.5 [ 1858.435783] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1858.435804] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1858.435812] RIP: 0033:0x45a919 [ 1858.435817] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1858.435829] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1858.435835] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 09:38:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x3bd09f19c8b7ae7) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xffffffffffffffde) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x10e) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r2 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r2, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0xfffffffffffffe6e) [ 1858.435841] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1858.435848] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1858.435854] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1858.485275] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25692 comm=syz-executor.5 [ 1858.520706] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25692 comm=syz-executor.5 [ 1858.529003] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25692 comm=syz-executor.5 [ 1858.601911] FAULT_INJECTION: forcing a failure. [ 1858.601911] name failslab, interval 1, probability 0, space 0, times 0 [ 1858.653110] CPU: 0 PID: 25699 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1858.662118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1858.671482] Call Trace: [ 1858.674069] dump_stack+0x142/0x197 [ 1858.677710] should_fail.cold+0x10f/0x159 [ 1858.681866] should_failslab+0xdb/0x130 [ 1858.685845] kmem_cache_alloc_trace+0x2e9/0x790 [ 1858.690528] selinux_parse_opts_str+0x42c/0xa30 [ 1858.695198] ? debug_smp_processor_id+0x1c/0x20 [ 1858.699884] ? selinux_sb_show_options+0xd50/0xd50 [ 1858.704815] ? debug_smp_processor_id+0x1c/0x20 [ 1858.709502] ? d_instantiate+0x7b/0xa0 [ 1858.713390] ? save_trace+0x290/0x290 [ 1858.717193] ? SOFTIRQ_verbose+0x10/0x10 [ 1858.721251] ? d_instantiate+0x7b/0xa0 [ 1858.725138] ? lockref_get+0x46/0x60 [ 1858.728858] superblock_doinit+0xeb/0x200 09:38:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = gettid() kcmp(r1, r1, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) r2 = socket$inet(0x10, 0x2, 0x0) dup(r2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$inet(0x10, 0x2, 0x0) r5 = dup(r4) sendfile(r5, r3, &(0x7f0000000040)=0x103000, 0x8001) fcntl$dupfd(r5, 0x0, r2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r6, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1858.733011] ? selinux_parse_opts_str+0xa30/0xa30 [ 1858.737869] selinux_sb_kern_mount+0xa9/0x230 [ 1858.742367] ? delayed_superblock_init+0x20/0x20 [ 1858.747124] ? _raw_spin_unlock+0x2d/0x50 [ 1858.751271] ? lockref_get+0x46/0x60 [ 1858.754979] ? mount_ns+0xc1/0x190 [ 1858.758530] security_sb_kern_mount+0x7d/0xb0 [ 1858.763028] ? mqueue_mount+0xc0/0xf0 [ 1858.766835] mount_fs+0x14e/0x2a1 [ 1858.770291] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1858.774782] kern_mount_data+0x56/0xc0 [ 1858.774792] mq_init_ns+0x167/0x220 [ 1858.774801] copy_ipcs+0x35e/0x400 [ 1858.785820] create_new_namespaces+0x1dd/0x720 [ 1858.790399] ? ns_capable_common+0x12c/0x160 [ 1858.790413] copy_namespaces+0x284/0x310 [ 1858.790426] copy_process.part.0+0x2603/0x6a70 [ 1858.790439] ? debug_smp_processor_id+0x1c/0x20 [ 1858.790449] ? perf_trace_lock+0x109/0x500 [ 1858.790456] ? check_preemption_disabled+0x3c/0x250 [ 1858.790467] ? debug_smp_processor_id+0x1c/0x20 [ 1858.790487] ? __cleanup_sighand+0x50/0x50 [ 1858.790497] ? lock_downgrade+0x740/0x740 [ 1858.790512] _do_fork+0x19e/0xce0 [ 1858.790525] ? fork_idle+0x280/0x280 [ 1858.790537] ? fput+0xd4/0x150 [ 1858.790544] ? SyS_write+0x15e/0x230 [ 1858.790556] SyS_clone+0x37/0x50 [ 1858.790564] ? sys_vfork+0x30/0x30 [ 1858.851359] do_syscall_64+0x1e8/0x640 [ 1858.855247] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1858.860100] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1858.865287] RIP: 0033:0x45a919 [ 1858.868472] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1858.876182] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 09:39:00 executing program 2 (fault-call:3 fault-nth:49): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x673a18aab9b00911, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1858.883464] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1858.890735] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1858.898010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1858.905276] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 09:39:00 executing program 5: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) dup(0xffffffffffffffff) close(0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) inotify_init1(0x0) socket$alg(0x26, 0x5, 0x0) r1 = getpid() write$RDMA_USER_CM_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x0) getpid() syz_open_dev$cec(0x0, 0x2, 0x2) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) getpid() sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r2 = gettid() kcmp(r2, r2, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="230228ef4407771ed318061b4b26c0d8d21d5d6fe0eb92552fba4784466ebedbcc3e2a012ecdb76658b7e06c6e5d4380a818249f0000008000000000596ee41f32cf359a30a74dc68c77cfbef5c16f3e6407000000d2e6a618a45d70acc40800b8ce6c24f1228bf63bb7bf08002a74e3e68d5b7cc2cba5236e18c7c33bf72e01b09927c99c7fbc6766d54ce13ac0141ff728b8769ed263967917563d50037d87cd0a16e793656535caa700"/181], 0xb5) close(r3) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x8000, 0x0) r5 = perf_event_open(&(0x7f00000005c0)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x800}, 0x200, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') r6 = inotify_init1(0x0) fcntl$setown(r6, 0x8, 0xffffffffffffffff) fcntl$getownex(r6, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r7, 0x13) syz_open_procfs(r7, &(0x7f0000000040)='clear_refs\x00') r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r8, 0x117, 0x1, 0x0, 0x0) r9 = accept$alg(r8, 0x0, 0x0) r10 = dup(r9) write$UHID_DESTROY(r10, &(0x7f0000000080), 0xfff2) recvmmsg(0xffffffffffffffff, &(0x7f0000002700), 0x40000000000025c, 0x40002000, 0x0) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x3, 0x5}, 0x0) r12 = getpid() r13 = creat(&(0x7f0000000000)='./file1/file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r13, &(0x7f0000008b80)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000001c0)={0xffffffffffffffff}, 0x9d, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r14, &(0x7f0000000240)={0x6, 0x118, 0xfa00, {{0xccd, 0x7, "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", 0x6, 0x4, 0x9, 0x4e, 0x40, 0x6, 0x5c}, r15}}, 0x120) r16 = getpid() sched_setattr(r16, &(0x7f0000000040)={0x30}, 0x0) r17 = syz_open_dev$cec(0x0, 0x2, 0x2) write$selinux_load(r17, &(0x7f0000000d80)=ANY=[@ANYRES64], 0x8) r18 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(r18, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x2, 0x90, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000027ae74f8aa80f2182f07ee0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff000000000000000000000000000000000000000000000000000000200000000000007fb0fa774300000000000000000000ffffffff0000000046e73920333a7bd8c5738a45a3cfe941bc09bf568c7379439b000000000000000021ebc1ff030000000000002c92cb8a9fd4d4f0e309c5dd2be43915414d947098483757eb60bf3d4bfe1b8cf58595f8b394f7755553811a3479700a566ea09fce3cf82e81bc4a80e81def9713"]}, 0x177) r19 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$cgroup_pid(r19, 0x0, 0x0) r20 = getpgrp(0x0) waitid(0x0, r20, &(0x7f00000002c0), 0x5, 0x0) ptrace$getregs(0xe, r20, 0x9, &(0x7f00000001c0)=""/68) r21 = getpgid(r20) r22 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_vs_stats_percpu\x00') ioctl$sock_SIOCGPGRP(r22, 0x8904, &(0x7f0000000000)=0x0) r24 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cg\xab.\xc4\xd0\xcex\x177\x84\x0e\x95q\xd7\xf7d\xd2\x1di\x04\x18\xa9\xe5%\x12Z\xfdH\xd2\x8cp\xcc\xc4=\'\x00\xab\x1d\x99\x03\x91Kt\x98Q\x8eB\x92\x02p\xc8\\6\x86T\xb1\xfa\xaf\x8c\x8b\x94\xa5\xa2\x8aU\x14&\xab\x9c%\xd0>|\xbc\xe0\xab\xdd\xdd\x93\xf9q\x19\x86F\xd7Y\x19\v\x13\x17\xc0\x1brd.\x17\xad\xd5\x00$\x01\x87\x96\xd3XA\xb3\xb7\x81\xcd6\xd3\xe2\x8e\x8c\xd0\xf4y\xc5\x1e2\xd25\xdc\x0f\xd9\x8f~\'\xe2\xc9mCmA~\x0e\xfch\x94<(\xd3f\xbd\xc3\x91\x017L\x14X\xaf\x99\x90\x8bv\x9b#|z\x9a\x99\xaf\xbd\xb7{qJ>\"\x90\xc8\b\xc6~\rN\x16\xa5\xde\x98\xb3\xb2\xb5\xees]$\x12\xfb\xd1\n\xd5\xbe\xe4\xc4\xfd\x8c\x9e\xa6\x86WQ\xae\xaf\xf8(,\xff#\xe8|f\xcb\xaa\x1e,\xfc\xfa\xefI\x9d=$\x14\x8aI\x85_\xa6\n6\xabZ\xc5N\xa6\x1c\x8c\xd4\xf8z\xcd\\\x98gq\xc8\'\xd3\xb5\xb7\x98s\xd8\x9e}\xbbS\x98\xdc\xfa\xd1\x9b\xdcW\xaa\xe6{q\xae\xfc\b\xf1\xc4\xd9R#<\x1e\x1d2}!\xc1\xfd\xbdS\r\x8a\x11P(\xf5\xdf\xde\xde\x03g\'\x8b\xab7\\\n\x9e\xa8\xe2\x80@\x9f]\x1f,\x88\xfc\xc5\xad\x94\x00V\x8a-\xfbH\xd4\xa4\x9f\xda\x8e\x93\xc0\xbd\xd9qV}B{\xc3\xc6oT\xa9!3\xa9\xe3\x98\x99$d\xec\x9c5\xdd\xea', 0x200002, 0x0) r25 = openat$cgroup_ro(r24, &(0x7f0000000240)='cpuset.memory_pressure\x00', 0x0, 0x0) r26 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r27 = getpid() r28 = socket(0xa, 0x3, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r28, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) sendmsg$key(r28, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r29 = gettid() waitid(0x2c7c96e4f825ad55, r29, &(0x7f00000008c0), 0x80000000, &(0x7f0000000940)) r30 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r30, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) r31 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r31, &(0x7f0000000000)=[{&(0x7f0000000200)="580000001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) sendmsg$key(r28, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYPTR64=&(0x7f0000000380)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESOCT=r21, @ANYRES16, @ANYRES16=r21, @ANYRESDEC, @ANYRES32, @ANYRES64], @ANYRESOCT=r30, @ANYRES64=r31, @ANYRES64], @ANYRESDEC=r29]], 0x8}}, 0x20004850) r32 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r32) kcmp(r32, r32, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) ptrace$setopts(0x4206, r32, 0x0, 0x0) r33 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x6d, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40), &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r32, r33, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r29, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r27, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='comm\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r26, 0x0, 0xd, &(0x7f0000000080)='trusted\\#&>#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r25, 0x0, 0x13, &(0x7f0000000280)='em1{bdevbdevvmnet1\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r23, r22, 0x0, 0x17, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r21, r19, 0x0, 0x24, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r18, 0x0, 0x5, &(0x7f0000000080)='em0-\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)='/loproc(\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r34}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000700)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, r17, 0x0, 0x1, &(0x7f0000000000)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000140)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r16, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000140)='lotrustedmd5sumem1:\'\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000540)={0xffffffffffffffff, r14, 0x0, 0x1, &(0x7f0000000500)='\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={r12, r13, 0x0, 0xa, &(0x7f00000002c0)='/dev/ptmx\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r11, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='sh\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='/dev/kvm\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r7, r10, 0x0, 0xd, &(0x7f0000000200)='xts(serpent)\x00', r34}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r34}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000180)='{(@nodev\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r5, 0x0, 0x3, &(0x7f0000000540)='{\\\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r4, 0x0, 0x21, &(0x7f00000000c0)=':trusted@\xc2&security+&&keyringem0\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xd, &(0x7f0000000000)=',ppp0md5sum#\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, r3, 0x0, 0xb, &(0x7f00000000c0)='/dev/hwrng\x00', r34}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={r1, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000000)='vboxnet1}\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r2, 0xffffffffffffffff, 0x0, 0xe, &(0x7f0000000140)=':(ppp0vmnet1]\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r35}, 0xfffffffffffffeb2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) creat(0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) syz_open_procfs(0x0, 0x0) socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) dup(0xffffffffffffffff) getpid() getpid() pipe2(0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) syz_open_dev$cec(0x0, 0x2, 0x2) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, 0x0, 0x177) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) r36 = getpgrp(0x0) ptrace$getregs(0xffffffffffffffff, r36, 0x0, 0x0) syz_open_procfs(0x0, 0x0) gettid() socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000300)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000580)={0xffffffffffffffff, r0, 0x0, 0x0, 0x0}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) [ 1859.001421] FAULT_INJECTION: forcing a failure. [ 1859.001421] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.013471] CPU: 0 PID: 25718 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1859.021363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.030717] Call Trace: [ 1859.033306] dump_stack+0x142/0x197 [ 1859.036946] should_fail.cold+0x10f/0x159 [ 1859.041100] should_failslab+0xdb/0x130 [ 1859.045066] __kmalloc+0x2f0/0x7a0 [ 1859.048692] ? lock_downgrade+0x740/0x740 [ 1859.052832] ? register_shrinker+0xbd/0x220 [ 1859.057142] register_shrinker+0xbd/0x220 [ 1859.061282] sget_userns+0x9bf/0xc30 [ 1859.064976] ? set_anon_super+0x20/0x20 [ 1859.068941] ? get_empty_filp.cold+0x3b/0x3b [ 1859.073336] mount_ns+0x6d/0x190 [ 1859.076685] ? proc_get_inode+0x620/0x620 [ 1859.080818] proc_mount+0x6a/0xa0 [ 1859.084263] mount_fs+0x97/0x2a1 [ 1859.087614] vfs_kern_mount.part.0+0x5e/0x3d0 [ 1859.092103] ? rcu_read_lock_sched_held+0x110/0x130 [ 1859.097118] kern_mount_data+0x56/0xc0 [ 1859.100990] pid_ns_prepare_proc+0x1e/0x90 [ 1859.105209] alloc_pid+0x9f0/0xc70 [ 1859.108741] copy_process.part.0+0x272f/0x6a70 [ 1859.113310] ? debug_smp_processor_id+0x1c/0x20 [ 1859.117964] ? perf_trace_lock+0x109/0x500 [ 1859.122192] ? check_preemption_disabled+0x3c/0x250 [ 1859.127205] ? debug_smp_processor_id+0x1c/0x20 [ 1859.131866] ? __cleanup_sighand+0x50/0x50 [ 1859.136083] ? lock_downgrade+0x740/0x740 [ 1859.140217] _do_fork+0x19e/0xce0 [ 1859.143655] ? fork_idle+0x280/0x280 [ 1859.147355] ? fput+0xd4/0x150 [ 1859.150528] ? SyS_write+0x15e/0x230 [ 1859.154229] SyS_clone+0x37/0x50 [ 1859.157582] ? sys_vfork+0x30/0x30 [ 1859.161107] do_syscall_64+0x1e8/0x640 [ 1859.164979] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1859.169818] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1859.174995] RIP: 0033:0x45a919 [ 1859.178163] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1859.185858] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1859.193111] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 09:39:00 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = msgget$private(0x0, 0x0) msgrcv(r0, 0x0, 0x0, 0x0, 0x0) [ 1859.200360] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1859.207612] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1859.214865] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1859.281057] ================================================================== [ 1859.288678] BUG: KASAN: use-after-free in put_pid_ns+0x80/0x90 [ 1859.294740] Read of size 8 at addr ffff88809c6f5250 by task syz-executor.2/25718 [ 1859.294744] [ 1859.294753] CPU: 0 PID: 25718 Comm: syz-executor.2 Not tainted 4.14.159-syzkaller #0 [ 1859.294758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.294762] Call Trace: [ 1859.294776] dump_stack+0x142/0x197 [ 1859.294789] ? put_pid_ns+0x80/0x90 [ 1859.294800] print_address_description.cold+0x7c/0x1dc [ 1859.294810] ? put_pid_ns+0x80/0x90 [ 1859.294831] kasan_report.cold+0xa9/0x2af [ 1859.294843] __asan_report_load8_noabort+0x14/0x20 [ 1859.294851] put_pid_ns+0x80/0x90 [ 1859.294862] free_nsproxy+0x104/0x200 [ 1859.294871] switch_task_namespaces+0x98/0xb0 [ 1859.294882] exit_task_namespaces+0x18/0x20 [ 1859.294892] copy_process.part.0+0x3c67/0x6a70 [ 1859.294904] ? debug_smp_processor_id+0x1c/0x20 [ 1859.294914] ? perf_trace_lock+0x109/0x500 [ 1859.294922] ? check_preemption_disabled+0x3c/0x250 [ 1859.294933] ? debug_smp_processor_id+0x1c/0x20 [ 1859.294951] ? __cleanup_sighand+0x50/0x50 [ 1859.392437] ? lock_downgrade+0x740/0x740 [ 1859.396769] _do_fork+0x19e/0xce0 [ 1859.400227] ? fork_idle+0x280/0x280 [ 1859.403949] ? fput+0xd4/0x150 [ 1859.407136] ? SyS_write+0x15e/0x230 [ 1859.410838] SyS_clone+0x37/0x50 [ 1859.414184] ? sys_vfork+0x30/0x30 [ 1859.417712] do_syscall_64+0x1e8/0x640 [ 1859.421613] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1859.426471] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1859.432165] RIP: 0033:0x45a919 [ 1859.435333] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1859.443037] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1859.450303] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1859.457563] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1859.464826] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1859.472086] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1859.479344] [ 1859.480961] Allocated by task 25718: [ 1859.484667] save_stack_trace+0x16/0x20 [ 1859.488637] save_stack+0x45/0xd0 [ 1859.492071] kasan_kmalloc+0xce/0xf0 [ 1859.495763] kasan_slab_alloc+0xf/0x20 [ 1859.499629] kmem_cache_alloc+0x12e/0x780 [ 1859.503769] copy_pid_ns+0x1af/0xa50 [ 1859.507478] create_new_namespaces+0x267/0x720 [ 1859.512041] copy_namespaces+0x284/0x310 [ 1859.516088] copy_process.part.0+0x2603/0x6a70 [ 1859.520664] _do_fork+0x19e/0xce0 [ 1859.524112] SyS_clone+0x37/0x50 [ 1859.527473] do_syscall_64+0x1e8/0x640 [ 1859.531348] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1859.536511] [ 1859.538135] Freed by task 0: [ 1859.541149] save_stack_trace+0x16/0x20 [ 1859.545118] save_stack+0x45/0xd0 [ 1859.548561] kasan_slab_free+0x75/0xc0 [ 1859.552436] kmem_cache_free+0x83/0x2b0 [ 1859.556389] delayed_free_pidns+0x89/0xb0 [ 1859.560523] rcu_process_callbacks+0x7b8/0x12b0 [ 1859.565189] __do_softirq+0x244/0x9a0 [ 1859.568980] [ 1859.570599] The buggy address belongs to the object at ffff88809c6f4a18 [ 1859.570599] which belongs to the cache pid_namespace of size 2264 [ 1859.583503] The buggy address is located 2104 bytes inside of [ 1859.583503] 2264-byte region [ffff88809c6f4a18, ffff88809c6f52f0) [ 1859.595542] The buggy address belongs to the page: [ 1859.600466] page:ffffea000271bd00 count:1 mapcount:0 mapping:ffff88809c6f40c0 index:0x0 compound_mapcount: 0 [ 1859.610428] flags: 0xfffe0000008100(slab|head) [ 1859.614998] raw: 00fffe0000008100 ffff88809c6f40c0 0000000000000000 0000000100000003 [ 1859.622876] raw: ffffea00025c8920 ffff8880a68a5048 ffff8880a804c1c0 0000000000000000 [ 1859.630743] page dumped because: kasan: bad access detected [ 1859.636449] [ 1859.638061] Memory state around the buggy address: [ 1859.642974] ffff88809c6f5100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1859.650329] ffff88809c6f5180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1859.657676] >ffff88809c6f5200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1859.665041] ^ [ 1859.671003] ffff88809c6f5280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 1859.678352] ffff88809c6f5300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fb fb [ 1859.685701] ================================================================== [ 1859.693048] Disabling lock debugging due to kernel taint [ 1859.699111] Kernel panic - not syncing: panic_on_warn set ... [ 1859.699111] [ 1859.706486] CPU: 0 PID: 25718 Comm: syz-executor.2 Tainted: G B 4.14.159-syzkaller #0 [ 1859.715560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.724888] Call Trace: [ 1859.727460] dump_stack+0x142/0x197 [ 1859.731189] ? put_pid_ns+0x80/0x90 [ 1859.734796] panic+0x1f9/0x42d [ 1859.737965] ? add_taint.cold+0x16/0x16 [ 1859.741922] ? ___preempt_schedule+0x16/0x18 [ 1859.746312] kasan_end_report+0x47/0x4f [ 1859.750264] kasan_report.cold+0x130/0x2af [ 1859.754562] __asan_report_load8_noabort+0x14/0x20 [ 1859.759574] put_pid_ns+0x80/0x90 [ 1859.763005] free_nsproxy+0x104/0x200 [ 1859.766788] switch_task_namespaces+0x98/0xb0 [ 1859.771261] exit_task_namespaces+0x18/0x20 [ 1859.775579] copy_process.part.0+0x3c67/0x6a70 [ 1859.780142] ? debug_smp_processor_id+0x1c/0x20 [ 1859.784793] ? perf_trace_lock+0x109/0x500 [ 1859.789003] ? check_preemption_disabled+0x3c/0x250 [ 1859.793997] ? debug_smp_processor_id+0x1c/0x20 [ 1859.798646] ? __cleanup_sighand+0x50/0x50 [ 1859.802856] ? lock_downgrade+0x740/0x740 [ 1859.806984] _do_fork+0x19e/0xce0 [ 1859.810415] ? fork_idle+0x280/0x280 [ 1859.814104] ? fput+0xd4/0x150 [ 1859.817292] ? SyS_write+0x15e/0x230 [ 1859.820982] SyS_clone+0x37/0x50 [ 1859.824332] ? sys_vfork+0x30/0x30 [ 1859.827850] do_syscall_64+0x1e8/0x640 [ 1859.831714] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 1859.836549] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 1859.841819] RIP: 0033:0x45a919 [ 1859.844987] RSP: 002b:00007fe50ac38c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1859.852674] RAX: ffffffffffffffda RBX: 00007fe50ac38c90 RCX: 000000000045a919 [ 1859.859920] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 673a18aab9b00911 [ 1859.867167] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1859.874413] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe50ac396d4 [ 1859.881663] R13: 00000000004c1007 R14: 00000000004d4d28 R15: 0000000000000004 [ 1859.890321] Kernel Offset: disabled [ 1859.893940] Rebooting in 86400 seconds..